Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety risk evaluation method and device, computer equipment and storage medium

A risk assessment and security risk technology, applied in the security field, can solve problems such as incomplete threats and low security risk assessment accuracy

Active Publication Date: 2018-12-07
PING AN TECH (SHENZHEN) CO LTD
View PDF5 Cites 22 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] With the rapid development of computer technology and the continuous growth of the number of Internet users, there are more and more computer systems such as cloud platforms, and more and more security problems are faced. At present, when evaluating the security risks of computer systems such as cloud platforms, Determine the risk of the object to be assessed by calculating the number of existing threats and the risk level, such as determining the risk of the computer system based on the number of vulnerabilities and the level of vulnerabilities. However, the detected threats are not complete, and the accuracy of security risk assessment is low.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety risk evaluation method and device, computer equipment and storage medium
  • Safety risk evaluation method and device, computer equipment and storage medium
  • Safety risk evaluation method and device, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0026] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0027] The security risk assessment method provided by this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the server 104 through the network. When it is necessary to perform a security risk assessment on the server 104, the user can operate on the terminal 102 to trigger an instruction to perform a security risk assessment on the server 104. After the terminal 102 obtains the security risk assessment instruction, it obtains the target risk assessment parameters corresponding to the server 1...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The application relates to a safety risk evaluation method and device, computer equipment and a storage medium. The method comprises the steps of: acquiring a target risk evaluation parameter set corresponding to a to-be-evaluated object, wherein the target risk evaluation parameter set comprises at least two target risk evaluation parameters; acquiring risk influence degrees corresponding to current target risk evaluation parameters; calculating parameter difference values of the current target risk evaluation parameters relative to corresponding historical risk evaluation parameters; according to the risk influence degree of each target risk evaluation parameter and the corresponding parameter difference value, obtaining a first weight corresponding to each target risk evaluation parameter, wherein the risk influence degree and the first weight are in positive correlation relationship, and the parameter difference value and the first weight are in positive correlation relationship; and according to a risk score corresponding to each target risk evaluation parameter and the corresponding first weight, obtaining a target risk evaluation value corresponding to the to-be-evaluated object. By adopting the method, safety risk evaluation accuracy can be improved.

Description

technical field [0001] The present application relates to the security field, in particular to a security risk assessment method, device, computer equipment and storage medium. Background technique [0002] With the rapid development of computer technology and the continuous growth of the number of Internet users, there are more and more computer systems such as cloud platforms, and more and more security problems are faced. At present, when evaluating the security risks of computer systems such as cloud platforms, Determine the risk of the object to be assessed by calculating the number of existing threats and the risk level, such as determining the risk of the computer system based on the number of vulnerabilities and the level of vulnerabilities. However, the detected threats are not complete, and the accuracy of security risk assessment is low. . Contents of the invention [0003] Based on this, it is necessary to provide a security risk assessment method, device, com...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57
CPCG06F21/577
Inventor 陈春璐王晓箴谢晴马诗晴邱菁萍李洋
Owner PING AN TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products