Information security management system

A security management and information technology, applied in the field of information security management system, can solve the problems of increasing the company's operating costs, general products without appropriate structure, and inconvenience.

Inactive Publication Date: 2011-03-30
FINEART TECH CO LTD
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Although the above-mentioned information security management system can be used to protect important data within the company, and the console 106 can also be implemented with an existing computer in the company, the company that uses the above-mentioned information security management system must still set up a computer in the company. Information security server 102 and database 104, but the hardware cost and software cost required by the two are not affordable by ordinary small and medium-sized enterprises
In addition, companies that adopt the above-mentioned information security management system often also need to pay extra for the education, training and salary of the maintenance personnel of the information security server 102 and database 104, which increases the company's operating costs.
[0005] It can be seen that the above-mentioned existing information security management system obviously still has inconvenience and defects in structure and use, and needs to be further improved urgently.
In order to solve the above-mentioned problems, the relevant manufacturers have tried their best to find a solution, but for a long time no suitable design has been developed, and the general product has no suitable structure to solve the above-mentioned problems. This is obviously the relevant industry. Urgent problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security management system
  • Information security management system
  • Information security management system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0041] In order to further explain the technical means and effects of the present invention to achieve the intended purpose of the invention, the specific implementation, structure, characteristics and effects of the information security management system proposed according to the present invention will be described below in conjunction with the accompanying drawings and preferred embodiments. , as detailed below.

[0042] The aforementioned and other technical contents, features and effects of the present invention will be clearly presented in the following detailed description of preferred embodiments with reference to the drawings. For convenience of description, in the following embodiments, the same elements are denoted by the same numbers.

[0043] figure 2 The structure of the information security management system according to an embodiment of the present invention is drawn. Please refer to figure 2 As shown, the information security management system includes an ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to an information security management system which comprises an information security server and a control table, wherein the information security server is provided with information security management software, the control table is coupled with the information security server through the Internet and is coupled with a plurality of computers through local area networks, and the computers are all provided with the agent program of the information security management software. After being linked to the information security server, the control table can set information security policies of the computers on the information security management software to generate set results, and the agent program in the computers can control and manage the information security of the computers according the set results. Compared with the traditional information security management system, the cost of the information security management system of the invention is lower, and can be afforded by ordinary middle-size and small-size enterprises, and the information security management system is very suitable for practical use.

Description

technical field [0001] The invention relates to a technique in the field of information security, in particular to an information security management system. Background technique [0002] In recent years, many companies have adopted information security (information security) management systems to protect important data within the company and avoid major losses caused by important data leakage. figure 1 That is, the structure of the existing known information security management system is drawn. Please refer to figure 1 , this architecture includes an information security server 102, a database (database) 104 and a console (console) 106, and the information security server 102 is installed with information security management software. The above-mentioned devices are coupled to the computers 110, 112, 114, 116 and 118 through the company's internal area network 108, and these computers are all installed with an agent program (agent) of the aforementioned information securi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/00G06F21/62
Inventor 陈建宏
Owner FINEART TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products