CN110162978A - A kind of terminal security risk assessment management method, apparatus and system - Google Patents

A kind of terminal security risk assessment management method, apparatus and system Download PDF

Info

Publication number
CN110162978A
CN110162978A CN201910410088.7A CN201910410088A CN110162978A CN 110162978 A CN110162978 A CN 110162978A CN 201910410088 A CN201910410088 A CN 201910410088A CN 110162978 A CN110162978 A CN 110162978A
Authority
CN
China
Prior art keywords
information terminal
detecting
server
client
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910410088.7A
Other languages
Chinese (zh)
Inventor
何兵兵
张超
沈先波
徐飞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
HEFEI YOUO ELECTRONIC TECHNOLOGY CO LTD
Original Assignee
HEFEI YOUO ELECTRONIC TECHNOLOGY CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by HEFEI YOUO ELECTRONIC TECHNOLOGY CO LTD filed Critical HEFEI YOUO ELECTRONIC TECHNOLOGY CO LTD
Priority to CN201910410088.7A priority Critical patent/CN110162978A/en
Publication of CN110162978A publication Critical patent/CN110162978A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/034Test or assess a computer or a system

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of terminal security risk assessment management method, apparatus and system, method includes: the push instruction for receiving server-side and sending, and client software is mounted on each information terminal;Safety detection is carried out to information terminal using client, detection project includes: login account detection, the software detection that must be installed, weak passwurd detection, Port detecting, the detection of unnecessary service processes, network configuration detection, the detection of key configuration file, the access of key configuration file record and one of modification note detection record, software vulnerability detection or combination;Safety detection result is sent to server-side using client, so that server-side is judged according to safety detection result;The reparation file that server end is sent is received, and according to the reparation for repairing file progress risk item.Using the embodiment of the present invention, the security risk of information management can be reduced.

Description

Terminal security risk assessment management method, device and system
Technical Field
The invention relates to a security assessment management system, in particular to a terminal security risk assessment management method, device and system.
Background
With the rapid development of power informatization, the network scale of a power information network is continuously increased, and the threat of information security is increased. In order to ensure the safety of the information network, the power information network management department continuously raises the requirement of information safety, and issues various information safety regulations and rules successively, relating to various aspects including terminal systems, safety strategies and the like. Aiming at the situation, the terminal safety risk assessment auditing tool is developed to realize automatic and accurate automatic detection and monitoring of terminal equipment so as to improve the safety and reliability of the terminal and ensure the safety of the terminal, thereby ensuring the safety of the whole information network. At present, a safety system of the power information network is initially established, the power information network and a power operation real-time control network are isolated, and a firewall, network antivirus software and data backup equipment are arranged between the networks.
In enterprise information security, terminal security is the most important, but the information terminal has the phenomena of multiple system accounts, weak passwords, random port opening and service opening and the like due to wide application range, complex application environment, large number of related users, difficult operation and maintenance and the like, so that a series of security risks are brought to the information security of an enterprise due to the low security of the information terminal.
Disclosure of Invention
The invention aims to provide a terminal security risk assessment management method, device and system, and aims to solve the problem of information security risk in the prior art.
The invention solves the technical problems through the following technical scheme:
the embodiment of the invention provides a terminal security risk assessment management method, which is applied to an information terminal and comprises the following steps:
receiving a push instruction sent by a server to install client software on each information terminal, wherein the information terminal comprises: a Windows xp operating system information terminal, a Windows7 operating system information terminal, a Windows10 operating system information terminal;
the client is utilized to carry out safety detection on the information terminal, and detection items comprise: detecting a login account, detecting software which needs to be installed, detecting a weak password, detecting a port, detecting an unnecessary service process, detecting network configuration, detecting a key configuration file, detecting an access record and a modification record of the key configuration file, and detecting software bugs;
sending a safety detection result to a server by using a client so that the server judges according to the safety detection result;
and receiving a repair file sent by a server side, and repairing the risk item according to the repair file.
Optionally, the login account detection includes:
detecting whether the number of account numbers in the information terminal exceeds a set value or not;
or,
detecting whether a forbidden account exists in the account logged in the information terminal;
optionally, the port detection includes:
and acquiring a list of hardware ports and open ports in software ports in the information terminal.
Optionally, the network configuration detection includes: and acquiring the number of network cards in the information terminal.
Optionally, the unnecessary service process detection includes:
and scanning registry information of the information terminal to obtain a list of unnecessary service processes opened by the information terminal.
Optionally, the weak password detection includes:
and detecting the strength of each password in the information terminal by using a preset dictionary library, and acquiring a strength list of each password.
Optionally, the receiving a repair file sent by a server, and repairing a risk item according to the repair file includes:
and receiving a repair script sent by a server, and executing the script to close a port corresponding to the script and a service process.
Optionally, the receiving a repair file sent by a server, and repairing a risk item according to the repair file includes:
and receiving a patch file sent by a server and installing the patch.
Optionally, the receiving a repair file sent by a server, and repairing a risk item according to the repair file includes:
and receiving the weak password modification list file, and informing a user to modify the corresponding weak password within the appointed time according to the weak password modification list file.
Optionally, the sending, by the client, the security detection result to the server, so that the server performs the determination according to the security detection result, includes:
and receiving a forbidden account list sent by the server, and forbidding a corresponding account according to the forbidden account list.
The embodiment of the invention provides a terminal security risk assessment management method, which is applied to a server side and comprises the following steps:
generating a push instruction, and sending the push instruction to an information terminal so that the information terminal installs client software according to the push instruction;
receiving a safety detection result, and judging whether the information terminal has a risk item according to the safety detection result;
and if so, generating a risk item repair file, and sending the risk item repair file to the client so that the information terminal carries out risk repair according to the risk item repair file.
Optionally, after receiving the security detection result, before determining whether the information terminal has the risk item according to the security detection result, the method further includes: judging whether the risk items corresponding to the safety detection results can be repaired or not;
and if not, isolating the client corresponding to the safety detection result.
The embodiment of the invention also provides a terminal security risk assessment management method, which comprises the following steps:
generating a push instruction, and sending the push instruction to an information terminal so that the information terminal installs client software according to the push instruction;
receiving a push instruction sent by a server to install client software on each information terminal, wherein the information terminal comprises: a Windows xp operating system information terminal, a Windows7 operating system information terminal, a Windows10 operating system information terminal;
the client is utilized to carry out safety detection on the information terminal, and detection items comprise: detecting a login account, detecting software which needs to be installed, detecting a weak password, detecting a port, detecting an unnecessary service process, detecting network configuration, detecting a key configuration file, detecting an access record and a modification record of the key configuration file, and detecting software bugs;
sending a safety detection result to a server by using a client so that the server judges according to the safety detection result;
receiving a safety detection result, and judging whether the information terminal has a risk item according to the safety detection result; if so, generating a risk item repair file, and sending the risk item repair file to a client so that the information terminal carries out risk repair according to the risk item repair file;
and receiving a repair file sent by a server side, and repairing the risk item according to the repair file.
The embodiment of the invention also provides a terminal security risk assessment management device, which is applied to an information terminal and comprises the following components:
the first receiving module is used for receiving a push instruction sent by a server to install client software on each information terminal, wherein the information terminal comprises: a Windows xp operating system information terminal, a Windows7 operating system information terminal, a Windows10 operating system information terminal;
the detection module is used for utilizing the client to carry out safety detection on the information terminal, and detection items comprise: detecting a login account, detecting software which needs to be installed, detecting a weak password, detecting a port, detecting an unnecessary service process, detecting network configuration, detecting a key configuration file, detecting an access record and a modification record of the key configuration file, and detecting software bugs;
the sending module is used for sending the safety detection result to the server by using the client so that the server can judge according to the safety detection result;
and the second receiving module is used for receiving the repair file sent by the server side and repairing the risk item according to the repair file.
Optionally, the detection module is configured to:
detecting whether the number of account numbers in the information terminal exceeds a set value or not;
or,
detecting whether a forbidden account exists in the account logged in the information terminal;
optionally, the detection module is configured to:
and acquiring a list of hardware ports and open ports in software ports in the information terminal.
Optionally, the detection module is configured to: and acquiring the number of network cards in the information terminal.
Optionally, the detection module is configured to:
and scanning registry information of the information terminal to obtain a list of unnecessary service processes opened by the information terminal.
Optionally, the detection module is configured to:
and detecting the strength of each password in the information terminal by using a preset dictionary library, and acquiring a strength list of each password.
Optionally, the second receiving module is configured to:
and receiving a repair script sent by a server, and executing the script to close a port corresponding to the script and a service process.
Optionally, the second receiving module is configured to:
and receiving a patch file sent by a server and installing the patch.
Optionally, the second receiving module is configured to:
and receiving the weak password modification list file, and informing a user to modify the corresponding weak password within the appointed time according to the weak password modification list file.
Optionally, the second receiving module is configured to:
and receiving a forbidden account list sent by the server, and forbidding a corresponding account according to the forbidden account list.
The embodiment of the invention provides a terminal security risk assessment management device, which is applied to a server side, and the method comprises the following steps:
the generation module is used for generating a push instruction and sending the push instruction to the information terminal so that the information terminal can install the client software according to the push instruction;
the third receiving module is used for receiving a safety detection result and judging whether the information terminal has a risk item according to the safety detection result;
and the repairing module is used for generating a risk item repairing file and sending the risk item repairing file to the client under the condition that the judgment result of the third receiving module is yes, so that the information terminal carries out risk repairing according to the risk item repairing file.
Optionally, the apparatus further comprises: the judging module is used for judging whether the risk items corresponding to the safety detection results can be repaired or not;
and if not, isolating the client corresponding to the safety detection result.
The embodiment of the invention provides a terminal security risk assessment management system, which comprises:
a terminal security risk assessment management device as described in any of the above, and,
the other terminal security risk assessment management device is described above.
Compared with the prior art, the invention has the following advantages:
by applying the embodiment of the invention, the client is installed on the operating system terminals of each version, the information terminal is subjected to security detection by using the client, and the risk items of the information terminal are repaired, so that the security of the information terminal can be improved, and the security risk of information management is further reduced.
Drawings
Fig. 1 is a schematic flowchart of a first terminal security risk assessment management method according to an embodiment of the present invention;
fig. 2 is a schematic flowchart of a second terminal security risk assessment management method according to an embodiment of the present invention;
fig. 3 is a schematic flowchart of a third method for managing terminal security risk assessment according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a first terminal security risk assessment management apparatus according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a second terminal security risk assessment management apparatus according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a terminal security risk assessment management system according to an embodiment of the present invention;
fig. 7 is a schematic structural diagram of another terminal security risk assessment management system according to an embodiment of the present invention.
Detailed Description
The following examples are given for the detailed implementation and specific operation of the present invention, but the scope of the present invention is not limited to the following examples.
The embodiment of the invention provides a method, a device and a system for managing terminal security risk assessment, and firstly introduces the method for managing terminal security risk assessment provided by the embodiment of the invention.
In a first aspect, fig. 1 is a schematic flowchart of a first terminal security risk assessment management method according to an embodiment of the present invention; as shown in fig. 1, the method is applied to an information terminal, and comprises the following steps:
s101: receiving a push instruction sent by a server to install client software on each information terminal, wherein the information terminal comprises: a Windows xp operating system information terminal, a Windows7 operating system information terminal, and a Windows10 operating system information terminal.
In general, a large number of information terminals are included in an information system, and for historical reasons, there may be differences in operating system versions of different information terminals, for example, there may be a Windows xp operating system information terminal, a Windows7 operating system information terminal, and a Windows10 operating system information terminal. Therefore, in order to be compatible with the operating systems, the client in the embodiment of the present invention includes a push module of each operating system, or includes a push module and a push information conversion module, and converts information sent by the push module into information that can be received by a corresponding operating system, so as to be compatible with the operating systems.
The client can be one of Windows service and visual client program, and the information terminal is installed through a uniform push program.
S102: the client is utilized to carry out safety detection on the information terminal, and detection items comprise: the method comprises the following steps of one or a combination of login account detection, software detection which must be installed, weak password detection, port detection, unnecessary service process detection, network configuration detection, key configuration file detection, access record and modification record detection of key configuration files and software vulnerability detection.
In practical application, the login account detection includes: detecting whether the number of account numbers in the information terminal exceeds a set value or not; or detecting whether a forbidden account exists in the account logged in the information terminal.
Specifically, whether the system is used by multiple accounts can be judged through the number of users of the local user and the group in computer management, whether the users are forbidden or not, and the like.
The port detection includes: and acquiring a list of hardware ports and open ports in software ports in the information terminal. The detection of the open condition of a TCP (transmission control Protocol) port and a UDP (User Datagram Protocol) port can be achieved by using telnet (remote terminal Protocol) and SOCKET (port) technologies.
The network configuration detection comprises: and acquiring the number of network cards in the information terminal. The number of network cards can be directly obtained by detecting the number of 'network adapters' in the device manager.
The unnecessary service process detection comprises the following steps: and scanning registry information of the information terminal to obtain a list of unnecessary service processes opened by the information terminal. And scanning the terminal registry information through the client to detect the opening condition of unnecessary services.
The weak password detection includes: and detecting the strength of each password in the information terminal by using a preset dictionary library, and acquiring a strength list of each password. And (4) violence detection is carried out in a dictionary library mode, and the current system password and the password in the preset dictionary library are used for realizing the simulation of logging in the terminal equipment so as to realize the detection of the password.
In practical application, a user can expand the detection items in a customized manner, for example, an administrator can add new detection items in a detection item maintenance interface as needed to form a security detection library.
S103: and sending the safety detection result to the server by using the client so that the server judges according to the safety detection result.
And the client sends the detection result obtained in the step S102 to the server, and the server performs judgment respectively according to the detection result of each client.
In practical application, taking the judgment of the weak password as an example, the system login can be considered to be realized before the first preset number is simulated, and the password can be considered as the weak password;
or the ratio of the number of the simulated passwords to the number in the preset dictionary database is lower than a second preset number, the password can be considered as a weak password.
Taking unnecessary services as an example, when unnecessary services exist, the information terminal is considered to have a security risk.
S104: and receiving a repair file sent by a server side, and repairing the risk item according to the repair file.
Specifically, a repair script sent by a server may be received, and the script is executed to close a port and a service process corresponding to the script. For example, by issuing a bat (Batch file) script, one-key automatic closing of a controlled port and unnecessary services is realized;
specifically, the patch file sent by the server may also be received, and the patch may be installed. For example, the server-side associates with a security patch server according to the bug fixing condition of a terminal detection item to realize the automatic issuing function of a security patch to fix the security bug of the terminal, and the specific mode mainly comprises the steps of uploading a patch installation package to be installed on the server-side, and acquiring the patch to be installed from the server-side by a client-side through an HTTP interface to realize patch issuing and installation;
specifically, a weak password modification list file can be received, and a user is informed to modify the corresponding weak password within the specified time according to the weak password modification list file. The weak password is repaired by setting and limiting a password policy in a local security policy;
in practical application, the server can also modify the forced weak password, and after the password of the information terminal is modified by the server, the modified password is notified to the user in a safe manner.
Specifically, a forbidden account list sent by the server can be received, and the corresponding account is forbidden according to the forbidden account list. And forbidding the use permission of redundant users according to the acquired user information of the local users and the groups in the computer management.
By applying the embodiment of the invention shown in fig. 1, the client is installed on the operating system terminals of each version, the information terminal is subjected to security detection by using the client, and the risk items of the information terminal are repaired, so that the security of the information terminal can be improved, and the security risk of information management is further reduced.
In a second aspect, the embodiment of the present invention further provides a second terminal security risk assessment management method.
Fig. 2 is a schematic flowchart of a second method for managing terminal security risk assessment according to an embodiment of the present invention, and as shown in fig. 2, the method is applied to a server, and the method includes:
s201: and generating a push instruction, and sending the push instruction to the information terminal so that the information terminal installs the client software according to the push instruction.
The push command generated by the server is suitable for a Windows xp operating system information terminal, a Windows7 operating system information terminal and a Windows10 operating system information terminal. And pushing out the client terminals suitable for the Windows xp operating system information terminal, the Windows7 operating system information terminal and the Windows10 operating system information terminal.
Normally, the information is pushed to all information terminals.
S202: receiving a safety detection result, and judging whether the information terminal has a risk item according to the safety detection result; if yes, go to step S203; if not, the security detection result is continuously received.
Taking the judgment of the weak password as an example, the system login can be considered to be realized before the first preset number is simulated, and the password can be considered as the weak password;
or the ratio of the number of the simulated passwords to the number in the preset dictionary database is lower than a second preset number, the password can be considered as a weak password.
Taking unnecessary services as an example, when unnecessary services exist, the information terminal is considered to have a security risk.
S203: and generating a risk item restoration file, and sending the risk item restoration file to a client so that the information terminal carries out risk restoration according to the risk item restoration file.
By applying the embodiment of the invention shown in fig. 2, the client is installed on the operating system terminals of each version, the information terminal is subjected to security detection by using the client, and the risk items of the information terminal are repaired, so that the security of the information terminal can be improved, and the security risk of information management is further reduced.
In a specific implementation manner of the embodiment of the present invention, after receiving a security detection result, before determining whether a risk item occurs in an information terminal according to the security detection result, the method further includes: judging whether the risk items corresponding to the safety detection results can be repaired or not;
and if not, isolating the client corresponding to the safety detection result.
And for the terminal which cannot be repaired, the client-side carries out isolation processing on the terminal. The specific method is that the access authority of the terminal is realized through the setting of an IP security policy in a local security policy, so that the effect of network disconnection is achieved.
For example, if the existing repair means of the server cannot repair the client, and the client has a security risk item, in order to prevent the client from affecting other devices in the network, the server may send an instruction to close a port connected to the client to the other devices connected to the client, and after receiving the instruction, the other devices connected to the client close the port connected to the client, thereby implementing isolation of the client.
By applying the embodiment of the invention, the isolation operation of the client with the risk item can be realized.
In a third aspect, an embodiment of the present invention further provides a third method for managing security risk assessment of a terminal.
Fig. 3 is a schematic flowchart of a third method for managing terminal security risk assessment according to an embodiment of the present invention, where as shown in fig. 3, the method includes:
s301: and generating a push instruction, and sending the push instruction to the information terminal so that the information terminal installs the client software according to the push instruction.
This step corresponds to step S201 of the second aspect, and is not described herein again in the embodiments of the present invention.
S302: receiving a push instruction sent by a server to install client software on each information terminal, wherein the information terminal comprises: a Windows xp operating system information terminal, a Windows7 operating system information terminal, and a Windows10 operating system information terminal.
This step corresponds to step S101 of the first aspect, and is not described herein again in the embodiments of the present invention.
S303: the client is utilized to carry out safety detection on the information terminal, and detection items comprise: the method comprises the following steps of one or a combination of login account detection, software detection which must be installed, weak password detection, port detection, unnecessary service process detection, network configuration detection, key configuration file detection, access record and modification record detection of key configuration files and software vulnerability detection.
This step corresponds to step S102 of the first aspect, and is not described herein again in the embodiments of the present invention.
S304: and sending the safety detection result to the server by using the client so that the server judges according to the safety detection result.
This step corresponds to step S103 of the first aspect, and is not described herein again in this embodiment of the present invention.
S305: receiving a safety detection result, and judging whether the information terminal has a risk item according to the safety detection result; if so, generating a risk item repair file, and sending the risk item repair file to a client so that the information terminal carries out risk repair according to the risk item repair file;
this step corresponds to steps S202 and S203 of the second aspect, and the embodiment of the present invention is not described herein again.
S306: and receiving a repair file sent by a server side, and repairing the risk item according to the repair file.
This step corresponds to step S104 of the first aspect, and is not described herein again in the embodiments of the present invention.
At present, a safety system of the power information network is initially established, the power information network and a power operation real-time control network are isolated, and a firewall, network antivirus software and data backup equipment are arranged between the networks. However, the safety of the power information network is unbalanced, and there are many potential safety hazards in the network, mainly including: the system itself has security holes (which can be used by attackers), irregular operation of internal personnel, viruses from the external Internet, malicious attacks, security management holes, and the like. The damage of network virus to mail server and host system, network slowing caused by network virus, system failure to respond normally, etc. have been found in power information network. Because the network scale of the power information network is large, the number of network users is large, the safety systems of all units are uneven, and a uniform and effective control means is lacked. Table 1 lists the major risks faced in the power information grid.
TABLE 1
Risks Description of the invention
Illegal use Using computer or network resources by unauthorized users
Spoofing IP address spoofing attacks
Camouflage The intruder pretends to be legal identity and logs in the power information system
Denial of service Sending large amount of avalanche data to communication gateway to cause network or monitoring system to be paralyzed
Interruption of a memory Interrupting communication inside or outside information system
Terminal security hole Network security out of control
Malicious program Computer worm, trojan, logic bomb and other internet security
As shown in table 1, part of employees in the company currently have unconscious behaviors and insufficient security consciousness in using their own terminal devices, and bring certain security risks to the access of the information network, which mainly appear in the following aspects:
(1) the safety maintenance of the daily terminal is not in place: some employees are sparsely arranged in setting a strong password, updating the password regularly or installing the latest patch, and do not deal with infected viruses, and the terminal is in a sub-health state for operation.
(2) Weak safety consciousness: disorder of use of the internal and external networks: due to the condition limitation of company units, most employees cannot realize dual-network dual-computer, and due to weak security consciousness, in order to access the internet, the intranet terminal is connected and interconnected privately through electronic equipment such as a 4G wireless network card and a smart phone, so that an illegal external connection information security event is caused.
(3) Software was installed at will: and related software is randomly installed by part of staff, and the software automatically opens related services and ports, so that an intrusion gate is opened for an intruder.
Aiming at the situation, the embodiment of the invention realizes unified automatic and accurate automatic detection and monitoring of the information terminals of different systems by developing a terminal security risk assessment auditing tool so as to improve the security and reliability of the terminal and ensure the security of the terminal, thereby ensuring the security of the whole information network.
By applying the embodiment of the invention shown in fig. 3, the client is installed on the operating system terminals of each version, the information terminal is subjected to security detection by using the client, and the risk items of the information terminal are repaired, so that the security of the information terminal can be improved, and the security risk of information management is further reduced.
In a fourth aspect, corresponding to the first aspect of the present invention, an embodiment of the present invention provides a terminal security risk assessment management apparatus.
Fig. 4 is a schematic structural diagram of a first terminal security risk assessment management device according to an embodiment of the present invention, as shown in fig. 4, applied to an information terminal, where the device includes:
a first receiving module 401, configured to receive a push instruction sent by a server, so as to install client software on each information terminal, where the information terminal includes: a Windows xp operating system information terminal, a Windows7 operating system information terminal, a Windows10 operating system information terminal;
a detection module 402, configured to perform security detection on the information terminal by using the client, where the detection items include: detecting a login account, detecting software which needs to be installed, detecting a weak password, detecting a port, detecting an unnecessary service process, detecting network configuration, detecting a key configuration file, detecting an access record and a modification record of the key configuration file, and detecting software bugs;
a sending module 403, configured to send the security detection result to the server by using the client, so that the server performs a determination according to the security detection result;
a second receiving module 404, configured to receive the repair file sent by the server, and repair the risk item according to the repair file.
By applying the embodiment shown in fig. 4 of the invention, the client is installed on the operating system terminals of each version, the information terminal is subjected to security detection by using the client, and the risk items of the information terminal are repaired, so that the security of the information terminal can be improved, and the security risk of information management is further reduced.
In a specific implementation manner of the embodiment of the present invention, the detecting module 402 is configured to:
detecting whether the number of account numbers in the information terminal exceeds a set value or not;
or,
detecting whether a forbidden account exists in the account logged in the information terminal;
in a specific implementation manner of the embodiment of the present invention, the detecting module 402 is configured to:
and acquiring a list of hardware ports and open ports in software ports in the information terminal.
In a specific implementation manner of the embodiment of the present invention, the detecting module 402 is configured to: and acquiring the number of network cards in the information terminal.
In a specific implementation manner of the embodiment of the present invention, the detecting module 402 is configured to:
and scanning registry information of the information terminal to obtain a list of unnecessary service processes opened by the information terminal.
In a specific implementation manner of the embodiment of the present invention, the detecting module 402 is configured to:
and detecting the strength of each password in the information terminal by using a preset dictionary library, and acquiring a strength list of each password.
In a specific implementation manner of the embodiment of the present invention, the second receiving module 404 is configured to:
and receiving a repair script sent by a server, and executing the script to close a port corresponding to the script and a service process.
In a specific implementation manner of the embodiment of the present invention, the second receiving module 404 is configured to:
and receiving a patch file sent by a server and installing the patch.
In a specific implementation manner of the embodiment of the present invention, the second receiving module 404 is configured to:
and receiving the weak password modification list file, and informing a user to modify the corresponding weak password within the appointed time according to the weak password modification list file.
In a specific implementation manner of the embodiment of the present invention, the second receiving module 404 is configured to:
and receiving a forbidden account list sent by the server, and forbidding a corresponding account according to the forbidden account list.
In a fifth aspect, corresponding to the second aspect of the present invention, an embodiment of the present invention provides another terminal security risk assessment management apparatus.
Fig. 5 is a schematic structural diagram of a second terminal security risk assessment management device according to an embodiment of the present invention, as shown in fig. 5, applied to a server, where the method includes:
the generating module 501 is configured to generate a push instruction, and send the push instruction to an information terminal, so that the information terminal installs client software according to the push instruction;
a third receiving module 502, configured to receive a security detection result, and determine whether a risk item occurs in the information terminal according to the security detection result;
and a repairing module 503, configured to generate a risk item repairing file if the determination result of the third receiving module is yes, and send the risk item repairing file to the client, so that the information terminal performs risk repairing according to the risk item repairing file.
By applying the embodiment of the invention shown in fig. 5, the client is installed on the operating system terminals of each version, the information terminal is subjected to security detection by using the client, and the risk items of the information terminal are repaired, so that the security of the information terminal can be improved, and the security risk of information management is further reduced.
In a specific implementation manner of the embodiment of the present invention, the apparatus further includes: the judging module is used for judging whether the risk items corresponding to the safety detection results can be repaired or not;
and if not, isolating the client corresponding to the safety detection result.
Fig. 6 is a schematic structural diagram of a terminal security risk assessment management system according to an embodiment of the present invention, and as shown in fig. 6, the system includes:
a terminal security risk assessment management device 601 according to the fourth aspect above, and,
another terminal security risk assessment management device 602 according to the fifth aspect is described above.
By applying the embodiment of the invention shown in fig. 6, the client is installed on the operating system terminals of each version, the information terminal is subjected to security detection by using the client, and the risk items of the information terminal are repaired, so that the security of the information terminal can be improved, and the security risk of information management is further reduced.
Fig. 7 is a schematic structural diagram of another terminal security risk assessment management system according to an embodiment of the present invention, and as shown in fig. 7, the embodiment of the present invention may be divided into an object layer, a scheduling layer, an implementation layer, and an application layer on a specific deployment, where,
1. the object layer is divided into three network elements of Windows7, Windows XP and Windows10, and because of the difference of terminal operating systems, client programs (such as Windows service and visual client programs) with uniform versions are developed to install the terminal equipment.
2. The scheduling layer is mainly a data transmission interface, the interface transmits data in an HTTP interface mode, and the HTTP interface is mainly divided into two aspects:
data transmission of the tool (information transmission of the equipment, patch downloading transmission);
and the abnormal terminal information is transmitted and linked with the firewall and the core switch to realize the network disconnection function.
3. The implementation layer transmits data to the firewall and the core switch through the WebService interface, and realizes the function of 'network disconnection' by adding a security strategy.
4. The application layer provides a service management function facing management personnel by adopting a B/S framework mode, and mainly provides management functions of terminal equipment visualization display, security audit item maintenance, patch management, patch installation records and the like.
By applying the embodiment shown in fig. 7 of the present invention, the client is installed on the operating system terminal of each version, the information terminal is subjected to security detection by using the client, and the risk item of the information terminal is repaired, so that the security of the information terminal can be improved, and the security risk of information management can be further reduced.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.

Claims (10)

1. A terminal security risk assessment management method is applied to an information terminal, and comprises the following steps:
receiving a push instruction sent by a server to install client software on each information terminal, wherein the information terminal comprises: a Windows xp operating system information terminal, a Windows7 operating system information terminal, a Windows10 operating system information terminal;
the client is utilized to carry out safety detection on the information terminal, and detection items comprise: detecting a login account, detecting software which needs to be installed, detecting a weak password, detecting a port, detecting an unnecessary service process, detecting network configuration, detecting a key configuration file, detecting an access record and a modification record of the key configuration file, and detecting software bugs;
sending a safety detection result to a server by using a client so that the server judges according to the safety detection result;
and receiving a repair file sent by a server side, and repairing the risk item according to the repair file.
2. The terminal security risk assessment management method according to claim 1, wherein the login account detection includes: detecting whether the number of account numbers in the information terminal exceeds a set value or not; or detecting whether a forbidden account exists in the account logged in the information terminal;
the port detection includes: acquiring a list of hardware ports and open ports in software ports in an information terminal;
the network configuration detection comprises: acquiring the number of network cards in the information terminal;
the unnecessary service process detection comprises the following steps: scanning registry information of the information terminal, and acquiring a list of unnecessary service processes opened by the information terminal;
the weak password detection includes: and detecting the strength of each password in the information terminal by using a preset dictionary library, and acquiring a strength list of each password.
3. The method for managing terminal security risk assessment according to claim 1, wherein the receiving of the repair file sent by the server and the repair of the risk item according to the repair file comprises: receiving a repair script sent by a server, and executing the script to close a port corresponding to the script and a service process;
or receiving a patch file sent by a server and installing the patch;
or receiving the weak password modification list file, and informing the user to modify the corresponding weak password within the appointed time according to the weak password modification list file.
4. The terminal security risk assessment management method according to claim 1, wherein sending a security detection result to a server by using a client, so that the server performs judgment according to the security detection result, comprises:
and receiving a forbidden account list sent by the server, and forbidding a corresponding account according to the forbidden account list.
5. A terminal security risk assessment management method is applied to a server side, and comprises the following steps:
generating a push instruction, and sending the push instruction to an information terminal so that the information terminal installs client software according to the push instruction;
receiving a safety detection result, and judging whether the information terminal has a risk item according to the safety detection result;
and if so, generating a risk item repair file, and sending the risk item repair file to the client so that the information terminal carries out risk repair according to the risk item repair file.
6. The terminal security risk assessment management method according to claim 5, wherein after receiving the security detection result, before determining whether the information terminal has the risk item according to the security detection result, the method further comprises: judging whether the risk items corresponding to the safety detection results can be repaired or not;
and if not, isolating the client corresponding to the safety detection result.
7. A terminal security risk assessment management method is characterized by comprising the following steps:
generating a push instruction, and sending the push instruction to an information terminal so that the information terminal installs client software according to the push instruction;
receiving a push instruction sent by a server to install client software on each information terminal, wherein the information terminal comprises: a Windows xp operating system information terminal, a Windows7 operating system information terminal, a Windows10 operating system information terminal;
the client is utilized to carry out safety detection on the information terminal, and detection items comprise: detecting a login account, detecting software which needs to be installed, detecting a weak password, detecting a port, detecting an unnecessary service process, detecting network configuration, detecting a key configuration file, detecting an access record and a modification record of the key configuration file, and detecting software bugs;
sending a safety detection result to a server by using a client so that the server judges according to the safety detection result;
receiving a safety detection result, and judging whether the information terminal has a risk item according to the safety detection result; if so, generating a risk item repair file, and sending the risk item repair file to a client so that the information terminal carries out risk repair according to the risk item repair file;
and receiving a repair file sent by a server side, and repairing the risk item according to the repair file.
8. A terminal security risk assessment management device is applied to an information terminal, and comprises the following components:
the first receiving module is used for receiving a push instruction sent by a server to install client software on each information terminal, wherein the information terminal comprises: a Windows xp operating system information terminal, a Windows7 operating system information terminal, a Windows10 operating system information terminal;
the detection module is used for utilizing the client to carry out safety detection on the information terminal, and detection items comprise: detecting a login account, detecting software which needs to be installed, detecting a weak password, detecting a port, detecting an unnecessary service process, detecting network configuration, detecting a key configuration file, detecting an access record and a modification record of the key configuration file, and detecting software bugs;
the sending module is used for sending the safety detection result to the server by using the client so that the server can judge according to the safety detection result;
and the second receiving module is used for receiving the repair file sent by the server side and repairing the risk item according to the repair file.
9. A terminal security risk assessment management device is applied to a server side, and the device comprises:
the generation module is used for generating a push instruction and sending the push instruction to the information terminal so that the information terminal can install the client software according to the push instruction;
the third receiving module is used for receiving a safety detection result and judging whether the information terminal has a risk item according to the safety detection result;
and the repairing module is used for generating a risk item repairing file and sending the risk item repairing file to the client under the condition that the judgment result of the third receiving module is yes, so that the information terminal carries out risk repairing according to the risk item repairing file.
10. A terminal security risk assessment management system, the system comprising:
a terminal security risk assessment management device according to claim 8, and,
another terminal security risk assessment management device according to claim 9.
CN201910410088.7A 2019-05-16 2019-05-16 A kind of terminal security risk assessment management method, apparatus and system Pending CN110162978A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910410088.7A CN110162978A (en) 2019-05-16 2019-05-16 A kind of terminal security risk assessment management method, apparatus and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910410088.7A CN110162978A (en) 2019-05-16 2019-05-16 A kind of terminal security risk assessment management method, apparatus and system

Publications (1)

Publication Number Publication Date
CN110162978A true CN110162978A (en) 2019-08-23

Family

ID=67631197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910410088.7A Pending CN110162978A (en) 2019-05-16 2019-05-16 A kind of terminal security risk assessment management method, apparatus and system

Country Status (1)

Country Link
CN (1) CN110162978A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111478901A (en) * 2020-04-07 2020-07-31 中国民航信息网络股份有限公司 Account weak password detection method and device, server and storage medium
CN112073584A (en) * 2019-08-27 2020-12-11 烟台中科网络技术研究所 Risk assessment method for App to collect personal sensitive information of user
CN112367224A (en) * 2020-11-11 2021-02-12 全球能源互联网研究院有限公司 Terminal monitoring device, system and method
CN118133292A (en) * 2024-03-20 2024-06-04 深圳市明源云链互联网科技有限公司 System security detection method and device, electronic equipment and readable storage medium
CN118200044A (en) * 2024-05-13 2024-06-14 中移(苏州)软件技术有限公司 Security protection method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1601974A (en) * 2004-10-09 2005-03-30 中国工商银行 Computer auxilary security method and system
CN101894230A (en) * 2010-07-14 2010-11-24 国网电力科学研究院 Static and dynamic analysis technology-based host system security evaluation method
CN103634786A (en) * 2013-11-14 2014-03-12 北京奇虎科技有限公司 Method and system for security detection and repair of wireless network
CN103699489A (en) * 2014-01-03 2014-04-02 中国人民解放军装甲兵工程学院 Software remote fault diagnosis and repair method based on knowledge base
CN104317665A (en) * 2014-09-30 2015-01-28 珠海市君天电子科技有限公司 System detection and repair method, client and server
CN107506259A (en) * 2017-06-26 2017-12-22 努比亚技术有限公司 System repair, terminal and management method, server and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1601974A (en) * 2004-10-09 2005-03-30 中国工商银行 Computer auxilary security method and system
CN101894230A (en) * 2010-07-14 2010-11-24 国网电力科学研究院 Static and dynamic analysis technology-based host system security evaluation method
CN103634786A (en) * 2013-11-14 2014-03-12 北京奇虎科技有限公司 Method and system for security detection and repair of wireless network
CN103699489A (en) * 2014-01-03 2014-04-02 中国人民解放军装甲兵工程学院 Software remote fault diagnosis and repair method based on knowledge base
CN104317665A (en) * 2014-09-30 2015-01-28 珠海市君天电子科技有限公司 System detection and repair method, client and server
CN107506259A (en) * 2017-06-26 2017-12-22 努比亚技术有限公司 System repair, terminal and management method, server and storage medium

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112073584A (en) * 2019-08-27 2020-12-11 烟台中科网络技术研究所 Risk assessment method for App to collect personal sensitive information of user
CN111478901A (en) * 2020-04-07 2020-07-31 中国民航信息网络股份有限公司 Account weak password detection method and device, server and storage medium
CN111478901B (en) * 2020-04-07 2022-07-12 中国民航信息网络股份有限公司 Account weak password detection method and device, server and storage medium
CN112367224A (en) * 2020-11-11 2021-02-12 全球能源互联网研究院有限公司 Terminal monitoring device, system and method
CN118133292A (en) * 2024-03-20 2024-06-04 深圳市明源云链互联网科技有限公司 System security detection method and device, electronic equipment and readable storage medium
CN118200044A (en) * 2024-05-13 2024-06-14 中移(苏州)软件技术有限公司 Security protection method and device, electronic equipment and storage medium
CN118200044B (en) * 2024-05-13 2024-09-13 中移(苏州)软件技术有限公司 Security protection method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110162978A (en) A kind of terminal security risk assessment management method, apparatus and system
Case Analysis of the cyber attack on the Ukrainian power grid
CN110493195B (en) Network access control method and system
CN107395395B (en) Processing method and device of safety protection system
Abouzakhar Critical infrastructure cybersecurity: A review of recent threats and violations
Serhane et al. Programmable logic controllers based systems (PLC-BS): Vulnerabilities and threats
CN103378991A (en) Online service abnormity monitoring method and monitoring system thereof
Dondossola et al. Effects of intentional threats to power substation control systems
Manson et al. Cybersecurity for protection and control systems: An overview of proven design solutions
CN113132412B (en) Computer network security test and inspection method
Jiwen et al. Cyber security vulnerability assessment for Smart substations
CN114625074A (en) Safety protection system and method for DCS (distributed control System) of thermal power generating unit
CN114629677A (en) Safety protection system and method for thermal power generating unit electric quantity charging system
Zhang et al. Investigating the impact of cyber attacks on power system reliability
CN116962149A (en) Network fault detection method and device, storage medium and electronic equipment
CN110086812B (en) Safe and controllable internal network safety patrol system and method
Schneider et al. Cyber security maintenance for SCADA systems
Carr Development of a tailored methodology and forensic toolkit for industrial control systems incident response
Li et al. Research on attack mechanism of network intrusion in industrial control system
CN114329444A (en) System safety improving method and device
US11108800B1 (en) Penetration test monitoring server and system
Robinson et al. A cyber-defensive industrial control system with redundancy and intrusion detection
JP7150425B2 (en) COMMUNICATION SYSTEM, CONTROL DEVICE, COMMUNICATION CONTROL METHOD, AND PROGRAM
Antonov et al. Method for risk evaluation of functional instability of hardware and software systems under external information technology interference
Lekidis Cyber-attack TTP analysis for EPES systems

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190823

RJ01 Rejection of invention patent application after publication