Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

38 results about "Information security risk assessment" patented technology

Information security risk assessment method oriented to typical metallurgy process control system

The invention provides an information security risk assessment method oriented to a typical metallurgy process control system and belongs to the technical field of industrial control system information security. The system robustness under different attack modes and policies is analyzed by establishing an attack model under the typical scenes of the metallurgy process, and therefore, the security risk assessment on the typical metallurgy process control system in different attack modes and a failure mode can be realized. Based on the risk theory, the method is used for performing the security risk assessment by use of a random probability algorithm by defining the metallurgy process control system as a physical information fusion system; from the two aspects of the occurrence probability and the influence of attack sources or failure sources, a security assessment method based on risk indexes is developed. Quantitative estimation is performed based on risk indexes; a security incident set is created based on the established physical information fusion model and attack model, and then the security incident set is combined with the calculated robustness assessment indexes for the quantitative estimation, and therefore, the weak security links in the control system can be located conveniently.
Owner:AUTOMATION RES & DESIGN INST OF METALLURGICAL IND

Information security risk assessment method and system based on situation awareness learning

The invention discloses an information security risk assessment method and system based on situation awareness learning. The method comprises the following steps: firstly, collecting network securityasset defense information and department personnel organization information; then, preprocessing the collected information; performing format unification, useless data filtering, repeated data mergingand the like on the data; then, in combination with an existing information security risk assessment standard and an existing information security risk assessment model, systematically establishing entry information of the risk assessment model, and finally, grading network security according to the collected information by utilizing a Bayesian network machine learning algorithm. The system comprises an asset defense information collection module, a statistical personnel organization information module, a data set preprocessing module, a risk assessment model establishment module and a network security comprehensive assessment module. According to the invention, a set of more complete risk assessment system is constructed in multiple aspects and multiple ways, and security assessment grading is carried out, so that risk measures are selected in a targeted manner to reduce and control risks.
Owner:湖北央中巨石信息技术有限公司

Intelligent network automobile information security risk assessment method and system

The invention discloses an intelligent network automobile information security risk automatic evaluation method and system. The method comprises steps of sequentially carrying out the risk evaluationaccording to steps, asset recognition, threat analysis, vulnerability analysis and attack path analysis after an evaluation object is selected; after preliminary risk assessment, a threat severity andinfluence severity analysis report being generated, the threat severity of an assessment object being subjected to grade assessment, and the influence caused by the threat severity being assessed; then, risk disposal and mitigation measures being implemented, and threats and influences brought by the threats of the evaluation object being reduced; and finally, generating a risk assessment report.The method is advantaged in that the range of the method covers automobile information safety management, including automobile information safety comprehensive management, product development periodinformation safety management and information safety management after product mass production, and information safety risk assessment automation of software and hardware related to network communication (including an automobile internal network) of an intelligent networked automobile in the automobile design, research, development and manufacturing process is achieved; and efficiency is improved.
Owner:浙江长三角车联网安全技术有限公司

Information security risk assessment method and device, equipment and storage medium

ActiveCN111444514AReflects the threat intensity of the entire networkAccurate assessmentPlatform integrity maintainanceInformation systemReliability engineering
The embodiment of the invention discloses an information security risk assessment method and device, equipment and a storage medium. The method comprises the following steps that: 1, the asset value and the vulnerability value of an information system are determined respectively; each influence factor threatening the information system is decomposed into a plurality of hierarchies according to different information attributes, a threat value of the information system is determined according to the relevance between the influence factors in the adjacent hierarchies, and the vulnerability valueis used for describing the weakness degree of the assets in the aspect of security; the risk possibility of the information system is calculated according to the threat value and the vulnerability value, and the risk consequence possibility of the information system is calculated according to the vulnerability value and the asset value; and an information security risk value of the information system is determined according to the risk possibility and the risk consequence possibility. According to the technical scheme of the embodiment of the invention, the security risk state of the information system can be accurately evaluated.
Owner:TENCENT TECH (SHENZHEN) CO LTD

ICS information safety assessment method based on analytic hierarchy method

The present invention discloses an ICS information safety assessment method based on an analytic hierarchy method. The method comprises: performing ICS risk assessment and constructing an ICS hierarchical model of a project control system to be assessed; constructing a comparison matrix for the importance degree assessment; performing the consistency check of the comparison matrix; performing integral assessment of the ICS system to be assessed; and arranging the assessment report. The ICS information safety assessment method takes the analytic hierarchy method as the basis and performs improvement of the ICS information safety assessment, and preferably selects a weight ratio through comparison compared to the current assessment method so as to allow the assessment result to be more accurate, allow the information in the assessment report to be more reasonable and comprehensive and allow the whole assessment process thinking to be clearer; and moreover, the ICS information safety assessment method based on the analytic hierarchy method is scientific and rigorous and employs scientific method and means for the information safety risk assessment to provide the scientific basis for avoiding and defusing the industry information safety risk, or controlling the risk into an acceptable level and maximally ensuring the network and information safety.
Owner:CHINA ELECTRONICS STANDARDIZATION INST

Information safety risk evaluation system accurate in evaluation

The invention provides an information safety risk evaluation system accurate in evaluation. The information safety risk evaluation system includes a risk identification module, a risk calculation module, a risk evaluation module and a risk management module, wherein the risk identification module is used for identifying information safety risks, the risk calculation module is used for calculatinginformation safety risk values according to identification results, the risk evaluation module is used for evaluating the information safety risks according to the information safety risk values, andthe risk management module is used for processing and controlling the information safety risks according to evaluation results; the risk identification module includes a first risk identification unit, a second risk identification unit and a third risk identification unit, wherein the first risk identification unit is used for identifying property, the second risk identification unit is used for identifying threats which an information system faces, and the third risk identification unit is used for identifying risk-resistant capabilities of the information system. The information safety riskevaluation system accurate in evaluation has the advantage of achieving accurate information safety risk evaluation.
Owner:龚土婷

Electric power Internet-of-things information security risk assessment method and device

The invention provides an electric power Internet of Things information security risk assessment method and device. The method comprises the steps of utilizing a gene expression programming algorithmto calculate the weight of each assessment index in a pre-constructed risk assessment index system; determining a comprehensive evaluation matrix based on the membership degree of each evaluation index to each risk level; and evaluating the information security risk of the power Internet-of-things based on the weight and the comprehensive evaluation matrix. The evaluation process is simplified, the weight is calculated by adopting a gene expression programming algorithm, the determination of the weight is objective and accurate, the information security risk of the electric power Internet-of-things is evaluated based on the weight and the comprehensive evaluation matrix, the relationship of each evaluation index in the risk evaluation index system is considered, and the accuracy of the evaluation result is greatly improved; in consideration of a large number of factors influencing safe and stable operation of the electric power Internet-of-things, relatively high correlation between the factors and non-additivity between the influence factors, the reliability and stability of safe operation of the electric power Internet-of-things are improved.
Owner:CHINA ELECTRIC POWER RES INST +4

Industrial control information security risk assessment model based on distributed inspection

The invention relates to the field of information security of an industrial control system, in particular to an industrial control information security risk assessment model based on distributed inspection. An inspection assessment model is constructed by combining industrial control network characteristics; system asset information is collected automatically to form an industrial control asset inspection list; and an asset object inspection model is formed automatically. According to the invention, industrial data are collected and automatic analysis is carried out on the data, and reductionanalysis is carried out on various industrial communication protocols, so that the asset information attributes of the industrial control system are fully and accurately identified; because of combination of the automatically and intelligently generated asset inspection object model with the distributed inspection evaluation implementation mode, the workload of inspection personnel is reduced andmanual and artificial misoperation and misjudgment are reduced, so that high-efficiency risk evaluation system architecture based on industrial control network characteristics is constructed.
Owner:上海三零卫士信息安全有限公司

Network information security risk assessment model

PendingCN112422509AAchieving the effect of risk visualizationHold up steadilyEnergy saving control techniquesTransmissionDisplay boardComputer science
The invention relates to the technical field of network security, and discloses a network information security risk assessment model, which comprises a display board, hanging boards are fixedly arranged on the left side and the right side of the front side of the display board, a power line is connected to a power supply and a data line is connected to a computer system by arranging color light beads and white light beads, and when the system has a risk, the power line is transmitted to a main control chip by a data line, the main control chip sends the signal to the relay, the relay turns onand turns off the color light lamp bead and the white light lamp bead after signal conversion, the color light lamp bead has three colors of red, yellow and green which represent high risk, easy riskand safety respectively, and the current safety condition is represented by which lamp is turned on while the white light lamp bead only emits white light. The number of the white-light lamp beads isten, and the white-light lamp beads represent different levels of the current safety condition, so that a user can judge and evaluate the current risk in real time according to the color and the number of the lighted lamps so as to make a response strategy in time, and the risk visualization effect is achieved.
Owner:江苏正信信息安全测试有限公司

An extended knowledge map and construction method and system for information security risk assessment

The present invention belongs to the technical field of information security, artificial intelligence and database, and specifically relates to an extended knowledge map and construction method and system for information security risk assessment, including the following steps: constructing an entity, including at least the evaluation target entity T and the evaluation target entity T All evaluation index entities M within a specific time range; construct the relationship type between the evaluation target entity T and the evaluation index entity M; construct the calculation process of knowledge map data expansion, aging, prediction and aggregation; use the constructed entity, the constructed The relationship type and the calculation process of construction form an extended knowledge graph of information security risk assessment. In the present invention, the evaluation index data is also graph-based modeling, so that the evaluation index information is also included in the traditional information security knowledge map, and a sufficient association is established with the evaluation object, thereby bringing convenience to risk evaluation, improving query efficiency and maintainability sex.
Owner:北京金睛云华科技有限公司 +1
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products