CN104766166B - A kind of information system security compliance inspection method towards hierarchical protection - Google Patents

A kind of information system security compliance inspection method towards hierarchical protection Download PDF

Info

Publication number
CN104766166B
CN104766166B CN201510141097.2A CN201510141097A CN104766166B CN 104766166 B CN104766166 B CN 104766166B CN 201510141097 A CN201510141097 A CN 201510141097A CN 104766166 B CN104766166 B CN 104766166B
Authority
CN
China
Prior art keywords
inspection
check
hierarchical protection
result
tool
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510141097.2A
Other languages
Chinese (zh)
Other versions
CN104766166A (en
Inventor
黄进
范渊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Dbappsecurity Technology Co Ltd
Original Assignee
DBAPPSecurity Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by DBAPPSecurity Co Ltd filed Critical DBAPPSecurity Co Ltd
Priority to CN201510141097.2A priority Critical patent/CN104766166B/en
Publication of CN104766166A publication Critical patent/CN104766166A/en
Application granted granted Critical
Publication of CN104766166B publication Critical patent/CN104766166B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Abstract

The present invention relates to information security hierarchical protection fields, it is desirable to provide a kind of information system security compliance inspection method towards hierarchical protection.The information system security compliance inspection method of this kind towards hierarchical protection includes step:Index for examination library, definition check task or inspection program are established, check object is scanned, inspection result is imported, scanning result is decrypted, scanning result coding is decoded, scanning result is judged, is scored judgement result, generates the report of hierarchical protection compliance.The invention enables the objective, specification of information system security class protection check work, just, information security hierarchical protection can be greatly reduced and check work difficulty, complexity and information security hierarchical protection is greatly improved checking working efficiency.

Description

A kind of information system security compliance inspection method towards hierarchical protection
Technical field
The present invention relates to information security hierarchical protection field, more particularly to a kind of information system towards hierarchical protection is pacified Full compliance inspection method.
Background technology
Information security hierarchical protection is a kind of work protected respectively according to importance rate to information and information carrier Make.Information security hierarchical protection assessment work is grade test and appraisal mechanism foundation national information protection based on security rank system regulations, is pressed According to related management regulation and technical standard, inspection and evaluation is carried out to the non-state secret information system security class conservation status that is related to Activity.The information system range that hierarchical protection assessment work is related to is wide, and sensibility is strong.
At present, public security organ still tests and assesses mechanism during information system security class assessment, lacks science Specification, objective efficient check-up tool.The technical capability of test and appraisal personnel and horizontal influence inspection and evaluating result, it is difficult to protect Demonstrate,prove the objective, just and safe of grade test and appraisal.
To sum up, hierarchical protection test and appraisal in the prior art are substantially using semi-artificial, half tool method.It is and entire Assessment process, test and appraisal personnel need to take a substantial amount of time, different tools are run multiple times, is manually entered order, matches step by step It puts environment to test and assess, data of testing and assessing and result record need manual confirmation.Evaluating result is influenced by the technical ability of test and appraisal personnel, is grasped It is lack of standardization to make process, efficiency is low, lacks in-depth analysis and excavation to data.
Invention content
It is a primary object of the present invention to overcome deficiency of the prior art, one kind is provided, knowledge is checked by hierarchical protection Library by check-up result and Standard andRegulation binding analysis, can realize that the check-up of profession, comprehensive safe interview are instructed Information system security compliance inspection method.In order to solve the above technical problems, the solution of the present invention is:
A kind of information system security compliance inspection method towards hierarchical protection is provided, for being examined to information system It looks into and judges, the information system security compliance inspection method towards hierarchical protection utilizes hierarchical protection inspection management system System carries out information system centralized intelligence association and closes rule to judge, specifically includes following step:
(1) Index for examination library is established:According to GB/T 22239-2008 standards, in hierarchical protection inspection management system, press Hierarchical protection Index for examination is established in level subdivision, and Index for examination and class of security protection are corresponded composition Index for examination library;
The Index for examination includes checking control point, check item, key check points;
(2) definition check task or inspection program:Task is checked to hierarchical protection inspection management system typing, checks task Including inspection unit information, class of security protection;
(3) check object is scanned:According to the class of security protection for checking task typing, Index for examination library pair is selected The Index for examination answered, by way of remote scanning or locally scanning, check-up tool that selected technology checking tool is concentrated Automatically scanning is carried out to information system to be checked, generates scanning result;
Coded treatment, generation inspection result coding carry out scanning result, then inspection result is compiled according to the coding table of comparisons Code is encrypted, and obtains encrypted scanning result;
The coding table of comparisons is that the requirement in GB/T 22239-2008 standards is subdivided into tool inspection control by level Point, tool key check points, tool inspection record simultaneously encode it, the unique encodings table of comparisons formed;
(4) inspection result is imported:By encrypted scanning result, hierarchical protection inspection management system is imported;
(5) scanning result is decrypted:The scanning result after importing is decrypted in hierarchical protection inspection management system, Obtain scanning result coding;
(6) scanning result coding is decoded:Hierarchical protection inspection manages system according to the coding table of comparisons, to step (5) the scanning result coding obtained in is decoded, and restores scanning result;
(7) scanning result is judged:Hierarchical protection inspection manages Index for examination of the system corresponding to by inspection task, Scanning result with reduction obtains in step (6), is associated processing and obtains corresponding inspection record list;In in knowledge base Knowledge, model and the rule put, for each check item in inspection record list, by the check item in scanning result, with Several key check points weights and incidence relation in knowledge base carry out corresponding comparison, and the check item judged in scanning result is It is no to meet hierarchical protection requirement, and judged to meet, do not meet or do not apply to as a result, judging that result is divided into;
Information system security is packaged in the knowledge base and checks that experience, expertise and analysis model are implemented in work, is used In the foundation judged as information system security class;
(8) it scores judgement result:The judgement result of each check item obtained in step (7) is converged Always, and according to the corresponding several check item weights of knowledge base and incidence relation, comprehensive score is carried out to the judgement result summarized;
(9) generation hierarchical protection compliance report:Using each check item judgement obtained in step (7) as a result, with And the comprehensive score obtained in step (8), generate the hierarchical protection compliance report of the IT assets of the required inspection.
In the present invention, the check-up tool is used to collect configuration and the vulnerability data of information system, different Information system to be checked is corresponding with different check-up tools, and all check-up tools form entire check-up tool Collection.
In the present invention, the check-up tool set uses USB flash disk tool and online tool;Wherein, USB flash disk tool is that have The check-up tool of self anti-virus defencive function, and it is stored in USB flash disk tool using the scanning result that USB flash disk tool scans generate In;Online tool is integrated in the check-up tool in hierarchical protection inspection management system, and utilizes online tool scanning life Into scanning result be stored in hierarchical protection inspection management system configuration catalogue in.
In the present invention, in the step (4), when inspection result is imported hierarchical protection inspection management system, grade is protected Shield checks that management system can support a key to import, and can read the scanning result of check-up tool automatically.
In the present invention, in the step (3) and step (5), encryption, decryption are real using domestic commercial cipher algorithm It is existing.
The present invention realization principle be:
1st, by technical tool collection scan target device, obtain target device safety as a result, and result is encoded with And encrypting storing;
2nd, task is created, task is created in hierarchical protection inspection management system:Task type is selected, including important information System, special examination, relevant industrial department, unit of putting on record, website check, then match inspection from index storehouse according to task type Look into item;
3rd, result imports, and obtained scanning result is imported after hierarchical protection inspection management system and is decrypted, solves automatically Code processing;
4th, result judgement, hierarchical protection inspection manage system and are obtained according to the task correspondence proving index built and reduction in 3 Scanning result, be associated processing and obtain corresponding inspection record unitary call knowledge base and pass through parameter SAG grades, tool inspection Control point coding, device class number, unit type number, tool key check points coding, tool key check points record number obtain To judgement result (key check points number, judgement result number);
4th, due to there is no unit to check that knowledge content and unit check expected results in index storehouse, so then calling knowledge Library is numbered by Parameter units key check points, mission number obtains unit and checks that knowledge content and unit check expected results;
5th, target device is calculated according to obtained judgement call by result knowledge base and checks score;
6th, generation report protects audit report, management questionnaire audit report, the report of tool inspection record including waiting.
Compared with prior art, the beneficial effects of the invention are as follows:
1st, it is so that the objective, specification of information system security class protection check work, just;
2nd, it greatly reduces information security hierarchical protection and checks work difficulty, complexity;
3rd, information security hierarchical protection is greatly improved and checks working efficiency.
Description of the drawings
Fig. 1 is relevant industrial department and bit indicator database table structure of putting on record.
Fig. 2 is important information system index database table structure.
Fig. 3 is special examination index database table structure.
Fig. 4 is etc. to protect knowledge base overall structure.
Fig. 5 is the information system security compliance checking tool inspection coding rule towards hierarchical protection.
Fig. 6 is the information system security compliance inspection working-flow figure towards hierarchical protection.
Specific embodiment
Firstly the need of explanation, the present invention relates to database technology, network communication technology and data encryption technologys, are Computer technology is in a kind of application of field of information security technology.During the realization of the present invention, multiple softwares can be related to The application of function module.It is applicant's understanding that such as reading over application documents, the realization principle of the accurate understanding present invention and invention After purpose, in the case where combining existing known technology, those skilled in the art can use the software of its grasp to compile completely Journey technical ability realizes the present invention.Category this scope that all the present patent application files refer to, applicant will not enumerate.
The present invention is described in further detail with specific embodiment below in conjunction with the accompanying drawings:
As shown in fig. 6, a kind of information system security compliance inspection method towards hierarchical protection, including check-up work Tool collection and hierarchical protection inspection manage system.Check-up tool set is divided into USB flash disk tool and online tool.
Online tool is integrated in hierarchical protection inspection management system.Its scanning result, which is stored in etc., protects protection check pipe In system configuration catalogue.
USB flash disk tool is the various combination of check-up tool (in addition to online tool).It has the protection of self anti-virus Function.During inspection, USB flash disk tool is inserted into check object USB port, scanning result is stored in USB flash disk tool.
Hierarchical protection inspection management system supports a key to import online tool and USB flash disk tool inspection result.
First, check-up tool set specifically includes following step for collecting IT Asset Allocations and vulnerability data:
(1) simultaneously finishing technique checking tool collection is collected:GB/T 22239-2008《Information system security class protection is basic It is required that》From physical security, network security, Host Security, application be safe, data safety, safety management system, safety management machine Structure, personnel safety management, system Construction management and system operation management etc. are to the specific safety of different brackets information system Protective capacities, which proposes, to be distinctly claimed.According to standard, information system to be checked can be divided into physics peace from the safe level of hierarchical protection Entirely, network security, the network equipment, Host Security, application are safe.According to the difference of information system to be checked, network security includes: The network architecture, the network equipment, safety equipment, Host Security include:Host, database, application it is safe including:Application system.For Safety inspection requirement is completed, corresponding check-up tool is collected out for information system type to be checked.
(2) check object is scanned:By way of remote scanning or locally scanning, according to check object not Together, the check-up tool obtained in optional step (1) carries out automatically scanning, generates scanning result.
(3) scanning result is encoded:According to check item coding schedule and inspection result coding schedule to sweeping in step (2) It retouches result and carries out coded treatment generation inspection result coding.
The check item coding schedule and inspection result coding schedule are by level by the requirement in GB/T 22239-2008 standards It is subdivided into tool to check control point, tool key check points, tool inspection record and encode it, the unique encodings control formed Table.
(4) inspection result coding is encrypted:Using domestic commercial cipher algorithm, the scanning to being generated in step (3) As a result coding is encrypted;
2nd, hierarchical protection inspection management system is used for the IT Asset Allocations that check-up tool is collected and vulnerability data It carries out centralized intelligence association and closes the Important Platform that rule are judged, specifically include following step:
(1) Index for examination library is established:Requirement in GB/T 22239-2008 standards is subdivided into hierarchical protection inspection by level Look into index:It checks control point, check item, key check points and is encoded and (be consistent with encoding the table of comparisons described in one), it will Index for examination and class of security protection correspond composition Index for examination library.
(2) definition check task or inspection program:Typing imports inspection task or inspection program information:Inspection unit is believed Breath, class of security protection (waiting to evaluate).Inspection task is referred to according to Index for examination library by selected class of security protection correspondence proving Mark.
(3) inspection result is imported:By encrypted scanning result in check-up tool set step (4), import grade and protect Shield checks management system;
(4) scanning result is decrypted:The scanning result after importing is decrypted in hierarchical protection inspection management system, Obtain scanning result coding;
(5) scanning result coding is decoded:Hierarchical protection inspection manages system according to the coding table of comparisons, to step (4) the scanning result coding obtained in is decoded, and restores scanning result;
(6) scanning result is judged:Hierarchical protection inspection management system according to the task correspondence proving index built and The scanning result that reduction obtains in step (5), is associated processing and obtains corresponding inspection record list:According to built in knowledge base Knowledge, model and rule, for the check item in each inspection record list, by the check item in scanning result, with knowledge Several key check points weights and incidence relation in library carry out corresponding comparison, and whether the check item judged in scanning result accords with Hierarchical protection requirement is closed, and is judged to meet, do not meet or do not apply to as a result, judging that result is divided into;
Information system security is packaged in the knowledge base and checks that experience, expertise and analysis model are implemented in work, is used In the foundation judged as information system security class;
(7) it scores judgement result:The judgement result of each check item obtained in step (6) is converged Always, and according to the corresponding several check item weights of knowledge base and incidence relation, comprehensive score is carried out to the judgement result summarized;
(8) generation hierarchical protection compliance report:Using each check item judgement obtained in step (6) as a result, with And the comprehensive score obtained in step (7), generate the hierarchical protection compliance report of the IT assets of the required inspection;
Finally it should be noted that listed above is only specific embodiments of the present invention.It is clear that the invention is not restricted to Above example can also have many variations.Those of ordinary skill in the art can directly lead from present disclosure All deformations for going out or associating, are considered as protection scope of the present invention.

Claims (5)

1. a kind of information system security compliance inspection method towards hierarchical protection, for being checked information system and being commented Sentence, which is characterized in that the information system security compliance inspection method towards hierarchical protection utilizes hierarchical protection inspection pipe Reason system carries out information system centralized intelligence association and closes rule to judge, specifically includes following step:
(1) Index for examination library is established:According to GB/T 22239-2008 standards, in hierarchical protection inspection management system, by level Hierarchical protection Index for examination is established in subdivision, and Index for examination and class of security protection are corresponded composition Index for examination library;
The Index for examination includes checking control point, check item, key check points;
(2) definition check task or inspection program:Task is checked to hierarchical protection inspection management system typing, and inspection task includes Inspection unit information, class of security protection;
(3) check object is scanned:According to the class of security protection for checking task typing, select Index for examination library corresponding Index for examination, by way of remote scanning or locally scanning, the check-up tool that selected technology checking tool is concentrated is treated It checks that information system carries out automatically scanning, generates scanning result;
According to coding the table of comparisons to scanning result carry out coded treatment, generation inspection result coding, then inspection result is encoded into Row encryption, obtains encrypted scanning result;
It is described coding the table of comparisons be by the requirement in GB/T 22239-2008 standards by level be subdivided into tool check control point, Tool key check points, tool inspection record simultaneously encode it, the unique encodings table of comparisons formed;
(4) inspection result is imported:By encrypted scanning result, hierarchical protection inspection management system is imported;
(5) scanning result is decrypted:The scanning result after importing is decrypted in hierarchical protection inspection management system, obtains Scanning result encodes;
(6) scanning result coding is decoded:Hierarchical protection inspection manages system according to the coding table of comparisons, in step (5) Obtained scanning result coding is decoded, and restores scanning result;
(7) scanning result is judged:Hierarchical protection inspection manages Index for examination of the system corresponding to by inspection task, with step Suddenly the scanning result that reduction obtains in (6), is associated processing and obtains corresponding inspection record list;Using built-in in knowledge base Knowledge, model and rule, for each check item in inspection record list, by the check item in scanning result, with knowledge Several key check points weights and incidence relation in library carry out corresponding comparison, and whether the check item judged in scanning result accords with Hierarchical protection requirement is closed, and is judged to meet, do not meet or do not apply to as a result, judging that result is divided into;
Information system security is packaged in the knowledge base and checks that experience, expertise and analysis model are implemented in work, for making The foundation judged for information system security class;
(8) it scores judgement result:The judgement result of each check item obtained in step (7) is summarized, and According to the corresponding several check item weights of knowledge base and incidence relation, comprehensive score is carried out to the judgement result summarized;
(9) generation hierarchical protection compliance report:Using each check item judgement obtained in step (7) as a result, and step Suddenly the comprehensive score obtained in (8) generates the hierarchical protection compliance report of the IT assets of the required inspection.
2. a kind of information system security compliance inspection method towards hierarchical protection according to claim 1, feature It is, the check-up tool is used to collect configuration and the vulnerability data of information system, different information systems to be checked Different check-up tools is corresponding with, all check-up tools form entire check-up tool set.
3. a kind of information system security compliance inspection method towards hierarchical protection according to claim 2, feature It is, the check-up tool set uses USB flash disk tool and online tool;Wherein, USB flash disk tool is that have the protection of self anti-virus The check-up tool of function, and be stored in USB flash disk tool using the scanning result that USB flash disk tool scans generate;Online tool is The check-up tool being integrated in hierarchical protection inspection management system, and protected using the scanning result of online tool scanning generation In catalogue there are hierarchical protection inspection management system configuration.
4. a kind of information system security compliance inspection method towards hierarchical protection according to claim 2, feature It is, in the step (4), when inspection result is imported hierarchical protection inspection management system, hierarchical protection inspection management system A key can be supported to import, the scanning result of check-up tool can be read automatically.
5. a kind of information system security compliance inspection method towards hierarchical protection according to claim 1, feature It is, in the step (3) and step (5), encryption, decryption are realized using domestic commercial cipher algorithm.
CN201510141097.2A 2015-03-27 2015-03-27 A kind of information system security compliance inspection method towards hierarchical protection Active CN104766166B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510141097.2A CN104766166B (en) 2015-03-27 2015-03-27 A kind of information system security compliance inspection method towards hierarchical protection

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510141097.2A CN104766166B (en) 2015-03-27 2015-03-27 A kind of information system security compliance inspection method towards hierarchical protection

Publications (2)

Publication Number Publication Date
CN104766166A CN104766166A (en) 2015-07-08
CN104766166B true CN104766166B (en) 2018-06-19

Family

ID=53647980

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510141097.2A Active CN104766166B (en) 2015-03-27 2015-03-27 A kind of information system security compliance inspection method towards hierarchical protection

Country Status (1)

Country Link
CN (1) CN104766166B (en)

Families Citing this family (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108345797B (en) * 2017-08-03 2019-03-12 清华大学无锡应用技术研究院 Detection method, detection device and the detection system of processor
US10642981B2 (en) 2017-02-20 2020-05-05 Wuxi Research Institute Of Applied Technologies Tsinghua University Checking method, checking device and checking system for processor
CN107563937A (en) * 2017-09-04 2018-01-09 杭州安恒信息技术有限公司 Hierarchical protection based on big data closes safely rule inspection method and system
CN108600260A (en) * 2018-05-09 2018-09-28 国家计算机网络与信息安全管理中心 A kind of industry Internet of Things security configuration check method
CN109102407A (en) * 2018-08-10 2018-12-28 中募网络科技(北京)股份有限公司 A kind of Si Mu company closes rule and checks and monitoring method and system
CN108989336B (en) * 2018-08-19 2021-09-28 杭州安恒信息技术股份有限公司 Emergency disposal system and emergency disposal method for network security event
CN109450619B (en) * 2018-10-07 2022-08-19 杭州安恒信息技术股份有限公司 Two-dimensional code safety protection method and system
CN109359872A (en) * 2018-10-23 2019-02-19 北京计算机技术及应用研究所 The information system appraisal procedure that index is customized and inspection method is expansible
CN110443038A (en) * 2019-08-02 2019-11-12 贵州电网有限责任公司 A kind of portable ciphering type network security compliance automatic inspection device of desktop terminal
CN111047309B (en) * 2019-12-18 2022-03-11 北京三快在线科技有限公司 Security compliance detection method and device, computer equipment and storage medium
CN111191897B (en) * 2019-12-23 2023-06-30 浙江传媒学院 Business process online compliance prediction method and system based on bidirectional GRU neural network
CN112132374A (en) * 2020-03-25 2020-12-25 长扬科技(北京)有限公司 Compliance scoring method and device for industrial control host
CN113065793A (en) * 2021-04-16 2021-07-02 上海安畅网络科技股份有限公司 Evaluation method and device, electronic equipment and readable storage medium
CN115907519A (en) * 2022-11-03 2023-04-04 北京卓识网安技术股份有限公司 Information security compliance detection method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0988591A1 (en) * 1997-06-09 2000-03-29 Intertrust, Incorporated Obfuscation techniques for enhancing software security
CN1878113A (en) * 2006-07-21 2006-12-13 北京理工大学 Effective realization method for MANET network safety grade division
CN102833251A (en) * 2012-08-28 2012-12-19 瑞达信息安全产业股份有限公司 Intra-class interconnection security policy management method oriented to classified protection system
CN104009869A (en) * 2014-05-15 2014-08-27 华南理工大学 Power secondary system information security level protection online compliance detection method
CN104376265A (en) * 2014-10-30 2015-02-25 广东电子工业研究院有限公司 Comprehensive grading method used for security grade protection of computer information system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP0988591A1 (en) * 1997-06-09 2000-03-29 Intertrust, Incorporated Obfuscation techniques for enhancing software security
CN1878113A (en) * 2006-07-21 2006-12-13 北京理工大学 Effective realization method for MANET network safety grade division
CN102833251A (en) * 2012-08-28 2012-12-19 瑞达信息安全产业股份有限公司 Intra-class interconnection security policy management method oriented to classified protection system
CN104009869A (en) * 2014-05-15 2014-08-27 华南理工大学 Power secondary system information security level protection online compliance detection method
CN104376265A (en) * 2014-10-30 2015-02-25 广东电子工业研究院有限公司 Comprehensive grading method used for security grade protection of computer information system

Also Published As

Publication number Publication date
CN104766166A (en) 2015-07-08

Similar Documents

Publication Publication Date Title
CN104766166B (en) A kind of information system security compliance inspection method towards hierarchical protection
US20100115601A1 (en) Method and an apparatus for assessing a security of a component and a corresponding system
CN108009711A (en) Methods of risk assessment, device, computer equipment and readable storage medium storing program for executing
CN108108624A (en) Information security method for evaluating quality and device based on products & services
Sion et al. Privacy risk assessment for data subject-aware threat modeling
Xiao-yan et al. An information security maturity evaluation mode
CN116861446A (en) Data security assessment method and system
Lydell et al. OPDE—The international pipe failure data exchange project
Naderi et al. Autonomous construction safety incentive mechanism using blockchain-enabled tokens and vision-based techniques
KR101008148B1 (en) Method for operating information security accomplishment indexes dependent on the introduction of information security management system
CN110457009B (en) Method for realizing software security requirement recommendation model based on data analysis
Lobanok et al. Safety-driven approach for security audit of I&C systems of nuclear power plants
RU135435U1 (en) AUTOMATED WORKPLACE FOR MONITORING EFFECTIVENESS OF PERSONNEL WORK AND PREVENTION OF INSIDER ATTACKS
Kim et al. A study on the impact analysis of security flaws between security controls: An empirical analysis of K-ISMS using case-control study
Putri et al. Information Technology Risk Management Analysis Using ISO: 31000 at PT. XYZ
Fadlika et al. Employee Information Security Awareness in the Power Generation Sector of PT ABC
CN107248061A (en) A kind of intelligent fire detection method and its system
Villarrubia et al. Quality of password management policy
Nusa Effectiveness Risk Assessment for Quality of Accounting Information System
Kaminski The law of AI
Theiring The Financial Risk of a Deficiency of Cybersecurity in Industrial Process Controlled Facilities; A Qualitative Multiple Case Study
Nedea The role and prospects of the internal audit in improving management of public institutions
Craig et al. Metrics for the national SCADA test bed program
Yang Value of Safety
Chakraborty et al. Risk-based safety performance indicators for nuclear power plants

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP01 Change in the name or title of a patent holder
CP01 Change in the name or title of a patent holder

Address after: 310051 15-storey Zhongcai Building, Tonghe Road, Binjiang District, Hangzhou City, Zhejiang Province

Patentee after: Hangzhou Annan information technology Limited by Share Ltd

Address before: 310051 15-storey Zhongcai Building, Tonghe Road, Binjiang District, Hangzhou City, Zhejiang Province

Patentee before: Dbappsecurity Co.,ltd.