Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information security audit system and method thereof

A technology of information security and management and control system, applied in the field of information security auditing, can solve problems such as inability to efficiently control, single weakness or important asset evaluation, and inability to be organized or provided by enterprises

Inactive Publication Date: 2014-05-21
INSTITUTE FOR INFORMATION INDUSTRY
View PDF5 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] In the control process of information security, it is often assessed for a single weakness or important asset, and it is impossible to provide an overall information security risk assessment for the organization or enterprise
In addition, information security risk assessment is mostly carried out in a fixed-cycle manpower manner. In the case of more and more information security threats and continuous occurrences, it will not be able to effectively control and control, thereby increasing the probability of information security incidents.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information security audit system and method thereof
  • Information security audit system and method thereof
  • Information security audit system and method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] Please refer to figure 1 . figure 1 It is a block diagram of an information security audit management and control system 1 in an embodiment of the present invention. The information security audit management and control system 1 includes: a group differentiation module 10 , an associated database 12 , a risk calculation module 14 , a dynamic audit module 16 and an operation interface 18 .

[0040] The operation interface 18 can be used for the user to input the organization information 11 of an organization, including the structure levels and at least one feature corresponding to each of the members of the organization. Among them, the word "organization" can be, for example but not limited to, a company, an association or an institution, and the structural level of its members can be grouped from members of high structural level (such as business groups, departments, etc.) to members of low structural level (e.g. group, individual, etc.). Moreover, members of an org...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information security audit system and a method thereof. The information security audit method is applied to the information security audit system. The information security audit method comprises the steps outlined below. A normalized weighting of each of a plurality of members of an organization is computed according to a level and at least one feature of each of the members. A plurality of risk evaluation values corresponding to a plurality of audit items are computed and a normalized risk evaluation value of each of the members is further computed according to the risk evaluation values and the normalized weighting. A relation of the normalized risk evaluation value and a plurality of threshold value intervals are determined to dynamically adjust an audit period and / or a number of the audit items according to the relation.

Description

technical field [0001] The present invention relates to an information security audit technology, and in particular to an information security audit control system and method. Background technique [0002] Today, with the increasingly developed network and computer technology, a large amount of information can be processed and stored through computer devices, and can also be exchanged and transmitted quickly through the network. Although the use of networks and computers can speed up the processing and control of information and bring a lot of convenience, the vulnerabilities of networks and computers often become the target of hacker attacks. After being attacked by hackers, the confidential information of companies or public agencies may be leaked. Therefore, the importance of information security is self-evident. [0003] In the control process of information security, it is often assessed for a single weakness or an important asset, and it is impossible to provide an o...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06Q10/06
CPCG06F21/577
Inventor 郭建廷阮鹤鸣雷钦隆
Owner INSTITUTE FOR INFORMATION INDUSTRY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products