Method and system for determining risk value of security incident

A value-at-risk and event technology, applied in the computer field, can solve the problem of not determining the risk value of security incidents, no one determining the risk value of security incidents, etc., to achieve the effect of improving basic security and reducing losses

Inactive Publication Date: 2013-07-03
FOUNDER BROADBAND NETWORK SERVICE
View PDF3 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, there is currently no scheme to determine the risk value of security incidents
[0005] To sum up, there is currently no scheme to determine the risk value of security incidents

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for determining risk value of security incident
  • Method and system for determining risk value of security incident
  • Method and system for determining risk value of security incident

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021] According to the hazard factor data and parameter model of each target area corresponding to the event object, or according to the hazard factor data and dynamic model of each target area corresponding to the event object, the embodiment of the present invention determines each target corresponding to the event object The risk factor distribution parameter value of the area, and then according to the risk factor distribution parameter value of each target area and the loss parameter value of each target area, the vulnerability model is determined, and finally according to the vulnerability model and each target area Hazard parameter value, which determines the risk value for each target area. Because the risk value of security incidents can be determined, the broadband network resources can be controlled to improve the basic guarantee, so that personnel can formulate corresponding preventive measures and construction methods according to the risk distribution, and minimi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention relates to the technical field of computers and particularly relates to a method and a system for determining a risk value of a security incident. The method and the system are used for determining the risk value of the security incident, thereby controlling wideband network resources to improve basic guarantee. The method in the embodiment of the invention comprises the following steps: determining an object region corresponding to a risk factor from a plurality of regions corresponding to incident objects; determining a risk factor distribution parameter value of each object region corresponding to each incident object according to risk factor data of each object region corresponding to each incident object; determining a vulnerability model according to the risk factor distribution value of each object region and a loss parameter value of each object region; and determining a risk value of each object region according to the vulnerability model and the risk factor parameter value of each object region. Due to the adoption of the embodiment of the invention, the wideband network resources are controlled to improve the basic guarantee and the loss caused by the security incidents is possibly reduced to the maximum extent.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a method and system for determining the risk value of a security event. Background technique [0002] With the rapid development of information technology, broadband networks have been widely distributed among individual users and enterprise users. [0003] As the demand for broadband networks continues to increase, the scale and service quality of network operators at all levels need to be improved accordingly. At the same time, various security incidents, such as wind disasters, floods, and fires, will affect resource facilities such as computer rooms, optical cables, and transit sites at all levels, which are the physical hardware foundation of broadband networks, and cause economic losses to network operators. [0004] Therefore, it is necessary to determine the risk of security incidents, so as to realize the control of broadband network resources, and formulate correspon...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F19/00
Inventor 吴雨果王翔
Owner FOUNDER BROADBAND NETWORK SERVICE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products