Semantics-based method and system for evaluating the certification ability of registered information security personnel

A technology for information security and registration information, applied in the field of information security, it can solve the problems of not fully reflecting the mastery of the necessary knowledge for students' comprehensive application ability, and not guaranteeing the level and ability of test-takers, so as to reduce the burden of memory and broaden the scope of learning. The effect of problem ideas and reducing search time

Inactive Publication Date: 2019-01-29
CHINA INFORMATION TECH SECURITY EVALUATION CENT
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] (2) Although teachers spend a lot of time on writing questions, they still cannot guarantee that the test papers can reasonably evaluate the level and ability of candidates
It is a test evaluation standard that the candidate's test scores are up to standard, but there will be an improvement in the entire test score caused by the students' high mastery of certain knowledge points in certain fields, which cannot fully reflect the students' comprehensive application ability and specific position. The degree of mastery of the necessary knowledge in each field required

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Semantics-based method and system for evaluating the certification ability of registered information security personnel
  • Semantics-based method and system for evaluating the certification ability of registered information security personnel
  • Semantics-based method and system for evaluating the certification ability of registered information security personnel

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] The specific implementation of the invention will be described below by taking the Certified Information Security Professional Certification Examination (Certified Information Security Professional, CISP for short) as an example.

[0061] The specific implementation process of the certification ability assessment method for registered information security personnel is as follows:

[0062] The first part: Establish the ontology database of information security knowledge system;

[0063] The CISP syllabus stipulates the content and depth requirements of each knowledge point in the knowledge sub-domain, and divides the ability level into three categories: "understanding", "understanding", and "mastery". Understanding: is the minimum depth requirement, students only need to correctly understand the basic concepts and principles of the knowledge points; understanding: is a medium-depth requirement, students need to understand the content in depth on the basis of correctly un...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a semantics-based registration information security officer authentication capability evaluation method and system and relates to the field of information security. The method comprises the steps of establishing an information security knowledge system ontology library, establishing a knowledge association recommendation, establishing a knowledge association path recommendation based on the ontology library, a knowledge point association path between knowledge classes and an association path between knowledge bodies, conducting evaluation on students, giving a general statistical analysis semantics-based analysis result and forming an electronic report. The system comprises an authentication management module, an authentication examination module, a capability assessment management module and a system management module. According to the method and system, semantic association between evaluated knowledge points is considered in all the steps from knowledge system establishment to evaluation result analysis, so that the mechanical properties, caused by automatic processing, of evaluation are reduced, evaluation efficiency and quality are improved, the reasonability of a final evaluation result is guaranteed, and then the purpose of capability evaluation is better achieved.

Description

technical field [0001] The invention relates to the field of information security, and specifically proposes a method and system for evaluating the authentication ability of registered information security personnel based on semantics. Background technique [0002] With the continuous development of my country's informatization and global informatization, information security issues are increasingly closely related to public life and become the focus of attention. On February 27, 2014, the central government established a network security and informatization leading group, and the issue of information security was raised to a national strategic level. These have vigorously promoted the development of the information security industry, resulting in a large demand for information security talents. [0003] Due to the popularization and application of information technology, information security has gradually become one of the basic needs of ordinary people. What information ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): G06F16/36G09B7/02
CPCG06F16/211G06Q50/2057G09B7/02
Inventor 吴世忠李斌张晓菲邹静
Owner CHINA INFORMATION TECH SECURITY EVALUATION CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products