Risk assessment method and device, computer equipment and storage medium

A technology of risk assessment and computer program, applied in the field of cloud computing, which can solve the problems of cloud computing security risk assessment with large errors and inaccurate assessment results

Pending Publication Date: 2022-04-15
SHANGHAI PUDONG DEVELOPMENT BANK
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

As a result, the traditional cloud computing security risk assessment is too much influenced by human subject...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Risk assessment method and device, computer equipment and storage medium
  • Risk assessment method and device, computer equipment and storage medium
  • Risk assessment method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0069] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0070] In one embodiment, such as figure 1 As shown, a risk assessment method is provided. In this embodiment, the method is applied to a terminal for illustration. It can be understood that this method can also be applied to a server, and can also be applied to a system including a terminal and a server, and through The interactive realization of terminal and server. In this embodiment, the method includes the following steps:

[0071] Step 102, obtaining the risk factor value of the risk factor corresponding to each risk indicator to be evaluated and the entropy-like w...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a risk assessment method and device, computer equipment, a storage medium and a computer program product. The method comprises the following steps: acquiring a risk factor value of a risk factor corresponding to each risk index to be evaluated and a class entropy weight coefficient of the risk factor under each risk index; calculating a correction factor of the risk factor according to a preset information entropy measurement algorithm; correcting the risk factor value of the risk factor and the corresponding class entropy weight coefficient according to the correction factor to obtain a corrected risk factor value and a corrected class entropy weight coefficient under each risk index, and determining a risk value of each risk index according to the corrected risk factor value and the corresponding corrected class entropy weight coefficient; and inputting the risk value corresponding to each risk index into a pre-trained risk assessment model, and determining a cloud computing environment risk level. By adopting the method, the accuracy and reliability of risk assessment are improved.

Description

technical field [0001] The present application relates to the technical field of cloud computing, in particular to a risk assessment method, device, computer equipment, storage medium and computer program product. Background technique [0002] With the rise of cloud computing technology, the security risks in cloud computing services have become a serious obstacle to the development of cloud computing. Measurement and evaluation became urgent problems. [0003] In the traditional cloud computing security risk assessment methods, information security risk assessment models established by Analytic Hierarchy Process, Fuzzy Mathematics, Gray Theory, etc. are widely used to assess the security risk level of various risks contained in cloud computing services. [0004] However, information security risk assessment models often require technicians or experts and scholars to give individual assessment information for each risk to be assessed in advance, and determine the level of r...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/40H04L41/16G06F21/57G06N3/04G06N3/08
Inventor 章维韩智鹏
Owner SHANGHAI PUDONG DEVELOPMENT BANK
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products