Network asset value evaluation method and system, medium, equipment and terminal

A network asset and value assessment technology, applied in the field of cyberspace security risk assessment, can solve problems such as not giving specific methods, not being able to distinguish value, not considering the importance of asset business, etc., to reduce deviation and reduce the influence of subjective factors Effect

Pending Publication Date: 2022-07-22
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] (1) The current traditional method of assessing asset value is derived from the risk levels of the three attributes of confidentiality, integrity, and availability, without considering the business importance of the asset
[0005] (2) Information security technology The information security risk assessment specification proposes that the quantification process of asset confidentiality, integrity and availability is prone to subjectivity, and the importance of the business carried by the asset can be considered, and

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Network asset value evaluation method and system, medium, equipment and terminal
  • Network asset value evaluation method and system, medium, equipment and terminal
  • Network asset value evaluation method and system, medium, equipment and terminal

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0087] Example 1

[0088] The purpose of the present invention is to provide a network asset value evaluation system and method, which can effectively meet the needs of risk evaluation and risk management. The network asset value evaluation system includes a network asset search engine, a business importance index extraction module, a business importance index analysis module, a business importance calculation module, and an asset value calculation and display module.

[0089] In order to achieve the above purpose, the method for evaluating the value of network assets provided by the present invention includes the following steps in order:

[0090] 1) The S1 stage of acquiring network asset information: based on the network asset search engine to obtain relevant network asset information, and based on each service, the network asset information such as device model, version information, IP address information, open service ports, externally provided protocol types, The geogra...

Example Embodiment

[0124] Example 2

[0125] The network asset value evaluation system provided by the embodiment of the present invention includes a network asset search engine, a business importance index extraction module, a business importance index analysis module, a business importance calculation module, and an asset value calculation and display module.

[0126] The present invention will be further described in conjunction with an example of bank network asset value evaluation. The evaluation method based on the network asset value evaluation system provided by the embodiment of the present invention includes the following steps performed in order:

[0127] 1) The S1 stage of acquiring network asset information: based on the network asset search engine to obtain relevant network asset information, and based on each service, the network asset information such as device model, version information, IP address information, open service ports, externally provided protocol types, The geograph...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention belongs to the technical field of network space security risk assessment, and discloses a network asset value assessment method and system, a medium, equipment and a terminal, and the method comprises the steps: building a business importance index system based on the characteristics of assets on which a business depends and the business, and obtaining the weight of each index through the objective attributes of the assets; evaluating the business importance according to the weight of each index and the value of each business object in each index; the value of the assets is quantified by using the importance of the services and the confidentiality, integrity and availability of the assets, and the values of the same type of services on different assets are effectively distinguished. According to the invention, the requirements of risk assessment and risk management are effectively met, so that the assessment result of asset value is more accurate; a business importance index system is established based on the assets on which the business depends and the characteristics of the business, the value of the same type of business on different assets is effectively distinguished, and the subjective influence is reduced.

Description

technical field [0001] The invention belongs to the technical field of cyberspace security risk assessment, and in particular relates to a network asset value assessment method, system, medium, equipment and terminal. Background technique [0002] In recent years, information security incidents have emerged one after another, which has brought serious impact on people's life and work. Therefore, it is very necessary to carry out risk assessment for information systems. The quantification of asset value is a necessary part of risk assessment, which lays the foundation for the next step of risk assessment and risk management, which is conducive to the smooth development of follow-up work. At present, the traditional method to assess the value of assets is based on the risk level of the three security attributes of confidentiality, integrity and availability, without considering the business importance of the asset. In GB / T31509-2015 Information Security Technology Information...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q10/06G06Q30/02
CPCG06Q10/0635G06Q10/06393G06Q30/0283
Inventor 林宏刚陈麟黄元飞杨鹏
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products