Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Information Security Risk Evaluation System

A risk assessment and information security technology, applied in the field of information security, can solve problems such as inability to accurately analyze and calculate business network security risks, and achieve the effects of improving security protection performance, reducing evaluation difficulty, and improving accuracy

Active Publication Date: 2021-07-27
国家信息中心
View PDF13 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide an information security risk evaluation system for the defects of the prior art, which is used to solve the problem that the prior art cannot accurately analyze and calculate the business network security risk, and cannot target different levels of business Network security risks, the problem of accurately taking different levels of risk protection measures

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Information Security Risk Evaluation System
  • Information Security Risk Evaluation System
  • Information Security Risk Evaluation System

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0038] figure 1 It is a schematic structural diagram of a circuit module of Embodiment 1 of the information security risk assessment system provided by the present invention. like figure 1 As shown, the system includes: a service unavailable risk evaluation criterion generation module 10, a data security risk evaluation criterion generation module 20, a service unavailable risk analysis calculation module 30, a data security risk analysis module 40, a system risk analysis calculation module 50 and information System security module 60; wherein, the service unavailable risk evaluation criterion generation module 10 is used to generate service unavailable risk evaluation criterion data; the data security risk assessment criterion generation module 20 is used to generate data security risk assessment criterion data; the service is unavailable The risk analysis calculation module 30 is connected with the service unavailable risk evaluation criterion generation module 10, and is u...

Embodiment 2

[0067] image 3 It is a schematic structural diagram of a circuit module of Embodiment 2 of the information security risk assessment system provided by the present invention. Figure 4 It is a schematic structural diagram of a circuit module of a function-impaired network security threat identification module in Embodiment 2 of the information security risk assessment system provided by the present invention. like image 3 and Figure 4 As shown, the difference between the information security risk assessment system in Embodiment 2 and the information security risk assessment system in Embodiment 1 is that: the information security risk assessment system in Embodiment 2 also includes: a function-impaired network security threat identification module 70; wherein, The functional impairment network security threat identification module 70 includes: a threat behavior judgment definition module 701 , a threat originator identification module 702 , a threat capability identificati...

example 1

[0084] Example 1: If the data stored in the threat capability data subunit (that is, the threat capability) is the capability of the operator, it can be divided into five levels: the first level is for daily application users; the second level is for terminal The person with operation and configuration authority; the third level is the technician with software and application system configuration operation authority; the fourth level is the technician with equipment or software asset administrator authority; the fifth level is the access to the computer room for physical equipment and environmental control Technicians with direct access to equipment.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention provides an information security risk assessment system, including: a service unavailability risk assessment criterion generation module, a data security risk assessment criterion generation module, a service unavailability risk analysis and calculation module, a data security risk analysis module, and a system risk analysis and calculation module and information system security modules. The information security risk assessment system provided by the present invention can accurately analyze and calculate the business network security risk, so that the information security risk assessment system provided by the present invention can accurately adopt different levels of risk protection for different levels of business network security risks measures to improve its security performance.

Description

technical field [0001] The present invention relates to the technical field of information security, in particular to an information security risk evaluation system. Background technique [0002] In recent years, my country's cloud computing, big data, Internet of Things, industrial Internet, artificial intelligence and other new technologies and applications have developed on a large scale, and network security risks have converged and superimposed and evolved rapidly. The application of Internet technology continues to blur the boundary between the physical world and the virtual world, and its integration, penetration, and driving role in the development of the entire economy and society are becoming more and more obvious. The risks and challenges it brings are also increasing, and cyberspace threats and risks are increasing. [0003] Information security risk assessment is the process of evaluating the security attributes such as confidentiality, integrity and availabilit...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/57G06F21/64H04L29/06G06Q10/06
CPCG06F21/577G06F21/64G06F2221/034G06Q10/0635H04L63/205
Inventor 陈永刚禄凯任金强赵增振刘丰刘龙涛
Owner 国家信息中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products