Information security situation analysis method
A technology of information security and analysis method, which is applied in the field of information security situation analysis, can solve the problems such as the reduction of information security prevention rate and the decrease of the effect of information security situation analysis of information data, and achieve the effect of increasing the information security prevention rate and improving the effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0026] refer to figure 1 , an information security situation analysis method, comprising the following steps:
[0027] S1: Obtaining information: Professionals obtain security information, where the security information includes the entire network status, website security logs, vulnerability database, and malicious code database. The information acquisition is divided into two parts: active acquisition and passive acquisition. Passive acquisition is the acquisition of IP address segments, domain name information, email addresses, document image data, addresses, organizational structure, technical architecture used by the target system, and public business information. Active acquisition is performed by professionals using equipment sharing connections to obtain information sharing qualifications After obtaining the qualification, professionals will search and store the required security information one-to-one;
[0028] S2: Feature extraction: After obtaining the information, ...
Embodiment 2
[0034] refer to figure 1 , an information security situation analysis method, comprising the following steps:
[0035] S1: Obtaining information: Professionals obtain security information, where the security information includes the entire network status, website security logs, vulnerability databases, and malicious code databases;
[0036] S2: Feature extraction: After obtaining the information, professionals will store all the information in the same storage location of the computer, and the computer will first classify all the information data, and after the classification is completed, the same type of data will be screened by the computer to remove duplication data, and send all the remaining data production files to the desktop, and the professionals receive the files from the desktop, and perform secondary screening on the files according to the classification, and extract the abnormal data in the classification, after the abnormal data is extracted, the abnormal data i...
Embodiment 3
[0042] refer to figure 1 , an information security situation analysis method, comprising the following steps:
[0043] S1: Obtaining information: Professionals obtain security information, where the security information includes the entire network status, website security logs, vulnerability database, and malicious code database. The information acquisition is divided into two parts: active acquisition and passive acquisition. Passive acquisition is the acquisition of IP address segments, domain name information, email addresses, document image data, addresses, organizational structure, technical architecture used by the target system, and public business information. Active acquisition is performed by professionals using equipment sharing connections to obtain information sharing qualifications After obtaining the qualification, professionals will search and store the required security information one-to-one;
[0044] S2: Feature extraction: After obtaining the information, ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

