Method for acquiring risk level of information security event and related device
A technology of information security and risk level, applied in the field of network security, can solve problems such as threats to information security and business operations, and achieve the effect of improving accuracy and objectivity
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0041] The following will be combined with the drawings in the embodiment of the present application, the technical solution in the embodiment of the present application is clearly and completely described, it is clear that the embodiment described is only a part of the embodiment of the present application, not all embodiments. Based on the embodiments in the present application, all other embodiments obtained by those of ordinary skill in the art without doing creative labor, are within the scope of protection of the present application.
[0042] In the existing field of information security, according to the information security incidents, artificially according to the pre-set division provisions (the guidelines mentioned below) to classify information security incidents, for example, the current classification of information security incidents has GB / Z20986-2007 "Information Security Technology Information Security Incident Classification and Classification Guidelines", which ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap