Threat vulnerability mining method based on information security big data and information security system
An information security and big data technology, applied in the field of big data, can solve problems affecting the effectiveness of security protection and reinforcement, and achieve the effect of improving decision-making accuracy and effectiveness
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0012] The technical solutions in the embodiments of the present application will be clearly and completely described below in conjunction with the drawings in the embodiments of the present application. Obviously, the described embodiments are part of the embodiments of the present application, not all of them. According to the embodiments in the present application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present application.
[0013] Step S101 , searching for traversal threat protection activities and traversal sensitive service request activities of the core subscription service interface in the real-time protection list.
[0014] In an embodiment concept, in the current process of security protection reinforcement, when it is necessary to analyze the threat penetration routing relationship between a specific threat protection activity and a sensitive service request activit...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com