Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Big data analysis device for information security operation and maintenance management

An information security and analysis device technology, applied in the field of information communication, can solve problems such as unpredictable severity, unclear operation identity, and out-of-control operation behavior, so as to achieve scientific and reasonable design, improve safety management, and improve safety.

Pending Publication Date: 2020-11-03
ZHENGZHOU NORMAL UNIV
View PDF0 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Enterprise internal personnel, especially operation and maintenance personnel with higher access rights to the information system, are more likely to have access to the core equipment and sensitive data of the information system than external intruders, and malicious or non-malicious destructive behavior of internal personnel is more likely to cause greater damage destroy
However, due to the imperfection of existing management methods, the ubiquity of account sharing, and the wide application of encryption and graphics protocols, the daily operations of these operation and maintenance managers have unclear operational identities, opaque operational processes, and unknowable operational content. , uncontrollable operation behavior, operation accidents cannot be located and other safety risks
The operation behavior of insiders is almost completely out of control. Once an accident occurs, the severity of the consequences will be unpredictable
Therefore, it is by no means feasible to allow the existence of internal risk

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Big data analysis device for information security operation and maintenance management
  • Big data analysis device for information security operation and maintenance management
  • Big data analysis device for information security operation and maintenance management

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The following examples are for illustrative purposes only and are not intended to limit the scope of the invention.

[0030] refer to Figure 1-5 , a big data analysis device for information security operation and maintenance management, including a box body 1, the box body 1 is connected with a data analysis processing device 10, and the data analysis processing device 10 includes a central data processing module, a database, a data interaction module, an information Security module, developer monitoring module, LED display 4 and input module;

[0031] The central data processing module analyzes the data reported by each module, deeply excavates security risks and potential failures, and reports them to the LED display 4. Its main functions are security risk analysis, correlation, fault location, vulnerability scanning, data mining and real-time monitoring Wait;

[0032] The database is used to store the analyzed data information, and the database is stored in the fo...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a big data analysis device for information security operation and maintenance management, which comprises a box body, the box body is connected with a data analysis processingdevice, and the data analysis processing device comprises a central data processing module, a database, a data interaction module, an information security module, a developer monitoring module, an LEDdisplay screen and an input module. Support blocks are symmetrically welded and fixed to the top end of the box body, sliding grooves are formed in the support blocks, sliding blocks are arranged onthe two sides of the LED display screen and slide in the sliding grooves, the touch induction keyboard is arranged at the top of the box body, the voice input end is arranged on the side face of the box body, and a cable interface is formed in the bottom of the box body. The device has the advantages that information safety and IT service are managed in a unified mode, the information safety serves as the IT service through the system and is brought into an operation and maintenance service workflow to be managed, and scientific monitoring, management, scheduling and assessment of an information system, a person and work are achieved.

Description

technical field [0001] The invention relates to the field of information communication technology, in particular to a big data analysis device for information security operation and maintenance management. Background technique [0002] Safe production has always been the prerequisite for ensuring the orderly development of various tasks, and it is also a veto indicator for evaluating leading cadres at all levels. The network and information security operation and maintenance system is an important part of the safe production work of various enterprises. Ensuring the efficient and stable operation of the network is the basis for all market operations and normal operations of an enterprise. With the construction and improvement of various enterprise information systems, labor productivity has been effectively improved and operating costs have been reduced. Once a security incident, failure, or performance bottleneck occurs in each business system of the enterprise, it cannot...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/30G06F16/26G06F21/45G06F21/60G06F21/64
CPCG06F16/26G06F21/45G06F21/602G06F21/64G06F11/3051
Inventor 张红艳李云帆张玉刘婷都娟
Owner ZHENGZHOU NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products