[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN103996006A - Information system security risk assessment method and device - Google Patents

Information system security risk assessment method and device Download PDF

Info

Publication number
CN103996006A
CN103996006A CN201310050945.XA CN201310050945A CN103996006A CN 103996006 A CN103996006 A CN 103996006A CN 201310050945 A CN201310050945 A CN 201310050945A CN 103996006 A CN103996006 A CN 103996006A
Authority
CN
China
Prior art keywords
weight
behavior
threat
behaviors
information system
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201310050945.XA
Other languages
Chinese (zh)
Other versions
CN103996006B (en
Inventor
李斌
常乐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Mobile Group Shanxi Co Ltd
Original Assignee
China Mobile Group Shanxi Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Mobile Group Shanxi Co Ltd filed Critical China Mobile Group Shanxi Co Ltd
Priority to CN201310050945.XA priority Critical patent/CN103996006B/en
Publication of CN103996006A publication Critical patent/CN103996006A/en
Application granted granted Critical
Publication of CN103996006B publication Critical patent/CN103996006B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses an information system security risk assessment method. The method includes the steps of constructing a threatening behavior model bank, matching calling behaviors recorded in an information system with threatening behaviors in the threatening behavior model bank to obtain decision values of the matched calling behaviors, determining weighted values of the threatening behaviors according to the decision values of the matched calling behaviors, and enabling the weighted values of the threatening behaviors to be combined with a vulnerability weighted value and a remedial measure weighted value to obtain a risk grade. The invention further discloses an information system security risk assessment device. Through the scheme of the information system security risk assessment method and device, security risks of the information system can be measured in multi-dimensional mode, the defects of existing risk evaluation quantification are greatly made up for, the accuracy and credibility of threat evaluation are improved, and the core problem of risk quantification of the information system can be solved; consequently, users can conveniently and objectively know the condition of running risks of the information system, and the risks of the information system can be perceived.

Description

Method and device for evaluating security risk of information system
Technical Field
The present invention relates to information security technologies, and in particular, to a method and an apparatus for evaluating security risk of an information system.
Background
With the change of the IT technology, the whole national economic development can not leave the operation and support of information systems, and how to ensure the safe operation of the information systems becomes a central priority; according to the requirements of 2006-.
To realize initiative information security, the key is to solve the situation of how to evaluate the security risk of the information system or sense the risk early. The risk profile is further related to a number of factors, including: the vulnerability factor of the information system, the threat factor outside the system, the control measure, the compensation measure and other factors; these factors in turn interact and interact with each other.
In the prior art, the safety risk of an information system is evaluated mainly through the following three ways: firstly, from the threat perspective, namely judging the security event quantity of related equipment, mainly analyzing logs from security equipment and IT equipment, and extracting logs with high risk level from the logs for judgment; secondly, from the aspect of vulnerability, namely vulnerability evaluation is carried out on network facilities, host resources, code resources and the like related to the information bearing system, so that the height of the risk condition is obtained; and thirdly, comprehensively evaluating by combining the threat, the vulnerability and the asset value.
The existing risk evaluation system has major defects and shortcomings, which are mainly reflected in the following aspects:
firstly, the evaluation index depends on a single factor or is too complex to reflect the real risk condition; from the threat angle, the external attack condition can be truly reflected, but because the external threats are numerous and the sources are complex, both novel attacks and very old attacks exist, and the attack applicability also needs to be accurately discriminated, the evaluation of higher risk condition generally occurs, and the threat disposal and the development of compensation measures are not facilitated; from the aspect of vulnerability, the vulnerability condition of an information system can be truly reflected, but because the vulnerability is static, risks need to be formed and threatened to attack, the risk condition evaluation distortion often occurs, effective resources are not favorably put into risk control, and the cost is overlarge; comprehensive evaluation from threats, vulnerabilities and asset values can reflect the risk condition level comparatively, but the comprehensive evaluation relates to a three-dimensional system, and three factors are many-to-many relationships, so that the mapping relationship and the calculation are extremely complex, and the comprehensive evaluation is difficult to realize in practical use.
Secondly, the existing evaluation system only pays attention to risk threat, vulnerability and asset value, but neglects important compensation measures which are actually important factors for risk control.
Disclosure of Invention
In view of the above, the main objective of the present invention is to provide a method and an apparatus for evaluating security risk of an information system, which can measure security risk of the information system in multiple dimensions.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the invention provides a method for evaluating the security risk of an information system, which comprises the following steps:
constructing a threat behavior pattern library, matching the calling behaviors recorded by the information system with the threat behaviors in the threat behavior pattern library, acquiring the judgment values of the matched calling behaviors, and determining the weight of the threat behaviors according to the judgment values of the matched calling behaviors;
and combining the weight of the threat behavior with the weight of the vulnerability and the weight of the remedy measure to obtain the risk level.
In the above scheme, the constructing the threat behavior pattern library is: the specific threat behaviors are used as a classification principle, each type of threat behavior is mapped to a system function call set, each system function call set comprises more than one call behavior of a system Application Programming Interface (API) function represented by a triple (a module number, a function number and a rule number), and all the threat behaviors form a threat behavior pattern library.
In the above scheme, the matching of the call behavior recorded by the information system and the threat behavior in the threat behavior pattern library is as follows: and converting the format of the call behavior recorded by the information system into the format of a triple < module number, function number and rule number >, and matching the converted call behavior with the threat behavior in the threat behavior pattern library.
In the above scheme, the obtaining of the determination value of each matching call behavior is as follows: and counting the occurrence average value of each matched calling behavior, and obtaining the judgment value of each calling behavior according to the occurrence average value of each calling behavior.
In the above scheme, the risk level obtained by combining the weight of the threat behavior with the weight of the vulnerability and the weight of the remedy measure is: obtaining a risk level according to a risk level formula comprising a threat behavior weight, a vulnerability weight and a remedy weight;
risk rating (V) ═ Round1{ Log2[ (ax2) }The+B×2Vul+C×2Con)/3]}×Asset(value)
Wherein, The represents a threat behavior weight; vul represents the weight of vulnerability; con represents the weight of the compensation measure; round function is a function rounded to the numerical value by the number of digits specified, Round1 denotes the reserved 1-digit decimal number; asset (value) represents asset value; a is the coefficient of the weight of the threat behavior; b is the coefficient of the weight of the vulnerability; and C is the coefficient of the weight of the compensation measure.
The invention provides a device for evaluating the security risk of an information system, which comprises: the system comprises a construction module, a matching module, a judgment value acquisition module, a determination module and a risk grade acquisition module; wherein,
the construction module is used for constructing a threat behavior pattern library;
the matching module is used for matching the calling behaviors recorded by the information system with the threat behaviors in the threat behavior pattern library and sending the matched calling behaviors to the judgment value acquisition module;
the judgment value acquisition module is used for acquiring the judgment value of each matched calling behavior;
the determining module is used for determining a threat behavior weight according to the judging value;
and the risk level acquisition module is used for combining the weight of the threat behavior with the weight of the vulnerability and the weight of the remedy measure to obtain the risk level.
In the above scheme, the construction module is specifically configured to use a specific threat behavior as a classification rule, each type of threat behavior maps one system function call set, each system function call set includes more than one call behavior of a system API function represented by a triple < module number, function number, and rule number >, and all the threat behaviors constitute a threat behavior pattern library.
In the above scheme, the matching module is specifically configured to convert the format of the call behavior recorded by the information system into a format of a triple < module number, function number, and rule number >, and match the converted call behavior with the threat behavior in the threat behavior pattern library.
In the above scheme, the risk level obtaining module is specifically configured to obtain a risk level according to a risk level formula that includes a threat behavior weight, a vulnerability weight, and a remedy weight;
risk rating (V) ═ Round1{ Log2[ (ax2) }The+B×2Vul+C×2Con)/3]}×Asset(value)
Wherein, The represents a threat behavior weight; vul represents the weight of vulnerability; con represents the weight of the compensation measure; round function is a function rounded to the numerical value by the number of digits specified, Round1 denotes the reserved 1-digit decimal number; asset (value) represents asset value; a is the coefficient of the weight of the threat behavior; b is the coefficient of the weight of the vulnerability; and C is the coefficient of the weight of the compensation measure.
The invention provides a method and a device for evaluating the security risk of an information system, which are characterized by constructing a threat behavior pattern library, matching calling behaviors recorded by the information system with threat behaviors in the threat behavior pattern library, acquiring the decision value of each matched calling behavior, and determining the weight of the threat behavior according to the decision value of each matched calling behavior; combining the weight of the threat behavior with the weight of the vulnerability and the weight of the compensation measure to obtain a risk level; therefore, the safety risk of the information system can be measured in multiple dimensions, the shortage of the existing risk evaluation quantification is greatly overcome, the accuracy and credibility of threat judgment are improved, and the core problem of the risk quantification of the information system is solved, so that a user can conveniently and objectively know the risk condition of the operation of the information system, and the safety risk of the information system can be sensed.
Drawings
FIG. 1 is a schematic flow chart of a method for security risk assessment of an information system according to the present invention;
FIG. 2 is a schematic diagram of a threat behavior pattern library provided by the present invention;
fig. 3 is a schematic structural diagram of an apparatus for information system security risk assessment provided in the present invention.
Detailed Description
The basic idea of the invention is: constructing a threat behavior pattern library, matching the calling behaviors recorded by the information system with the threat behaviors in the threat behavior pattern library, acquiring the judgment values of the matched calling behaviors, and determining the weight of the threat behaviors according to the judgment values of the matched calling behaviors; and combining the weight of the threat behavior with the weight of the vulnerability and the weight of the remedy measure to obtain the risk level.
The invention is further described in detail below with reference to the figures and the specific embodiments.
The invention realizes a method for evaluating the security risk of an information system, which comprises the following steps as shown in figure 1:
step 101: constructing a threat behavior pattern library;
specifically, with specific threat behaviors as a classification principle, as shown in fig. 2, each type of threat behavior a maps a system function call set S, each system function call set S includes more than one call behavior of a system API function represented by a triple < module number, function number, and rule number >, the call behaviors included in the system function call set S are known threat behaviors, and all the threat behaviors a constitute a threat behavior pattern library;
the specific threat behaviors include: eavesdropping class, remote spyware class, intentional disclosure class, hacking class, system/network overload class, etc.
Step 102: matching the calling behavior recorded by the information system with the threat behavior in the threat behavior pattern library;
specifically, the format of the call behavior recorded by the information system is converted into the format of a triple < module number, function number, rule number >, and the converted call behavior is matched with the threat behavior in the threat behavior pattern library.
Step 103: acquiring a judgment value of each matched calling behavior;
specifically, the occurrence mean value of each matched calling behavior is counted, and a judgment value of each calling behavior is obtained according to the occurrence mean value of each calling behavior; here, the determination value is the number of attack successes or the number of attack failures;
the judgment value of each calling behavior obtained according to the occurrence average value of each calling behavior is as follows: counting attack results of each calling behavior in the occurrence mean value of each calling behavior, and taking the attack results as judgment values;
and the attack result is attack success times or attack failure times.
Step 104: determining a threat behavior weight according to the matched judgment value of each calling behavior;
specifically, when the decision value of the matched calling behavior is greater than a preset threshold value, the calling behavior is marked as a threat behavior, the number of all calling behaviors marked as threat behaviors is counted, and a weight of the threat behavior is determined.
Step 105: combining the weight of the threat behavior with the weight of the vulnerability and the weight of the compensation measure to obtain a risk level;
specifically, a risk level is obtained according to a risk level formula comprising a threat behavior weight, a vulnerability weight and a remedy weight;
risk rating (V) ═ Round1{ Log2[ (ax2) }The+B×2Vul+C×2Con)/3]}×Asset(value)
Wherein, The represents a threat behavior weight; vul represents the weight of vulnerability; con represents the weight of the compensation measure; round function is a function rounded to the numerical value by the number of digits specified, Round1 denotes the reserved 1-digit decimal number; asset (value) represents asset value; a is the coefficient of the weight of the threat behavior; b is the coefficient of the weight of the vulnerability; c is the coefficient of the weight of the compensation measure; according to the international basis for weight evaluation, it can be set as follows: a is 0.7, B is 0.5, C is 0.8;
the weight of the vulnerability is generally determined according to the vulnerability level evaluated in an international vulnerability library (CVE);
the weights of the compensation measures are generally assigned according to the robustness (the effectiveness of avoiding risks) of the compensation measures, and the higher the value is, the better the risk avoiding effect is.
In order to implement the above method, the present invention further provides an apparatus for evaluating security risk of an information system, which is generally disposed on a hardware device that provides API service using Linux Server, as shown in fig. 3, and the apparatus includes: the system comprises a construction module 31, a matching module 32, a judgment value acquisition module 33, a determination module 34 and a risk level acquisition module 35; wherein,
the constructing module 31 is used for constructing a threat behavior pattern library;
the matching module 32 is configured to match the call behaviors recorded by the information system with the threat behaviors in the threat behavior pattern library, and send each matched call behavior to the decision value obtaining module 33;
the decision value acquisition module 33 is configured to acquire a decision value of each matched call behavior;
the determining module 34 is configured to determine a threat behavior weight according to the determination value;
and the risk level obtaining module 35 is configured to combine the weight of the threat behavior with the weight of the vulnerability and the weight of the remedy measure to obtain a risk level.
The constructing module 31 is specifically configured to use a specific threat behavior as a classification rule, map a system function call set to each type of threat behavior, where each system function call set includes more than one call behavior of a system API function represented by a triple < module number, function number, and rule number >, and the call behaviors included in the system function call set are known threat behaviors, and all the threat behaviors constitute a threat behavior pattern library.
The matching module 32 is specifically configured to convert the format of the call behavior recorded by the information system into a format of a triple < module number, function number, and rule number >, and match the converted call behavior with the threat behavior in the threat behavior pattern library.
The risk level obtaining module 35 is specifically configured to obtain a risk level according to a risk level formula that includes a threat behavior weight, a vulnerability weight, and a remedy weight;
risk rating (V) ═ Round1{ Log2[ (ax2) }The+B×2Vul+C×2Con)/3]}×Asset(value)
Wherein, The represents a threat behavior weight; vul represents the weight of vulnerability; con represents the weight of the compensation measure; round function is a function rounded to the numerical value by the number of digits specified, Round1 denotes the reserved 1-digit decimal number; asset (value) represents asset value; a is the coefficient of the weight of the threat behavior; b is the coefficient of the weight of the vulnerability; c is the coefficient of the weight of the compensation measure; according to the international basis for weight evaluation, it can be set as follows: a is 0.7, B is 0.5, and C is 0.8.
The above description is only a preferred embodiment of the present invention, and is not intended to limit the scope of the present invention.

Claims (9)

1. A method for information system security risk assessment, the method comprising:
constructing a threat behavior pattern library, matching the calling behaviors recorded by the information system with the threat behaviors in the threat behavior pattern library, acquiring the judgment values of the matched calling behaviors, and determining the weight of the threat behaviors according to the judgment values of the matched calling behaviors;
and combining the weight of the threat behavior with the weight of the vulnerability and the weight of the remedy measure to obtain the risk level.
2. The method of claim 1, wherein the library of threat behavior patterns is constructed by: the specific threat behaviors are used as a classification principle, each type of threat behavior is mapped to a system function call set, each system function call set comprises more than one call behavior of a system Application Programming Interface (API) function represented by a triple (a module number, a function number and a rule number), and all the threat behaviors form a threat behavior pattern library.
3. The method of claim 2, wherein matching the invocation behavior of the information system record with the threat behavior in the threat behavior pattern library is: and converting the format of the call behavior recorded by the information system into the format of a triple < module number, function number and rule number >, and matching the converted call behavior with the threat behavior in the threat behavior pattern library.
4. The method of claim 1, wherein the decision value for each call behavior on the get match is: and counting the occurrence average value of each matched calling behavior, and obtaining the judgment value of each calling behavior according to the occurrence average value of each calling behavior.
5. The method according to claim 1, wherein the risk level obtained by combining the weight of the threat behavior with the weight of the vulnerability and the weight of the remedy is: obtaining a risk level according to a risk level formula comprising a threat behavior weight, a vulnerability weight and a remedy weight;
risk rating (V) ═ Round1{ Log2[ (ax2) }The+B×2Vul+C×2Con)/3]}×Asset(value)
Wherein, The represents a threat behavior weight; vul represents the weight of vulnerability; con represents the weight of the compensation measure; round function is a function rounded to the numerical value by the number of digits specified, Round1 denotes the reserved 1-digit decimal number; asset (value) represents asset value; a is the coefficient of the weight of the threat behavior; b is the coefficient of the weight of the vulnerability; and C is the coefficient of the weight of the compensation measure.
6. An apparatus for information system security risk assessment, the apparatus comprising: the system comprises a construction module, a matching module, a judgment value acquisition module, a determination module and a risk grade acquisition module; wherein,
the construction module is used for constructing a threat behavior pattern library;
the matching module is used for matching the calling behaviors recorded by the information system with the threat behaviors in the threat behavior pattern library and sending the matched calling behaviors to the judgment value acquisition module;
the judgment value acquisition module is used for acquiring the judgment value of each matched calling behavior;
the determining module is used for determining a threat behavior weight according to the judging value;
and the risk level acquisition module is used for combining the weight of the threat behavior with the weight of the vulnerability and the weight of the remedy measure to obtain the risk level.
7. The apparatus according to claim 6, wherein the configuration module is specifically configured to use the specific threat behaviors as a classification rule, and each type of threat behavior maps a system function call set, and each system function call set includes more than one call behavior of a system API function represented by a triple < module number, function number, and rule number >, and all the threat behaviors constitute the threat behavior pattern library.
8. The apparatus according to claim 7, wherein the matching module is specifically configured to convert the format of the call behavior recorded by the information system into a format of a triple < module number, function number, rule number >, and match the converted call behavior with the threat behavior in the threat behavior pattern library.
9. The device according to claim 6, wherein the risk level obtaining module is specifically configured to obtain a risk level according to a risk level formula that includes a threat behavior weight, a vulnerability weight, and a remedy weight;
risk rating (V) ═ Round1{ Log2[ (ax2) }The+B×2Vul+C×2Con)/3]}×Asset(value)
Wherein, The represents a threat behavior weight; vul represents the weight of vulnerability; con represents the weight of the compensation measure; round function is a function rounded to the numerical value by the number of digits specified, Round1 denotes the reserved 1-digit decimal number; asset (value) represents asset value; a is the coefficient of the weight of the threat behavior; b is the coefficient of the weight of the vulnerability; and C is the coefficient of the weight of the compensation measure.
CN201310050945.XA 2013-02-17 2013-02-17 A kind of method and apparatus of Evaluation of Information System Security Risk Active CN103996006B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201310050945.XA CN103996006B (en) 2013-02-17 2013-02-17 A kind of method and apparatus of Evaluation of Information System Security Risk

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201310050945.XA CN103996006B (en) 2013-02-17 2013-02-17 A kind of method and apparatus of Evaluation of Information System Security Risk

Publications (2)

Publication Number Publication Date
CN103996006A true CN103996006A (en) 2014-08-20
CN103996006B CN103996006B (en) 2018-09-04

Family

ID=51310168

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201310050945.XA Active CN103996006B (en) 2013-02-17 2013-02-17 A kind of method and apparatus of Evaluation of Information System Security Risk

Country Status (1)

Country Link
CN (1) CN103996006B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844169A (en) * 2015-01-15 2016-08-10 中国移动通信集团安徽有限公司 Method and device for information safety metrics
CN106407813A (en) * 2016-05-17 2017-02-15 北京智言金信信息技术有限公司 Data normalization processing apparatus and method for heterogeneous vulnerability scanner
CN106656996A (en) * 2016-11-09 2017-05-10 航天科工智慧产业发展有限公司 Information safety risk assessment method
CN107239707A (en) * 2017-06-06 2017-10-10 国家电投集团河南电力有限公司技术信息中心 A kind of threat data processing method for information system
CN108776861A (en) * 2018-04-27 2018-11-09 中国铁路总公司 Railway Communication safety risk estimating method and device
CN109684366A (en) * 2018-12-20 2019-04-26 国家计算机网络与信息安全管理中心 A kind of knowledge base group volume method for industrial control system risk assessment
CN110839000A (en) * 2018-08-15 2020-02-25 中国信息通信研究院 Method and device for determining security level of network information system
CN112565296A (en) * 2020-12-24 2021-03-26 深信服科技股份有限公司 Security protection method and device, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101017458A (en) * 2007-03-02 2007-08-15 北京邮电大学 Software safety code analyzer based on static analysis of source code and testing method therefor
CN101374051A (en) * 2008-08-22 2009-02-25 中国航天科工集团第二研究院七○六所 Method for evaluating information system risk base on multi-element fusion
US20110173146A1 (en) * 2006-06-12 2011-07-14 John Harris Hnatio Complexity systems management method
CN102238038A (en) * 2011-07-26 2011-11-09 北京神州绿盟信息安全科技股份有限公司 Network equipment security evaluation method and device
CN102799954A (en) * 2012-07-18 2012-11-28 中国信息安全测评中心 Method and system for multi-objective optimization applied to risk assessment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110173146A1 (en) * 2006-06-12 2011-07-14 John Harris Hnatio Complexity systems management method
CN101017458A (en) * 2007-03-02 2007-08-15 北京邮电大学 Software safety code analyzer based on static analysis of source code and testing method therefor
CN101374051A (en) * 2008-08-22 2009-02-25 中国航天科工集团第二研究院七○六所 Method for evaluating information system risk base on multi-element fusion
CN102238038A (en) * 2011-07-26 2011-11-09 北京神州绿盟信息安全科技股份有限公司 Network equipment security evaluation method and device
CN102799954A (en) * 2012-07-18 2012-11-28 中国信息安全测评中心 Method and system for multi-objective optimization applied to risk assessment

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
李江涛: "基于行为的病毒检测系统的设计与实现", 《中国优秀硕士学位论文全文数据库(信息科技辑)》 *
黄水清等: "数字图书馆信息安全风险评估", 《现代图书情报技术》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105844169B (en) * 2015-01-15 2019-09-13 中国移动通信集团安徽有限公司 Information security measure and device
CN105844169A (en) * 2015-01-15 2016-08-10 中国移动通信集团安徽有限公司 Method and device for information safety metrics
CN106407813A (en) * 2016-05-17 2017-02-15 北京智言金信信息技术有限公司 Data normalization processing apparatus and method for heterogeneous vulnerability scanner
CN106407813B (en) * 2016-05-17 2020-04-07 北京摄星科技有限公司 Heterogeneous vulnerability scanner data normalization processing device and method
CN106656996B (en) * 2016-11-09 2020-09-15 航天科工智慧产业发展有限公司 Information security risk assessment method
CN106656996A (en) * 2016-11-09 2017-05-10 航天科工智慧产业发展有限公司 Information safety risk assessment method
CN107239707A (en) * 2017-06-06 2017-10-10 国家电投集团河南电力有限公司技术信息中心 A kind of threat data processing method for information system
CN107239707B (en) * 2017-06-06 2020-09-29 国家电投集团河南电力有限公司 Threat data processing method for information system
CN108776861A (en) * 2018-04-27 2018-11-09 中国铁路总公司 Railway Communication safety risk estimating method and device
CN110839000A (en) * 2018-08-15 2020-02-25 中国信息通信研究院 Method and device for determining security level of network information system
CN110839000B (en) * 2018-08-15 2022-02-08 中国信息通信研究院 Method and device for determining security level of network information system
CN109684366A (en) * 2018-12-20 2019-04-26 国家计算机网络与信息安全管理中心 A kind of knowledge base group volume method for industrial control system risk assessment
CN112565296A (en) * 2020-12-24 2021-03-26 深信服科技股份有限公司 Security protection method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN103996006B (en) 2018-09-04

Similar Documents

Publication Publication Date Title
CN103996006B (en) A kind of method and apparatus of Evaluation of Information System Security Risk
CN102710598B (en) System and method for reducing security risk in computer network
CN110825757B (en) Equipment behavior risk analysis method and system
CN107911396A (en) Log in method for detecting abnormality and system
Arias et al. Spatial analysis of vicariance: a method for using direct geographical information in historical biogeography
CN103136255B (en) The method and apparatus of information management
CN106209862A (en) A kind of steal-number defence implementation method and device
CN103440459A (en) Function-call-based Android malicious code detection method
CN107122669A (en) A kind of method and apparatus for assessing leaking data risk
CN106845836B (en) Safety risk analysis method and system for environmental protection measures in power transmission and transformation engineering construction process
CN107895122A (en) A kind of special sensitive information active defense method, apparatus and system
CN113487212A (en) Risk monitoring method and device
CN116962443B (en) Storage data processing system based on cloud computing
CN114157484A (en) Data security storage system based on cloud computing
CN115378711A (en) Industrial control network intrusion detection method and system
CN105208009A (en) Safety detection method and apparatus of account number
CN115796607A (en) Acquisition terminal security portrait assessment method based on power consumption information analysis
CN104848889A (en) Fiber grating historic building monitoring and maintaining system based on Internet-of-things technology
CN108833442A (en) A kind of distributed network security monitoring device and its method
CN117857225B (en) Identity authentication system and method for new energy power station acquisition terminal
CN116743479B (en) Network security detection system and method based on big data
CN114238330A (en) Data processing method and device, electronic equipment and storage medium
CN109962916B (en) Multi-attribute-based industrial internet security situation evaluation method
CN116405242B (en) Safety state identification method for data acquisition and monitoring system
CN105897776A (en) Safety management and control method based on cloud computation system and safety management and control system based on cloud computation system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant