Method and device for evaluating security vulnerability processing priority
A priority and vulnerability technology, applied in the field of network security, can solve problems such as only considering technical risks and failing to focus on security vulnerabilities, so as to reduce the possible effect of being attacked
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0023] In order to facilitate the description of the technical solution of the application, some concepts involved in the application are firstly described below.
[0024] The carrier of the security vulnerability refers to all the devices connected to the network in the enterprise intranet; according to the specific situation of the enterprise, it can be a computer host in the enterprise intranet, a server, or a network security device. There is no specific limitation in the application.
[0025] In order to solve the prior art when assessing the processing priority of security vulnerabilities, only considering the technical risks that may be introduced by security vulnerabilities, ignoring the importance of the carrier where the security vulnerabilities are located, the network area, open ports, exposed surfaces and many other factors, resulting in network The administrator fails to focus on the security vulnerability that poses the greatest risk to the network when dealing ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


