Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information system service security evaluation method

A security assessment and information system technology, applied in computer security devices, instruments, electrical digital data processing, etc., can solve problems such as lack of information, and achieve the effect of information service optimization

Active Publication Date: 2019-11-22
JIANGSU FRONTIER ELECTRIC TECH
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since domestic and foreign research on information system service security mainly focuses on how to formulate and implement information system service security protocols, develop service vulnerability scanning tools, and analyze and track detailed system security specifications, how to objectively and scientifically evaluate security There is a lack of research on the security of information system services, and it is very important and necessary to test and evaluate the security of information system services

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information system service security evaluation method
  • Information system service security evaluation method
  • Information system service security evaluation method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0018] In order to better understand the essence of the present invention, the present invention will be further described below in conjunction with specific embodiments and accompanying drawings.

[0019] The present invention is applicable to the field of information system service security evaluation, and the specific steps are as follows: figure 1 as shown,

[0020] Step 1: Use data collection equipment to collect security data during the execution of information system services. Security data is collected using monitors and request handlers.

[0021] The monitor is responsible for monitoring optional services deployed on the network to ensure their accessibility and availability, and dynamically collects information on the actual execution of the services to obtain all attributes related to the network environment, service-specific vulnerabilities on the server side, and application Data such as vulnerabilities on the terminal are the same as those of traditional applic...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses an information system service security evaluation method, which belongs to the field of information system service security evaluation, and comprises the following steps of: acquiring security data of an information system service in an execution process by adopting data acquisition equipment; acquiring the preference of the user to the information system service security data; extracting security data to establish a decision matrix, and calculating the weight of each security assessment attribute according to an information entropy method; and calculating a security value L of the corresponding information service according to the weight of the security evaluation attribute. The method can accurately reflect the actual security state of the information system service in the operation process.

Description

technical field [0001] The invention relates to an information system service safety evaluation method, which belongs to the field of information system service safety evaluation. Background technique [0002] With the rapid development of services, the security threats they face are increasing day by day. Unknown vulnerabilities caused by application features are also increasing. It is urgent to give a clearer definition of its security degree. Information system security covers a lot of content, mainly including user authentication, authorization, transaction audit, service availability, confidentiality and integrity of exchanged messages, non-repudiation of requests or messages, etc. At present, most of the foreign researches on information system service security issues focus on formulating information system service security norms and the realization of corresponding norms. Most of the domestic research on system security focuses on the use of various security protoc...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F21/57
CPCG06F21/577G06F2221/034
Inventor 葛崇慧管诗骈谢林枫尹飞祝永晋王松云陈辉厉文捷曹卫青王江辉马吉科戴炀张鸿鸣查满霞
Owner JIANGSU FRONTIER ELECTRIC TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products