CN104778414B - A kind of Vulnerability Management system and method - Google Patents

A kind of Vulnerability Management system and method Download PDF

Info

Publication number
CN104778414B
CN104778414B CN201510228115.0A CN201510228115A CN104778414B CN 104778414 B CN104778414 B CN 104778414B CN 201510228115 A CN201510228115 A CN 201510228115A CN 104778414 B CN104778414 B CN 104778414B
Authority
CN
China
Prior art keywords
loophole
vulnerability
module
processing
leak repairing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510228115.0A
Other languages
Chinese (zh)
Other versions
CN104778414A (en
Inventor
刘伟雄
郑东曦
蒋昆池
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
GUANGZHOU WONFONE COMPUTER TECHNOLOGY Co Ltd
Original Assignee
GUANGZHOU WONFONE COMPUTER TECHNOLOGY Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by GUANGZHOU WONFONE COMPUTER TECHNOLOGY Co Ltd filed Critical GUANGZHOU WONFONE COMPUTER TECHNOLOGY Co Ltd
Priority to CN201510228115.0A priority Critical patent/CN104778414B/en
Publication of CN104778414A publication Critical patent/CN104778414A/en
Application granted granted Critical
Publication of CN104778414B publication Critical patent/CN104778414B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of Vulnerability Management system and methods, including vulnerability scanning module, Vulnerability Management module, loophole alarm module, loophole tracks processing module, statistical analysis module and asset equipment management module, pass through vulnerability scanning, loophole alerts, Vulnerability Management, loophole tracking is handled, statistical analysis and asset equipment management are managed control to loophole, all relevant informations of loophole can be recorded in detail through the invention, be conducive to the security risk of tracking and traceability system equipment, and it can effectively assess the safe condition of whole network system, identify the weak link in network, and then it points the direction for the work of the security hardening of network.

Description

A kind of Vulnerability Management system and method
Technical field
The present invention relates to information security of computer network field, more particularly to a kind of Vulnerability Management system and method.
Background technology
Present communications produce loophole discovery and the way to manage of net system equipment, mainly use vulnerability scanners scanning system System equipment simultaneously exports vulnerability scanning report, and safety manager's manual analysis is reported and generates loophole tracking report.Existing loophole Management mode is also in manual analysis, and in the stage of labor management, the efficiency of management and management effect are poor, unsuitable information system The trend and needs of system scale, networking.The traffic issues that Vulnerability Management pattern faces at this stage mainly have following several sides Face:
1, network size increasingly increases, and device type and quantity are on the increase, and leads to that loophole type is various, enormous amount, Vulnerability scanning report needs a large amount of manpowers to carry out analysis and arrangement, and statistical management is extremely difficult, and analysis efficiency is low.
2, lack loophole track record effective in detail, efficiency is reinforced in loophole rectification and working result is difficult to control, it is difficult to The whole loophole present situation for understanding system.There is no a vulnerability information library, loophole repeats but handle reinforcing experience to be difficult to share.
3, loophole is large number of, but is a lack of loophole equipment association analysis tool and crucial loophole alarm, leads to high-risk leakage Hole is difficult to find at the first time.Loophole positioning simultaneously and acquisition of information still take manual type, working efficiency low.
4, current labor management pattern lacks the intuitive display of loophole distribution, and office side is difficult to the entirety in control range of management Safe condition.And tripartite's information of loophole related work is transmitted and uses file transfer mode, loophole tracks list and needs in safety It is transmitted between operation maintenance personnel, third party manufacturer and client, easy tos produce information transmission delay and loss, client is difficult to learn in time System integrally rectifies and improves situation.
Such as mobile communications operator, the operation system that intranet pipe network involves is numerous, equipment is complicated, daily industry It is engaged in various, so must divide moon or carry out in season the vulnerability scanning and repairing treatment of each operation system of whole network, current In big multisystem, after vulnerability scanning equipment generates vulnerability scanning report, just by a large amount of security service personnel, report is carried out Analysis, then drafts the mending option of loophole, worksheet processing processing is then carried out, however, due to the huge and complicated spy of operation system Point, administrative staff are difficult to follow up, the disposition of loophole, and are difficult to accurately assess the health degree and safety of entire webmaster net Situations such as threat.
Invention content
The shortcomings that it is an object of the invention to overcome the prior art and deficiency, provide a kind of Vulnerability Management that work efficiency is high System, the system can record all relevant informations of loophole in detail, be conducive to the peace of tracking and traceability system equipment Full blast danger, and the safe condition of whole network system can be effectively assessed, identify the weak link in network, Jin Erwei The security hardening work of network points the direction.
Another object of the present invention is to provide a kind of management methods realized based on above-mentioned Vulnerability Management system.
The first object of the present invention is achieved through the following technical solutions:A kind of Vulnerability Management system, which is characterized in that including
Vulnerability scanning module for being scanned to the loophole in system, and generates vulnerability scanning report;
Vulnerability Management module carries out loophole pipe for importing vulnerability scanning report by the parsing reported vulnerability scanning Reason, provide loophole processing state automatically update, information displaying and leak repairing reference scheme, the leak repairing reference scheme It is selected from leak repairing scheme base;
Loophole tracks processing module, the leak repairing reference scheme for providing Vulnerability Management module and technical essential hair Give loophole treatment people;For to the displaying of vulnerability scanning progress, loophole distribution, worksheet processing process limited of loophole, loophole place Reason progress is given more sustained attention and is tracked into line trace, and to crucial loophole;
Statistical analysis module, it is right for after present lot loophole is disposed, subregion statistics to be carried out to loophole quantity The truth of front and back multiple batches of loophole before and after the processing compares and analyzes, to the reinforcing rate of loophole and some business system The trend that loophole generates in system is counted, and scoring is calculated to loophole index of correlation, for assessing and judging this operation system Health;
And asset equipment management module, for the analysis to loophole and its being associated property of underlying assets equipment, for The loophole that each asset equipment history generates is understood, and is analyzed by the Vulnerability Management performance to assets, is realized to whole The information security of asset equipment is assessed in a operation system.
Preferably, further include
Loophole alarm module becomes for the prompt alarm to important loophole, the time-out alarm of loophole processing, loophole quantity Gesture alerts and the processing alarm of difficult loophole, is alerted to the loophole that do not repaired timely in loophole processing procedure.
Preferably, the loophole tracking processing module includes work order worksheet processing module, for provide Vulnerability Management module Leak repairing reference scheme and technical essential are distributed to loophole treatment people in the form of work order, and loophole treatment people is repaiied from loophole It mends reference scheme and selects the leak repairing scheme under the work order, to handle loophole.
The second object of the present invention is achieved through the following technical solutions:A kind of leakage realized based on above-mentioned Vulnerability Management system Hole management method, steps are as follows:
S1, vulnerability scanning module are scanned the loophole in system, and generate vulnerability scanning report, then by loophole Scan report is imported into Vulnerability Management module;
S2, Vulnerability Management module carry out Vulnerability Management by the parsing reported vulnerability scanning, provide loophole processing state It automatically updates, information is shown and leak repairing reference scheme;
S3, loophole tracking processing module issue the leak repairing reference scheme and technical essential that Vulnerability Management module provides Loophole treatment people, loophole treatment people selects the leak repairing scheme under work order from leak repairing reference scheme, with to loophole It is handled;When loophole tracking processing module handles the displaying of vulnerability scanning progress, loophole distribution, the worksheet processing of loophole simultaneously Limit, the processing progress of loophole carry out crucial loophole to execute concern and tracking into line trace;Feedback loophole processing in real time Situation and progress.
S4, after present lot loophole is disposed, statistical analysis module to loophole quantity carry out subregion statistics, to preceding The truth of multiple batches of loophole before and after the processing compares and analyzes afterwards, to the reinforcing rate of loophole and some operation system The trend that middle loophole generates is counted, and scoring is calculated to loophole index of correlation, for assessing and judging this operation system Health;
The analysis of S5, asset equipment management module to loophole and its being associated property of underlying assets equipment, for each money The loophole that production device history generates is understood, and is analyzed by the Vulnerability Management performance to assets, is realized to entire business The information security of asset equipment is assessed in system.
Preferably, further comprising the steps of:S6, loophole alarm module handle the prompt alarm of important loophole, loophole Time-out alarm, the trend alarm of loophole quantity and the processing of difficult loophole alarm, in loophole processing procedure not by timely The loophole of repairing is alerted.
Further, loophole alarm module carries out loophole number when the generation trend of loophole quantity is more than certain threshold value The trend of amount alerts.
Preferably, in the step S3, the work order worksheet processing module in loophole tracking processing module puies forward Vulnerability Management module The leak repairing reference scheme and technical essential of confession are distributed to loophole treatment people in the form of work order, and loophole treatment people is from leakage Hole repairing reference scheme selects the leak repairing scheme under the work order, to handle loophole.
Preferably, the step S3 loopholes tracking processing module is in loophole tracks processing procedure, leak repairing processing side Method and the difficult point encountered, counter-measure, technology point will be stored in leak repairing scheme base after being all associated with loophole itself, work as business It, can also be from leak repairing scheme base other than its vulnerability information and state are presented at the first time when system generates a loophole In, selection most the leak repairing processing method of reference value, difficult point, counter-measure and technology point.
The present invention has the following advantages and effects with respect to the prior art:
(1) present invention passes through vulnerability scanning, Vulnerability Management, loophole tracking processing, statistical analysis and asset equipment management Control is managed to loophole, and leak repairing reference scheme is provided, arranges to implement leak repairing processing for administrative staff.This Invention system can record all relevant informations of loophole in detail, be conducive to the safety wind of tracking and traceability system equipment Danger, and the safe condition of whole network system can be effectively assessed, identify the weak link in network, and then be network Security hardening work point the direction.
(2) present system makes personal work platform, the related personnel such as safe operation maintenance personnel, third party manufacturer and client The data informations such as vulnerability information, loophole processing tracking, loophole alarm can be obtained in real time, while by the method for the invention by loophole Management process flow is standardized, and realizes the standardization work(such as loophole standard is handled, information timely feedbacks, job schedule tracks It can, hence it is evident that improve the quality and efficiency of loophole processing work.
(3) present invention is by by the analysis of loophole and its being associated property of underlying assets equipment, for each asset history The loophole of generation is understood, and the management of management, professional system to system assets equipment, the pipe of assets and vulnerability information are passed through The Vulnerability Management performance of reason, asset threats management and assets is analyzed, to realize the information to assets in entire operation system Safety is fully assessed, to realize the assessment and management that are cooperateed with to the security threat that assets in system can be subject to, shape At system vulnerability risk evaluation system.
Description of the drawings
Fig. 1 is present system composition frame chart.
Specific implementation mode
Present invention will now be described in further detail with reference to the embodiments and the accompanying drawings, but embodiments of the present invention are unlimited In this.
Embodiment
As shown in Figure 1, present embodiment discloses a kind of Vulnerability Management systems, including
Vulnerability scanning module for being scanned to the loophole in system, and generates vulnerability scanning report;
Vulnerability Management module carries out loophole pipe for importing vulnerability scanning report by the parsing reported vulnerability scanning Reason, formatting show the relevant information of leakage, and record the affiliated operation system and scanning batch of vulnerability information, use In subsequent comparative analysis;For provide loophole processing state automatically update, information displaying and leak repairing reference scheme, wherein Leak repairing reference scheme is selected from leak repairing scheme base, at the correlation that available reference is extracted in leak repairing scheme base Reason scheme and technical essential arrange to implement leak repairing processing for administrative staff.
Loophole alarm module becomes for the prompt alarm to important loophole, the time-out alarm of loophole processing, loophole quantity Gesture alerts and the processing alarm of difficult loophole, is alerted to the loophole that do not repaired timely in loophole processing procedure.Its In loophole quantity generation trend be more than certain threshold value when, carry out loophole quantity trend alarm.
Loophole tracks processing module, the leak repairing reference scheme for providing Vulnerability Management module and technical essential hair Give loophole treatment people;For to the displaying of vulnerability scanning progress, loophole distribution, worksheet processing process limited of loophole, loophole place Reason progress carries out crucial loophole to execute concern and tracking into line trace.Loophole tracks processing module packet in the present embodiment Work order worksheet processing module is included, the leak repairing reference scheme and technical essential for providing Vulnerability Management module are in the form of work order It is distributed to loophole treatment people, loophole treatment people selects the leak repairing scheme under the work order from leak repairing reference scheme, To handle loophole.
Processing module is tracked by loophole, Vulnerability Management personnel can be at any time by system queries, and follow up any one industry The loophole disposition and difficulty in treatment of business system specify corresponding treatment Countermeasures in time.
Statistical analysis module, it is right for after present lot loophole is disposed, subregion statistics to be carried out to loophole quantity The truth of front and back multiple batches of loophole before and after the processing compares and analyzes, to the reinforcing rate of loophole and some business system The trend that loophole generates in system is counted, and scoring is calculated to loophole index of correlation, for assessing and judging this operation system Health.
And asset equipment management module, for the analysis to loophole and its being associated property of underlying assets equipment, for The loophole that each asset equipment history generates is understood, and the management of management, professional system to system assets equipment, money are passed through The production equipment and management of vulnerability information, asset equipment Threat Management and assets Vulnerability Management performance analyzed, to realize pair The information security of asset equipment is fully assessed in entire operation system.The safe prestige that asset equipment in system can be subject to Coerce the assessment and management cooperateed with.
The present embodiment system be divided into vulnerability scanning, Vulnerability Management, loophole alarm, loophole tracking processing, statistical analysis and Asset equipment manages six big modules, passes through the association point of the much informations such as vulnerability scanning information, processing tracking information, asset of equipments System-wide comprehensive Vulnerability Management control is realized in analysis.
The present embodiment also discloses a kind of Vulnerability Management method realized based on above-mentioned Vulnerability Management system, and steps are as follows:
S1, vulnerability scanning module are scanned the loophole in system, and generate vulnerability scanning report, then by loophole Scan report is imported into Vulnerability Management module;
S2, Vulnerability Management module carry out Vulnerability Management by the parsing reported vulnerability scanning, provide loophole processing state It automatically updates, information is shown and leak repairing reference scheme;
S3, loophole tracking processing module issue the leak repairing reference scheme and technical essential that Vulnerability Management module provides Loophole treatment people, loophole treatment people selects the leak repairing scheme under work order from leak repairing reference scheme, with to loophole It is handled;When loophole tracking processing module handles the displaying of vulnerability scanning progress, loophole distribution, the worksheet processing of loophole simultaneously Limit, the processing progress of loophole carry out crucial loophole to execute concern and tracking into line trace;Wherein in this step loophole with The leak repairing reference scheme and technical essential that work order worksheet processing module in track processing module provides Vulnerability Management module are with work Single form is distributed to loophole treatment people, and loophole treatment people selects the loophole under the work order to repair from leak repairing reference scheme Benefit scheme, to handle loophole.
The present embodiment realizes complete period life management in loophole tracks processing procedure, is generated from loophole, arrives loophole It is disposed, each details of entire processing procedure can be follow-up to by Vulnerability Management system.
S4, after present lot loophole is disposed, statistical analysis module to loophole quantity carry out subregion statistics, to preceding The truth of multiple batches of loophole before and after the processing compares and analyzes afterwards, to the reinforcing rate of loophole and some operation system The trend that middle loophole generates is counted, and scoring is calculated to loophole index of correlation, for assessing and judging this operation system Health;
The analysis of S5, asset equipment management module to loophole and its being associated property of underlying assets equipment, for each money The loophole that production device history generates is understood, and is analyzed by the Vulnerability Management performance to assets, is realized to entire business The information security of asset equipment is assessed in system.
S6, loophole alarm module are to the time-out alarm of prompt alarm, the loophole processing of important loophole, the trend of loophole quantity Alarm and the processing alarm of difficult loophole, alert the loophole that do not repaired timely in loophole processing procedure.Wherein Loophole alarm module carries out the trend alarm of loophole quantity when the generation trend of loophole quantity is more than certain threshold value.
Loophole tracking processing module is in loophole tracks processing procedure in the present embodiment above-mentioned steps S3, the mend of loophole Reason method and the key difficulties encountered, counter-measure, key technology point are stored in leak repairing after being all associated with loophole itself Scheme base, can also be from leakage other than its vulnerability information and state are presented at the first time when operation system generates a loophole In the mending option library of hole, loophole processing method, key difficulties, the counter-measure of selection most reference value, and crucial skill Art point.
The above embodiment is a preferred embodiment of the present invention, but embodiments of the present invention are not by above-described embodiment Limitation, it is other it is any without departing from the spirit and principles of the present invention made by changes, modifications, substitutions, combinations, simplifications, Equivalent substitute mode is should be, is included within the scope of the present invention.

Claims (4)

1. a kind of Vulnerability Management method realized based on Vulnerability Management system, which is characterized in that the Vulnerability Management system, including
Vulnerability scanning module for being scanned to the loophole in system, and generates vulnerability scanning report;
Vulnerability Management module carries out Vulnerability Management by the parsing reported vulnerability scanning, carries for importing vulnerability scanning report It is automatically updated for loophole processing state, information displaying and leak repairing reference scheme, the leak repairing reference scheme is from leakage It is selected in mending option library in hole;
Loophole tracks processing module, and leak repairing reference scheme and technical essential for providing Vulnerability Management module issue leakage Hole treatment people;For to the displaying of vulnerability scanning progress, loophole distribution, worksheet processing process limited of loophole, loophole processing into It spends into line trace;
Statistical analysis module, for after present lot loophole is disposed, subregion statistics being carried out to loophole quantity, to front and back The truth of multiple batches of loophole before and after the processing compares and analyzes, in the reinforcing rate of loophole and some operation system The trend that loophole generates is counted, and scoring is calculated to loophole index of correlation, for assessing and judging the strong of this operation system Kang Xing;
And asset equipment management module, for the analysis to loophole and its being associated property of underlying assets equipment, for each The loophole that asset equipment history generates is understood, and is analyzed by the Vulnerability Management performance to assets, is realized to entire industry The information security of asset equipment is assessed in business system;
The Vulnerability Management method and step is as follows:
S1, vulnerability scanning module are scanned the loophole in system, and generate vulnerability scanning report, then by vulnerability scanning Report is imported into Vulnerability Management module;
S2, Vulnerability Management module carry out Vulnerability Management by the parsing reported vulnerability scanning, and it is automatic to provide loophole processing state Update, information displaying and leak repairing reference scheme;
The leak repairing reference scheme and technical essential that Vulnerability Management module provides are issued loophole by S3, loophole tracking processing module Treatment people, loophole treatment people selects the leak repairing scheme under work order from leak repairing reference scheme, to be carried out to loophole Processing;Simultaneously loophole tracking processing module to vulnerability scanning progress, loophole distribution displaying, loophole the worksheet processing process limited and The processing progress of loophole is into line trace;
S4, after present lot loophole is disposed, statistical analysis module to loophole quantity carry out subregion statistics, to front and back more The truth of loophole before and after batch processed compares and analyzes, to being leaked in the reinforcing rate of loophole and some operation system The trend that hole generates is counted, and calculates scoring to loophole index of correlation, the health for assessing and judging this operation system Property;
The analysis of S5, asset equipment management module to loophole and its being associated property of underlying assets equipment, sets for each assets The loophole that standby history generates is understood, and is analyzed by the Vulnerability Management performance to assets, is realized to entire operation system The information security of middle asset equipment is assessed;
The step S3 loopholes tracking processing modules leak repairing processing method and encounters in loophole tracks processing procedure Difficult point, counter-measure, technology point will be stored in leak repairing scheme base after being all associated with loophole itself, when operation system generates one When loophole, other than its vulnerability information and state are presented at the first time, it can also be selected most from leak repairing scheme base Leak repairing processing method, difficult point, counter-measure and the technology point of reference value.
2. Vulnerability Management method according to claim 1, which is characterized in that further comprising the steps of:S6, loophole alert mould Place of the block to the time-out alarm of prompt alarm, loophole processing of important loophole, the trend alarm of loophole quantity and difficult loophole Reason alarm, alerts the loophole that do not repaired timely in loophole processing procedure.
3. Vulnerability Management method according to claim 2, which is characterized in that generation of the loophole alarm module in loophole quantity When trend is more than certain threshold value, the trend alarm of loophole quantity is carried out.
4. Vulnerability Management method according to claim 1, which is characterized in that in the step S3, loophole tracking processing mould The leak repairing reference scheme and technical essential that work order worksheet processing module in the block provides Vulnerability Management module are in the form of work order It is distributed to loophole treatment people, loophole treatment people selects the leak repairing scheme under the work order from leak repairing reference scheme, To handle loophole.
CN201510228115.0A 2015-05-06 2015-05-06 A kind of Vulnerability Management system and method Active CN104778414B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510228115.0A CN104778414B (en) 2015-05-06 2015-05-06 A kind of Vulnerability Management system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510228115.0A CN104778414B (en) 2015-05-06 2015-05-06 A kind of Vulnerability Management system and method

Publications (2)

Publication Number Publication Date
CN104778414A CN104778414A (en) 2015-07-15
CN104778414B true CN104778414B (en) 2018-09-07

Family

ID=53619869

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510228115.0A Active CN104778414B (en) 2015-05-06 2015-05-06 A kind of Vulnerability Management system and method

Country Status (1)

Country Link
CN (1) CN104778414B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110096890A (en) * 2019-05-08 2019-08-06 北京国舜科技股份有限公司 Loophole rectifies and improves tactful method for pushing and equipment

Families Citing this family (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105635112B (en) * 2015-12-18 2019-03-15 国家电网公司 The appraisal procedure of information system security energy
CN107292175A (en) * 2016-04-01 2017-10-24 中兴通讯股份有限公司 Server apparatus method for managing security and device
CN105933288A (en) * 2016-04-08 2016-09-07 中国南方电网有限责任公司 Network equipment loophole geographical distribution evaluation system and method
CN106453432A (en) * 2016-12-20 2017-02-22 国网江西省电力公司信息通信分公司 Vulnerability scanning and threat intelligence based unified vulnerability management and warning platform
CN106790190B (en) * 2016-12-30 2019-11-19 北京神州绿盟信息安全科技股份有限公司 A kind of Vulnerability Management system and method
CN107154930B (en) * 2017-03-31 2020-10-16 武汉斗鱼网络科技有限公司 Method and system for testing vulnerability
CN107634945B (en) * 2017-09-11 2018-06-22 平安科技(深圳)有限公司 Website vulnerability scan method, device, computer equipment and storage medium
CN108881284A (en) * 2018-07-17 2018-11-23 深圳市极限网络科技有限公司 A kind of cyberspace loophole merger platform long-range attack control system
CN109784060A (en) * 2018-12-12 2019-05-21 平安科技(深圳)有限公司 Vulnerability Management report-generating method, device and storage medium, server
CN110674506B (en) * 2019-09-10 2020-10-27 深圳开源互联网安全技术有限公司 Method and system for rapidly verifying vulnerability state of application program
CN112491874A (en) * 2020-11-26 2021-03-12 杭州安恒信息技术股份有限公司 Network asset management method and device and related equipment
CN114884719A (en) * 2022-04-29 2022-08-09 广州市昊恒信息科技有限公司 Network equipment security vulnerability early warning system
CN117217697A (en) * 2023-09-18 2023-12-12 卫士通(广州)信息安全技术有限公司 Equipment asset vulnerability tracking management platform

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140137257A1 (en) * 2012-11-12 2014-05-15 Board Of Regents, The University Of Texas System System, Method and Apparatus for Assessing a Risk of One or More Assets Within an Operational Technology Infrastructure
CN103166794A (en) * 2013-02-22 2013-06-19 中国人民解放军91655部队 Information security management method with integration security control function
CN104346565B (en) * 2013-07-30 2017-10-10 北京神州泰岳软件股份有限公司 A kind of vulnerability scanning method and system
CN103955647A (en) * 2014-05-12 2014-07-30 国家电网公司 System bug scanning method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"WEB应用安全漏洞扫描系统的设计与实现";胡志伟;《中国优秀硕士学位论文全文数据库 信息科技辑》;20150415(第04期);5.4节、6.1-6.3节 *
"电力行业信息安全管理平台的研究与应用";黄凯;《中国优秀硕士学位论文全文数据库 信息科技辑》;20081015(第10期);3.1节、3.3节、3.5.2节、3.6-3.8节、4.3.3-4.3.4节、4.4.3-4.4.7节、5.4-5.5节、图5-6 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110096890A (en) * 2019-05-08 2019-08-06 北京国舜科技股份有限公司 Loophole rectifies and improves tactful method for pushing and equipment

Also Published As

Publication number Publication date
CN104778414A (en) 2015-07-15

Similar Documents

Publication Publication Date Title
CN104778414B (en) A kind of Vulnerability Management system and method
CN103716202B (en) A kind of intelligent maintenance strategy management method for power communication
CN109672663B (en) Closed-loop network security supervision method and system for security threat event
CN108564207B (en) BIM-based construction engineering intelligent bidding decision management system
CN111311133B (en) Monitoring system applied to power grid production equipment
Tyuleneva Problems and prospects of regional mining industry digitalization
CN111242575A (en) Comprehensive management on-line auditing system
Ma et al. A blockchain-based risk and information system control framework
CN104156804A (en) Benchmarking data processing system and data processing method for provincial company teams
CN107369120A (en) A kind of smart business's management, service system and enterprise's activity assays
Al-Ahmad et al. A code of practice for effective information security risk management using COBIT 5
CN115860694A (en) Business expansion process management and control method and system based on instant message technology
CN112100215B (en) Protection progress query system based on comprehensive level protection management platform
US20130041796A1 (en) Application governance process and tool
CN111709597B (en) Power grid production domain operation monitoring system
US10089475B2 (en) Detection of security incidents through simulations
CN116859842A (en) Chemical production line safety evaluation system
CN102013081A (en) User-defined credit analysis model method based on credit rating system
CN111831817A (en) Questionnaire generation and analysis method and device, computer equipment and readable storage medium
CN116015903A (en) Network security situation awareness comprehensive analysis system and method thereof
CN114066470A (en) Account risk assessment method based on relational network
CN105930968A (en) Passenger line construction risk control and early warning system
CN114022022A (en) Industrial network security risk assessment method, device, equipment and storage medium
CN109117636B (en) Virtual-real combined distributed energy system information security evaluation method
Markovic-Petrovic et al. A Hybrid Security Risk Assessment Method for SCADA Networks

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
PE01 Entry into force of the registration of the contract for pledge of patent right

Denomination of invention: Vulnerability management system and method

Effective date of registration: 20200421

Granted publication date: 20180907

Pledgee: China Co truction Bank Corp Guangzhou Yuexiu branch

Pledgor: GUANGZHOU WONFONE TECHNOLOGY Co.,Ltd.

Registration number: Y2020980001676

PE01 Entry into force of the registration of the contract for pledge of patent right
PC01 Cancellation of the registration of the contract for pledge of patent right

Date of cancellation: 20220406

Granted publication date: 20180907

Pledgee: China Co. truction Bank Corp Guangzhou Yuexiu branch

Pledgor: GUANGZHOU WONFONE TECHNOLOGY Co.,Ltd.

Registration number: Y2020980001676

PC01 Cancellation of the registration of the contract for pledge of patent right