Unlock instant, AI-driven research and patent intelligence for your innovation.

Method and device for evaluating security vulnerability processing priority

A priority and vulnerability technology, applied in the field of network security, can solve problems such as only considering technical risks and failing to focus on security vulnerabilities, so as to reduce the possible effect of being attacked

Pending Publication Date: 2022-05-13
武汉思普崚技术有限公司
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In order to solve the prior art when assessing the processing priority of security vulnerabilities, only considering the technical risks that may be introduced by security vulnerabilities, ignoring the importance of the carrier where the security vulnerabilities are located, the network area, open ports, exposed surfaces and many other factors, resulting in network The administrator fails to focus on the security vulnerability that poses the greatest risk to the network when dealing with the security vulnerability. This application provides a method and device for evaluating the priority of security vulnerability processing through the following aspects

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for evaluating security vulnerability processing priority
  • Method and device for evaluating security vulnerability processing priority
  • Method and device for evaluating security vulnerability processing priority

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] In order to facilitate the description of the technical solution of the application, some concepts involved in the application are firstly described below.

[0024] The carrier of the security vulnerability refers to all the devices connected to the network in the enterprise intranet; according to the specific situation of the enterprise, it can be a computer host in the enterprise intranet, a server, or a network security device. There is no specific limitation in the application.

[0025] In order to solve the prior art when assessing the processing priority of security vulnerabilities, only considering the technical risks that may be introduced by security vulnerabilities, ignoring the importance of the carrier where the security vulnerabilities are located, the network area, open ports, exposed surfaces and many other factors, resulting in network The administrator fails to focus on the security vulnerability that poses the greatest risk to the network when dealing ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a method and device for evaluating the processing priority of security vulnerabilities, the method is applied to evaluating the processing priority of the security vulnerabilities in an enterprise intranet, and the method comprises the following steps: obtaining the risk level of a to-be-evaluated security vulnerability; obtaining an exposure path risk level of the target carrier; obtaining a target port opening coefficient; and determining the processing priority of the to-be-evaluated security vulnerability according to the self risk level, the exposure path risk level and the target port opening coefficient. When the method is used for evaluating the processing priority of the security vulnerability, not only is the risk level of the vulnerability considered, but also the exposure path risk level of the target carrier where the security vulnerability is located in the network structure of each enterprise intranet and the port opening condition of the security vulnerability on the target carrier are considered. Therefore, a network administrator can focus on forming the security vulnerability with the maximum risk for the network, so that the possibility that the network is attacked is reduced.

Description

technical field [0001] The present application relates to the technical field of network security, and in particular to a method and device for evaluating security vulnerability processing priorities. Background technique [0002] A security hole is a defect in the specific implementation of hardware, software, protocol, or system security policy, which allows an attacker to access or destroy the system without authorization. Usually behind a major cyber attack, there are one or more unfixed vulnerabilities. Therefore, timely and accurate handling of security vulnerabilities is crucial to identifying and reducing network risks. [0003] Network administrators use vulnerability scanning tools to scan the corporate network to obtain information about security vulnerabilities in the corporate intranet, and then repair the security vulnerabilities. However, with the expansion and diversification of the network, the number of vulnerabilities detected by vulnerability scanning t...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 孙祥明
Owner 武汉思普崚技术有限公司