Vulnerability assessment method and device, computing equipment and storage medium

A computing device and vulnerability technology, applied in computing, computer security devices, instruments, etc., can solve the problem of incomplete vulnerability assessment and achieve high accuracy

Pending Publication Date: 2022-03-29
HUAWEI CLOUD COMPUTING TECH CO LTD
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] Since software is not only provided by the provider of the operating system, it may also be provided by other providers. However, there is no vulnerability assessment method for software provided by other providers in the related art, so it may cause vulnerability assessment. Incomplete

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Vulnerability assessment method and device, computing equipment and storage medium
  • Vulnerability assessment method and device, computing equipment and storage medium
  • Vulnerability assessment method and device, computing equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0039] In order to make the purpose, technical solution and advantages of the present application clearer, the implementation manners of the present application will be further described in detail below in conjunction with the accompanying drawings.

[0040]In order to facilitate the understanding of the embodiments of the present application, the concepts of the nouns involved are firstly introduced below:

[0041] 1. Vulnerability assessment (va) is the process of identifying, quantifying, and prioritizing vulnerabilities in an operating system.

[0042] 2. A security advisory (sa) is security information regularly released by an operating system provider or a software provider. Security bulletins include but are not limited to vulnerability names, vulnerability types, affected situations, and vulnerability repair methods.

[0043] In order to discover vulnerabilities in the operating system in a timely manner, during the use of the operating system, vulnerability assessmen...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a vulnerability assessment method and device, computing equipment and a storage medium, and belongs to the technical field of vulnerability assessment. The method comprises the steps that identification and source information of at least one piece of software installed on an evaluated operating system are obtained, target software is determined to be from a target software source according to the source information of the target software in the at least one piece of software, and the target software source is different from a provider of the operating system. And then, according to the identifier of the target software and the security announcement rule of the target software source, judging whether the target software is influenced by vulnerabilities in the security announcement rule or not. By adopting the method and the device, vulnerability assessment can be comprehensively carried out.

Description

technical field [0001] The present application relates to the technical field of vulnerability assessment, in particular to a vulnerability assessment method, device, computing device and storage medium. Background technique [0002] In order to discover vulnerabilities in the operating system in a timely manner, during the use of the operating system, the vulnerability assessment tool can log in to the operating system in time or deploy an agent (Agent) on the operating system to determine whether the operating system is affected by the vulnerability, and output Vulnerability assessment report. [0003] In the related art, the vulnerability assessment tool obtains the identification of the software installed on the operating system, and the identification includes the name and version number of the software. The vulnerability assessment tool obtains the security bulletins regularly issued by the operating system or software provider. The security bulletins include but are ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/57G06F21/12
CPCG06F21/577G06F21/12G06F21/57
Inventor 艾淼詹应根
Owner HUAWEI CLOUD COMPUTING TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products