Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Asset vulnerability management method and device, electronic equipment and storage medium

A vulnerability management and vulnerability technology, which is applied in the field of network security, can solve problems such as heavy workload of relevant personnel, low efficiency of vulnerability repair, and asset and equipment security issues, so as to improve asset security, improve repair efficiency, and reduce property losses. Effect

Pending Publication Date: 2022-04-12
CHINA TELECOM DIGITAL INTELLIGENCE TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In the prior art, when a security breach occurs in an asset device, professionals are usually required to repair the security breach. However, due to the lack of unified management of the breach, when the breach occurs repeatedly, it is necessary to frequently call personnel to repair the breach, resulting in The workload of the relevant personnel is heavy, and it takes a long time to repair the vulnerability, resulting in low efficiency of vulnerability repair
Frequent occurrence of vulnerabilities and low repair efficiency can easily lead to security problems in asset equipment, resulting in property losses

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Asset vulnerability management method and device, electronic equipment and storage medium
  • Asset vulnerability management method and device, electronic equipment and storage medium
  • Asset vulnerability management method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0030] Assets refer to various forms of equipment, systems, software, etc. owned by the company, such as computers, servers, operating systems, databases, etc. All kinds of assets usually store various materials, documents, etc. of the company, and when assets appear When there is a security breach, it may be invaded, resulting in the leakage of the company's data and data, and bringing property losses to the company. Therefore, it is necessary to scan the assets regularly and repair the existing loopholes.

[0031] Vulnerability scanning can use some scripts to detect ope...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an asset vulnerability management method and device, electronic equipment and a storage medium, and relates to the field of network security. The method comprises the steps that target assets are scanned, vulnerabilities existing in the target assets are acquired, and the target assets are determined based on selection of a user; comparing the vulnerability with the repaired existing vulnerability in a vulnerability library; when it is determined that the vulnerability is not in the vulnerability library, vulnerability information is fed back to a technician to enable the technician to repair the vulnerability, and the vulnerability and a corresponding repair method are stored in the vulnerability library, so that when the repeated vulnerability identical to the vulnerability is scanned out, the vulnerability is repaired by the technician. And calling a repair method corresponding to the vulnerability to repair the repeated vulnerability. Through unified management of the vulnerabilities, the management efficiency and the repair efficiency of the vulnerabilities are improved, so that the asset security is improved, and the property loss caused by the vulnerabilities is reduced.

Description

technical field [0001] The present application relates to the field of network security, and in particular, relates to an asset vulnerability management method, an asset vulnerability management device, an electronic device, and a computer-readable storage medium. Background technique [0002] In the prior art, when a security breach occurs in an asset device, professionals are usually required to repair the security breach. However, due to the lack of unified management of the breach, when the breach occurs repeatedly, it is necessary to frequently call personnel to repair the breach, resulting in The workload of relevant personnel is heavy, and it takes a long time to fix the vulnerability, resulting in low efficiency of vulnerability repair. Frequent occurrence of vulnerabilities and low repair efficiency can easily lead to security problems in asset equipment, resulting in property losses. Contents of the invention [0003] In view of this, the present invention aims ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57H04L9/06
Inventor 于海洋刘德安张微
Owner CHINA TELECOM DIGITAL INTELLIGENCE TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products