Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data leakage protection method based on risk management, and integrated system

A technology of data leakage prevention and risk management, which is applied in the field of risk management-based data leakage prevention methods and integrated systems, and can solve problems such as potential safety hazards, increased labor costs, and low work efficiency

Inactive Publication Date: 2020-06-02
上海太美星云数字科技有限公司
View PDF5 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

It can be seen that the data inventory 101 and 201 in the two systems are completely repeated, and the data classification and grading modules 202 and 203 are completed manually, which will inevitably greatly increase the labor cost and cause the work efficiency of the two systems to be quite low. And there will be various security risks

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data leakage protection method based on risk management, and integrated system
  • Data leakage protection method based on risk management, and integrated system
  • Data leakage protection method based on risk management, and integrated system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0046] In order to more clearly illustrate the technical solutions of the embodiments of the present application, the following briefly introduces the drawings that need to be used in the description of the embodiments. Obviously, the accompanying drawings in the following description are only some examples or embodiments of the present application, and those skilled in the art can also apply the present application to other similar scenarios. Unless otherwise apparent from context or otherwise indicated, like reference numerals in the figures represent like structures or operations.

[0047] As indicated in this application and claims, the terms "a", "an", "an" and / or "the" do not refer to the singular and may include the plural unless the context clearly indicates an exception. Generally speaking, the terms "comprising" and "comprising" only suggest the inclusion of clearly identified steps and elements, and these steps and elements do not constitute an exclusive list, and ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a data leakage protection method based on risk management, and an integrated system. The method is applied to a risk management system and a data leakage protection system, asset inventory data, risk identification data and risk assessment data are obtained through the risk management system, and the risk assessment data comprise quantified asset value, risk occurrence possibility and influence degree generated after risk occurrence; obtaining a risk value according to risk assessment; importing the asset inventory data, the risk identification data and the risk evaluation data into a data leakage protection system; performing adaptation according to the asset value and the risk influence degree to obtain an adaptation result including criticality and sensitivity, and performing grading according to the adaptation result to obtain a grading result including confidential data, secret data, internal data and external data; setting a response strategy for the classification in the asset inventory data according to the grading result; and importing the grading result and the response strategy into the risk management system by the data leakage protection system.According to the method, the efficiency and the risk management and control capability are improved.

Description

technical field [0001] The present invention mainly relates to a data leakage protection method, in particular to a risk management-based data leakage protection method and an integrated system. Background technique [0002] Article 10 of the "Law of the People's Republic of China on the Protection of State Secrets" stipulates that the classification of state secrets is divided into four levels: top secret, top secret, secret and non-secret. All information above the Unclassified level is considered sensitive data. NGOs rarely need to classify data based on potential harm to national security. However, management will be concerned about potential damage to the organization, which considers not just the sensitivity of the data, but also the criticality of the data. According to the sensitivity and criticality of data, general non-governmental organizations divide the classification into confidential, secret, internal and external. [0003] At present, it is more common to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q10/06G06K9/62G06F21/60
CPCG06Q10/0635G06F21/60G06F18/24
Inventor 吴林华黄玉飞
Owner 上海太美星云数字科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products