Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Data security auditing method and device, electronic equipment and storage medium

A data security and data technology, applied in the field of data security, can solve the problems such as the inability to trace the source of the discovered problems, the lack of analysis log dimensions, and the time-consuming and labor-intensive problems. Effect

Pending Publication Date: 2022-05-06
HANGXIAO STEEL STRUCTURE
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the existing technical solutions, the process of data security audit is mainly to conduct audits based on the business behaviors that have occurred, and generate corresponding audit strategies to screen out problem points. The analysis of these audit result data is mainly processed by sampling manual audits. As a result, the processing efficiency is not fast and the analysis log has fewer dimensions, and the overall analysis is not carried out, resulting in untimely or difficult problem discovery, time-consuming and labor-intensive, and the found problems cannot be traced back, making it difficult to confirm the audit problem and locate the responsible person. Meet the needs of rapid business development under the new situation

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data security auditing method and device, electronic equipment and storage medium
  • Data security auditing method and device, electronic equipment and storage medium
  • Data security auditing method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0040] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described below in conjunction with the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, not to limit the present application. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.

[0041] Those skilled in the art can understand that, unless otherwise defined, all terms (including technical terms and scientific terms) used herein have the same meanings as commonly understood by those of ordinary skill in the art to which this application belongs. It should also be understood that terms, such as those defined in commonly used dictionaries, should be understood to have m...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a data security auditing method and device, electronic equipment and a storage medium. The method comprises the following steps: classifying data of a global log to obtain each abnormal operation step in each business behavior; according to a preset corresponding relation, corresponding data labels are marked on all the abnormal operation steps; obtaining the total score of the corresponding business behavior according to the data label of each abnormal operation step included in each business behavior; and determining a corresponding risk coefficient according to the total score of each business behavior, and taking the risk coefficient as an audit result. According to the data security auditing method, global automatic auditing of the data can be achieved, a manual auditing mode is not needed, the processing efficiency is high, the data security auditing result can be rapidly obtained, the data security problem can be found in time, problem tracing is facilitated, the auditing problem and the person in charge can be accurately determined, the labor cost is saved, and the data security auditing efficiency is improved. And the requirements of various business development in a new situation can be completely met.

Description

technical field [0001] The present application relates to the technical field of data security, in particular to a data security audit method, device, electronic equipment and storage medium. Background technique [0002] With the continuous development of Internet information inquiry, acceptance services and e-commerce business, there are more and more demands for data openness and use in these fields, and the ensuing data security problems are also becoming more and more serious. In the existing technical solutions, the process of data security audit is mainly to conduct audits based on the business behaviors that have occurred, and generate corresponding audit strategies to screen out problem points. The analysis of these audit result data is mainly processed by sampling manual audits. As a result, the processing efficiency is not fast and the analysis log has fewer dimensions, and the overall analysis is not carried out, resulting in untimely or difficult problem discove...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/215G06Q10/06
CPCG06F16/215G06Q10/0635G06Q10/06393
Inventor 李震宇王振众张哲王泽群吴杨所依
Owner HANGXIAO STEEL STRUCTURE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products