CN113673966A - Information security construction scheme generation method and device, electronic equipment and storage medium - Google Patents

Information security construction scheme generation method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113673966A
CN113673966A CN202111033514.3A CN202111033514A CN113673966A CN 113673966 A CN113673966 A CN 113673966A CN 202111033514 A CN202111033514 A CN 202111033514A CN 113673966 A CN113673966 A CN 113673966A
Authority
CN
China
Prior art keywords
information
information security
topological graph
text content
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202111033514.3A
Other languages
Chinese (zh)
Other versions
CN113673966B (en
Inventor
张新硕
刘焕焕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Haier Digital Technology Qingdao Co Ltd
Haier Caos IoT Ecological Technology Co Ltd
Qingdao Haier Industrial Intelligence Research Institute Co Ltd
Original Assignee
Haier Digital Technology Qingdao Co Ltd
Haier Caos IoT Ecological Technology Co Ltd
Qingdao Haier Industrial Intelligence Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Haier Digital Technology Qingdao Co Ltd, Haier Caos IoT Ecological Technology Co Ltd, Qingdao Haier Industrial Intelligence Research Institute Co Ltd filed Critical Haier Digital Technology Qingdao Co Ltd
Priority to CN202111033514.3A priority Critical patent/CN113673966B/en
Publication of CN113673966A publication Critical patent/CN113673966A/en
Application granted granted Critical
Publication of CN113673966B publication Critical patent/CN113673966B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention provides a method and a device for generating an information security construction scheme, electronic equipment and a storage medium, wherein a current network topological graph is obtained; receiving an operation instruction for adding an information security product in a current network topological graph, wherein the operation instruction comprises a target type and a target adding position of the newly added information security product; adding a target type of newly added information security product at a target adding position of the current network topological graph to generate a target network topological graph; and generating text contents of the information security construction scheme according to at least one item of the target network topological graph, the preset description information of the newly added information security product and the preset information related to the information security construction scheme. By automatically generating the text content of the information security construction scheme, the problems of uneven quality, missing or inaccurate product introduction, function description and the like, incomplete scheme consideration and the like in manual writing are avoided, the unified format can be ensured, and the efficiency and the quality of the information security construction scheme are improved.

Description

Information security construction scheme generation method and device, electronic equipment and storage medium
Technical Field
The invention belongs to the technical field of network information security, and particularly relates to a method and a device for generating an information security construction scheme, electronic equipment and a storage medium.
Background
With the rapid development of the internet era, the application of information technology rapidly permeates into each field of social economy, people increasingly rely on computer and network technology for work and life, the information security problem becomes the most basic problem for enterprises, and information security construction schemes are generally required to be written when information security construction is carried out.
In the prior art, information security construction schemes are usually written manually, the written information security construction schemes may have uneven quality, product introduction, function description and the like are missing or inaccurate, the schemes are not considered thoroughly, fonts, typesetting, styles, colors and the like also need to be manually adjusted and are not uniform, and the efficiency and the quality of the information security construction schemes are affected.
Disclosure of Invention
The invention provides an information security construction scheme generation method and device, electronic equipment and a storage medium, and aims to automatically generate an information security construction scheme.
The first aspect of the present invention provides an information security construction scheme generating method, where the method includes:
acquiring a current network topological graph;
receiving an operation instruction for adding an information security product in the current network topological graph, wherein the operation instruction comprises a target type and a target adding position of the newly added information security product;
adding the newly added information safety products of the target type at the target adding position of the current network topological graph to generate a target network topological graph;
and generating text contents of the information security construction scheme according to at least one of the target network topological graph, the preset description information of the newly added information security product and the preset information related to the information security construction scheme.
Optionally, the text content of the information security construction scheme includes at least one of the following:
the method comprises the following steps of describing the text content of the security defect of the current network, the text content of the security requirement, the text content of the security protection scheme and the text content of the security compliance description.
Optionally, the generating the text content of the information security construction scheme according to at least one of the target network topology, the preset description information of the newly added information security product, and the preset information related to the information security construction scheme includes:
generating the text content of the security defect description and/or the text content of the security requirement of the current network according to the function description information of the newly added information security product and/or the preset security defect information; and/or
Generating text contents of a safety protection scheme according to the target network topological graph and preset function description information of the newly added information safety product; and/or
And generating text content of safety compliance description according to the function description information of the newly added information safety product and a preset safety standard.
Optionally, the obtaining the current network topology includes:
receiving a network topological graph drawing instruction, and drawing a current network topological graph in an interface according to the network topological graph drawing instruction; or
And importing a preset current network topological graph.
Optionally, the text content of the information security construction scheme further includes a text content of current network status description; the method further comprises the following steps:
and generating text content of the current network status description according to the current network topological graph.
Optionally, the text content of the information security construction scheme further includes text content described in the project embodiment, and the method further includes:
receiving input personnel configuration instructions and/or implementation-related information;
and generating the text content of the project embodiment description according to the personnel configuration instruction and/or the embodiment related information.
Optionally, the text content of the information security construction scheme further includes text content described in a project implementation plan and/or text content described in a project acceptance scheme, and the method further includes:
and receiving an input project progress chart, and generating text content described by the project implementation plan and/or text content described by the project acceptance scheme according to the project progress chart.
A second aspect of the present invention provides an information security construction scheme generating apparatus, including:
the acquisition module is used for acquiring a current network topological graph;
the topological graph processing module is used for receiving an operation instruction for adding an information security product in the current network topological graph, wherein the operation instruction comprises a target type and a target adding position of the newly added information security product; adding the newly added information safety products of the target type at the target adding position of the current network topological graph to generate a target network topological graph;
and the generating module is used for generating the text content of the information security construction scheme according to at least one of the target network topological graph, the preset description information of the newly added information security product and the preset information related to the information security construction scheme.
Optionally, the text content of the information security construction scheme includes at least one of the following:
the method comprises the following steps of describing the text content of the security defect of the current network, the text content of the security requirement, the text content of the security protection scheme and the text content of the security compliance description.
Optionally, when the generating module generates the text content of the information security construction scheme according to at least one of the target network topology, the preset description information of the newly added information security product, and the preset information related to the information security construction scheme, the generating module is configured to:
generating the text content of the security defect description and/or the text content of the security requirement of the current network according to the function description information of the newly added information security product and/or the preset security defect information; and/or
Generating text contents of a safety protection scheme according to the target network topological graph and preset function description information of the newly added information safety product; and/or
And generating text content of safety compliance description according to the function description information of the newly added information safety product and a preset safety standard.
Optionally, when the obtaining module obtains the current network topology map, the obtaining module is configured to:
receiving a network topological graph drawing instruction, and drawing a current network topological graph in an interface according to the network topological graph drawing instruction; or
And importing a preset current network topological graph.
Optionally, the text content of the information security construction scheme further includes a text content of current network status description; the generation module is further to:
and generating text content of the current network status description according to the current network topological graph.
Optionally, the text content of the information security construction scheme further includes text content of project implementation description;
the acquisition module is also used for receiving input personnel configuration instructions and/or implementation scheme related information;
the generating module is further used for generating text content of the project implementation scheme description according to the personnel configuration instruction and/or the implementation related information.
Optionally, the text content of the information security construction scheme further includes text content described in a project implementation plan and/or text content described in a project acceptance scheme, and the method further includes:
the acquisition module is further used for receiving an input project progress chart;
the generating module is also used for generating the text content described by the project implementation plan and/or the text content described by the project acceptance scheme according to the project progress chart.
A third aspect of the present invention is to provide an electronic apparatus, comprising:
a memory for storing a computer program;
a processor for executing a computer program stored in the memory to implement the method according to the first aspect.
A fourth aspect of the present invention is to provide a computer-readable storage medium having stored thereon a computer program;
which when executed by a processor implements the method according to the first aspect.
According to the information security construction scheme generation method, the information security construction scheme generation device, the electronic equipment and the storage medium, the current network topological graph is obtained; receiving an operation instruction for adding an information security product in a current network topological graph, wherein the operation instruction comprises a target type and a target adding position of the newly added information security product; adding a target type of newly added information security product at a target adding position of the current network topological graph to generate a target network topological graph; and generating text contents of the information security construction scheme according to at least one item of the target network topological graph, the preset description information of the newly added information security product and the preset information related to the information security construction scheme. The text content of the information security construction scheme can be automatically generated, the problems that manual writing is uneven in quality, product introduction, function description and the like are lacked or inaccurate, the scheme is not comprehensive and the like are solved, the unification of formats such as fonts, typesetting, styles, colors and the like can be ensured, and the efficiency and the quality of the information security construction scheme are improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1a is an interface schematic diagram of a method for generating an information security construction scheme according to an embodiment of the present invention;
fig. 1b is an interface schematic diagram of a method for generating an information security construction scheme according to another embodiment of the present invention;
fig. 2 is a flowchart of a method for generating an information security construction scheme according to an embodiment of the present invention;
fig. 3 is a flowchart of a method for generating an information security construction scheme according to another embodiment of the present invention;
fig. 4 is a flowchart of a method for generating an information security construction scheme according to another embodiment of the present invention;
fig. 5 is a structural diagram of an information security construction scheme generation apparatus according to an embodiment of the present invention;
fig. 6 is a block diagram of an electronic device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
With the rapid development of the internet era, the information security problem becomes the most basic problem for enterprises, and information security construction schemes are generally written when information security construction is carried out. In the prior art, information security construction schemes are usually written manually, the written information security construction schemes may have uneven quality, product introduction, function description and the like are missing or inaccurate, the schemes are not considered thoroughly, fonts, typesetting, styles, colors and the like also need to be manually adjusted and are not uniform, and the efficiency and the quality of the information security construction schemes are affected.
In order to solve the technical problems, the invention is expected to solve the problems existing in manual writing by automatically generating the text content of the information security construction scheme, avoid the defects or inaccuracy of product introduction, function description and the like, incomplete scheme consideration, manual adjustment of fonts, typesetting, styles, colors and the like, and influence on the efficiency and quality of the information security construction scheme due to non-uniformity. Specifically, a current network topology map can be obtained; receiving an operation instruction for adding an information security product in a current network topological graph, wherein the operation instruction comprises a target type and a target adding position of the newly added information security product; adding a target type of newly added information security product at a target adding position of the current network topological graph to generate a target network topological graph; and generating text contents of the information security construction scheme according to at least one item of the target network topological graph, the preset description information of the newly added information security product and the preset information related to the information security construction scheme.
The information security construction scheme generation method provided by the invention can be applied to electronic equipment, and the electronic equipment can acquire the current network topological graph; receiving an operation instruction for adding an information security product in a current network topological graph, wherein the operation instruction comprises a target type and a target adding position of the newly added information security product; adding a target type of newly added information security product at a target adding position of the current network topological graph to generate a target network topological graph; specifically, as shown in fig. 1a, the electronic device may provide an interface 110 for drawing and displaying a network topology map, and icons and names of elements such as network products, security products, server products, network connection lines, and other basic network elements in a network may be preconfigured in a first area 111 of the interface 110, where the icons correspond to information security products pre-stored inside the system; the second area 112 may be a network topology drawing and displaying area, and a user may add an icon of a network element in the first area to the second area, for example, by dragging, and connect the elements by using corresponding network connection lines (network lines, optical fibers, hundreds of megabytes, gigabytes, etc.), draw the network topology, as shown in fig. 1a, introduce or draw the current network topology 121 in the second area 112, and add a firewall in the first area 111 to the current network topology 121 according to an operation instruction of adding an information security product in the current network topology 121, so as to obtain a target network topology 122 shown in the second area 112 of fig. 1 b.
Further, generating text contents of the information security construction scheme according to at least one of the target network topological graph, the preset description information of the newly added information security product and the preset information related to the information security construction scheme, and outputting the text contents of the information security construction scheme for guiding the information security construction.
The following explains and explains the information security construction scheme generation process in detail with reference to specific embodiments.
Fig. 2 is a flowchart of a method for generating an information security construction scheme according to an embodiment of the present invention. The embodiment provides an information security construction scheme generation method, an execution subject is electronic equipment, and the method specifically comprises the following steps:
s201, obtaining a current network topological graph.
In this embodiment, the current network topology map may be obtained first, and the network topology map refers to a network structure map composed of network node devices and communication media. The current network topology map may include elements such as network products, security products, server products, network connection lines, etc. in the current network, which are used as a basis for information security construction, that is, new security products, including but not limited to firewalls, antivirus software, etc., are added on the basis of the current network according to requirements or security defects.
Optionally, when the current network topology is obtained, the current network topology can be obtained by importing a preset current network topology; the current network topology map can also be drawn in a drawing mode, specifically, the electronic device can receive a network topology map drawing instruction, and draw the current network topology map in the interface according to the network topology map drawing instruction.
In this embodiment, an interface for drawing and displaying a network topology map may be provided, and icons and names of elements such as network products, security products, server products, network connection lines, and the like in a network may be preconfigured in a first area in the interface, where the icons correspond to information security products pre-stored in the system, and other basic network elements (such as network products, server products, network connection lines, and the like); the second area may be a network topology drawing and displaying area, and the user may add icons of network elements in the first area to the second area, for example, by dragging, and connect the elements by using corresponding network connection lines (network lines, optical fibers, hundreds of megabytes, gigabytes, etc.), so as to draw the network topology.
Of course, the current network topology may also be obtained in other manners, for example, the current network topology is automatically generated according to the input description information of the current network, and the like, which is not described herein any more.
S202, receiving an operation instruction for adding the information security product in the current network topology graph, wherein the operation instruction comprises a target type and a target adding position of the newly added information security product.
In this embodiment, after the current network topology map is obtained, information security products may be added to the current network topology map, specifically, the information security products may be added according to needs or security flaws, for example, a user needs to improve the information security level of a certain device, or a certain device is prevented from being attacked by a virus, or a certain device currently has a certain bug, and a suitable information security product needs to be added according to the needs or security flaws. Specifically, the current network topology map may be displayed, and an operation instruction for adding an information security product may be input on the basis, where the operation instruction includes a target type and a target addition position of the information security product, and for example, a user may drag an icon of the information security product of the target type in the first area of the interface for drawing and displaying the network topology map to the target addition position of the current network topology map displayed in the second area to input the operation instruction for adding the information security product.
S203, adding the newly added information safety products of the target type at the target adding position of the current network topological graph to generate a target network topological graph.
In this embodiment, by inputting an operation instruction for adding an information security product, a new information security product of a target type is added at a target addition position of a current network topology, so as to generate a target network topology of an information security construction scheme.
Optionally, the newly added information security product may be identified in the target network topology, for example, by a specific color, and the like, which is not limited herein.
S204, generating text contents of the information security construction scheme according to at least one item of the target network topological graph, the preset description information of the newly added information security product and the preset information related to the information security construction scheme.
In this embodiment, the preset description information of various information security products, including but not limited to description information such as functions, product models, manufacturers, characteristics, principles, manuals, safety engineer's experience or evaluation, may be preset in the electronic device; in addition, information related to the information security construction scheme can be input or configured in advance, and the information includes but is not limited to user requirement information, personnel information, project schedule and other information required for generating the information security construction scheme. Further, after the target network topology map is obtained, text content of the information security construction scheme may be generated based on at least one of the target network topology map, preset description information of the newly added information security product, and preset information related to the information security construction scheme.
The information security construction scheme comprises but is not limited to design scheme summary, core network system current situation analysis, security requirement analysis, overall scheme design, security technical scheme design, project implementation method and principle, project implementation content, project acceptance scheme, training scheme, related product description and the like. Through the embodiment, one or more information security construction schemes can be automatically generated, and information contained in at least one of the target network topological graph, the preset description information of the newly added information security product and the preset information security construction scheme related information can be edited and sorted according to a specific template or a specific language, so that text content of the required information security construction scheme is obtained for guiding information security construction.
In the method for generating an information security construction scheme provided by the embodiment, a current network topological graph is obtained; receiving an operation instruction for adding an information security product in a current network topological graph, wherein the operation instruction comprises a target type and a target adding position of the newly added information security product; adding a target type of newly added information security product at a target adding position of the current network topological graph to generate a target network topological graph; and generating text contents of the information security construction scheme according to at least one item of the target network topological graph, the preset description information of the newly added information security product and the preset information related to the information security construction scheme. The text content of the information security construction scheme can be automatically generated, the problems that manual writing is uneven in quality, product introduction, function description and the like are lacked or inaccurate, the scheme is not comprehensive and the like are solved, the unification of formats such as fonts, typesetting, styles, colors and the like can be ensured, and the efficiency and the quality of the information security construction scheme are improved.
As a further improvement of the above embodiment, the text content of the information security construction scheme includes at least one of:
the method comprises the following steps of describing the text content of the security defect of the current network, the text content of the security requirement, the text content of the security protection scheme and the text content of the security compliance description. Of course, the information security construction scheme is not limited to the above-listed contents.
On the basis of the foregoing embodiment, in S204, generating text content of the information security construction scheme according to at least one of the target network topology, the preset description information of the newly added information security product, and the preset information related to the information security construction scheme may specifically include:
generating the text content of the security defect description and/or the text content of the security requirement of the current network according to the function description information of the newly added information security product and/or the preset security defect information; and/or
Generating text contents of a safety protection scheme according to the target network topological graph and preset function description information of the newly added information safety product; and/or
And generating text content of safety compliance description according to the function description information of the newly added information safety product and a preset safety standard.
In this embodiment, for the text content of the security defect description and/or the text content of the security requirement of the current network, because the newly added information security product is added in the current network topology map, namely, the existence of some security defects or risks in the current network topology map is explained, the newly added information security product can solve the security defects or risks, that is, the current network topology map has the requirement of solving the security defects or risks, the function description information of the newly added information security product can deduce the security defect and security requirement of the current network, and can also combine the security defect information input in advance to generate the text content of the security defect description and/or the text content of the security requirement of the current network, or generating the text content of the security defect description and/or the text content of the security requirement of the current network only according to the security defect information. For example, the newly added information security device is a firewall, and generated text content described by security defects of the current network, for example, in the current network, access control cannot be performed on traffic accessing the server in the manners of IP addresses, port numbers, and the like, which may cause an attacker to randomly access a port on the server and may invade the server in manners of weak passwords, system vulnerabilities, and the like. Optionally, the security defect information may be input in advance and associated with the target network topology, for example, the security defect information is marked at an icon of the device with the security defect.
In this embodiment, for the text content of the security protection scheme, the preset function description information of the newly added information security product may be obtained, the target newly added position may be determined according to the target network topology, and then the text content of the security protection scheme may be generated based on the target network topology and the preset function description information of the newly added information security product.
In this embodiment, for the text content described in the security compliance, a preset security standard, such as a security compliance standard, a level protection standard, and the like, may be configured in advance, and then, the text content described in the security compliance may be generated in combination with the function description information of the newly added information security product and the preset security standard, and in combination with the information such as the current network environment, for example, the generated text content described in the security compliance, for example, the present scheme needs to meet the level protection three-level standard, and further, the security requirement and the safeguard measure related to the firewall in the level protection three-level standard may be added to the text content described in the security compliance.
Optionally, the text content of the information security construction scheme may further include a text content of current network status description; the method further comprises the following steps:
and generating text content of the current network status description according to the current network topological graph.
In this embodiment, the text content of the current network status description may also be generated according to the icon elements and connections in the current network topology, for example, in the current network, an internet router is connected to an internet outlet, the outlet bandwidth is nGB, the internet router is connected to a network core switch inward, the core switch provides a network data forwarding function, and is connected to an intranet server.
Optionally, the text content of the information security construction scheme may further include text content described in the project embodiment, as shown in fig. 3, and the method further includes:
s301, receiving an input personnel configuration instruction and/or implementation scheme related information;
s302, generating text content of the project embodiment description according to the personnel configuration instruction and/or the embodiment related information.
In this embodiment, the project implementation scheme also needs to be determined, so that personnel configuration and coordination or other related information needs to be determined for the implementation scheme, and therefore, a personnel configuration instruction and/or implementation related information can be input into the electronic device, and text content of the project implementation scheme description is generated according to the input personnel configuration instruction and/or implementation related information. Optionally, the personnel information may be pre-stored in the electronic device and may be displayed in the interface, and the user selects personnel from the interface to perform task allocation and coordination, thereby implementing input of a personnel configuration instruction.
Optionally, the text content of the information security construction scheme may further include text content described in a project implementation plan and/or text content described in a project acceptance scheme, as shown in fig. 4, and the method further includes:
s401, receiving an input project progress chart;
and S402, generating text content described by the project implementation plan and/or text content described by the project acceptance scheme according to the project progress chart.
In this embodiment, the project progress chart may be a Gantt chart (Gantt chart), also called a cross-track chart, a Bar chart (Bar chart) of the project, and displays a case that an intrinsic relationship between the project, the progress, and other time-related system progress progresses along with time through the Bar chart, or other forms of project progress charts or plan information, so that a text content described in the project implementation plan and/or a text content described in the project acceptance scheme may be generated based on the project progress chart.
As an example, the information security construction scheme may specifically include, but is not limited to, a design scheme overview, a core network system status analysis, a security requirement analysis, a general scheme design, a security technical scheme design, a project implementation method and principle, a project implementation content, a project acceptance scheme, a training scheme, a related product description, and the like.
Optionally, the design summary may include a compilation background, a compilation purpose, construction content, and the like; the core network system current situation analysis comprises core machine room information system current situation, comprehensive network information system current situation, system current situation analysis, physical environment analysis, network condition analysis, application system analysis, network equipment condition, server equipment condition, safety equipment condition, management system description and the like;
the safety requirement analysis can comprise system grading suggestion, grading object determination, system grading determination, safety risk analysis, physical safety risk, network safety risk, safety risk of network communication link, safety risk of network boundary, safety risk of network access, host safety risk, server safety risk, client terminal safety risk, application safety risk, business application safety risk, data safety risk, management risk, safety organization construction risk, safety system risk, personnel risk, system construction management risk, safety requirement analysis, requirement meeting the grade protection technical requirement, requirement meeting the grade protection management requirement, requirement meeting self safety protection, physical layer safety requirement, network layer safety requirement, host layer safety requirement, application layer safety requirement and the like;
the overall scheme design can comprise design purposes, design principles, design reference standards, information system security level protection standards and specifications, other information security standards and specifications, overall security scheme design outlines, domain-divided control systems, deep defense systems, consistent security strength, overall security policy design, physical security policies, environmental protection policies, boundary protection policies, regulatory policies, network security policies, secure network topology policies, access control policies, network intrusion detection policies, network security audit policies, operational security policies, system security policies, virus protection policies, terminal security management, software security inspection, operational security policies, application security policies, backup and recovery policies, application system reinforcement, security management policies and the like;
the safety technical scheme design can comprise a system overall safety scheme design schematic diagram, a physical safety design, a network access control, requirements on the network access control in level protection, firewall system deployment, network intrusion protection, requirements on the network intrusion protection in the level protection, network intrusion defense system deployment, a network virus wall design, a log audit system design, technical requirements on the network audit by the level protection, log audit system deployment, other network safety designs, technical requirements on other aspects of the level protection network safety, technical realization on other network safety protection, network equipment safety reinforcement, host safety design, system host and terminal malicious code prevention, technical requirements and realization on host malicious code prevention in the level protection, virus prevention system deployment, operation and maintenance audit system (bastion machine) design, and the like, The technical requirements and implementation of operation and maintenance auditing in level protection, the deployment of an operation and maintenance auditing system (bastion machine), the safety design of other hosts, the technical requirements of other aspects of the safety of the level protection host, the safety reinforcement of a server operating system, the safety reinforcement measures of a database, the application safety design, the technical requirements of application safety protection for equal protection, the technical implementation of application safety protection, the data safety and backup recovery design, the technical requirements of data safety and backup recovery for equal protection, the technical implementation of data safety and backup recovery, and the safety reinforcement measures of the database;
the project implementation scheme comprises a project implementation method and principle, a project management method, a project implementation principle, project implementation and technical service localization, reasonable division of labor, effective coordination, implementation reference standard, project implementation content, project preparation, a project implementation overall process, project implementation task decomposition, project quality control and guarantee, project implementation documents, a project implementation plan time table, project implementation specifications, equipment installation and racking specifications, equipment cable connection specifications, civilized construction specifications, implementation tool preparation and the like;
project acceptance schemes can comprise acceptance purposes, acceptance stage division, project testing and acceptance schemes, project document and document handover during acceptance and the like;
the training scheme comprises training targets, training modes, training means, specialized detailed training materials, multimedia teaching, on-board operation, training institutions, training arrangement, on-site training, training purposes, training objects, training plans, training contents, course arrangement, student assessment and the like;
the product description may include product profiles, product characteristics, product functions, product performance, operating environments and standards, product color sheets, and the like.
The content can be automatically generated based on at least one of the current network topological graph, the target network topological graph, the preset description information of the newly added information security product, the preset information security construction scheme related information and the input various information, the obtained information security construction scheme has high text content quality, complete content, unified formats such as fonts, typesetting, styles, colors and the like, manual writing is not needed, and the efficiency and the quality of the information security construction scheme are improved.
Fig. 5 is a structural diagram of an information security construction scenario generation apparatus according to an embodiment of the present invention. The information security construction scheme generating apparatus provided in this embodiment may execute the processing flow provided in the information security construction scheme generating method embodiment, as shown in fig. 5, the information security construction scheme generating apparatus 500 includes an obtaining module 501, a topological graph processing module 502, and a generating module 503.
An obtaining module 501, configured to obtain a current network topology map;
a topology map processing module 502, configured to receive an operation instruction for adding an information security product to the current network topology map, where the operation instruction includes a target type and a target addition position of the newly added information security product; adding the newly added information safety products of the target type at the target adding position of the current network topological graph to generate a target network topological graph;
a generating module 503, configured to generate a text content of the information security construction scheme according to at least one of the target network topology, the preset description information of the newly added information security product, and the preset information related to the information security construction scheme.
On the basis of any one of the above embodiments, the text content of the information security construction scheme includes at least one of the following:
the method comprises the following steps of describing the text content of the security defect of the current network, the text content of the security requirement, the text content of the security protection scheme and the text content of the security compliance description.
On the basis of any of the above embodiments, when the generating module 503 generates the text content of the information security construction scheme according to at least one of the target network topology, the preset description information of the newly added information security product, and the preset information related to the information security construction scheme, the generating module is configured to:
on the basis of any one of the above embodiments, generating a text content of the security defect description and/or a text content of the security requirement of the current network according to the function description information of the newly added information security product and/or the preset security defect information; and/or
Generating text contents of a safety protection scheme according to the target network topological graph and preset function description information of the newly added information safety product; and/or
And generating text content of safety compliance description according to the function description information of the newly added information safety product and a preset safety standard.
On the basis of any one of the above embodiments, the text content of the information security construction scheme further includes the text content of the current network status description; the generating module 503 is further configured to:
and generating text content of the current network status description according to the current network topological graph.
On the basis of any one of the above embodiments, the text content of the information security construction scheme further includes the text content described in the project embodiment;
the obtaining module 501 is further configured to receive an input personnel configuration instruction and/or implementation-related information;
the generating module 503 is further configured to generate text content of the project embodiment description according to the personnel configuration instruction and/or the embodiment related information.
On the basis of any one of the above embodiments, the text content of the information security construction scheme further includes text content described in a project implementation plan and/or text content described in a project acceptance scheme, and the method further includes:
the obtaining module 501 is further configured to receive an input project schedule;
the generating module 503 is further configured to generate the text content described by the project implementation plan and/or the text content described by the project acceptance scheme according to the project progress diagram.
The information security construction scheme generating device provided in the embodiment of the present invention may be specifically configured to execute the method embodiments provided in fig. 2 to 4, and specific functions are not described herein again.
The information security construction scheme generation device provided by the embodiment of the invention acquires the current network topological graph; receiving an operation instruction for adding an information security product in a current network topological graph, wherein the operation instruction comprises a target type and a target adding position of the newly added information security product; adding a target type of newly added information security product at a target adding position of the current network topological graph to generate a target network topological graph; and generating text contents of the information security construction scheme according to at least one item of the target network topological graph, the preset description information of the newly added information security product and the preset information related to the information security construction scheme. The text content of the information security construction scheme can be automatically generated, the problems that manual writing is uneven in quality, product introduction, function description and the like are lacked or inaccurate, the scheme is not comprehensive and the like are solved, the unification of formats such as fonts, typesetting, styles, colors and the like can be ensured, and the efficiency and the quality of the information security construction scheme are improved.
Fig. 6 is a schematic structural diagram of an electronic device according to an embodiment of the present invention. The electronic device provided in the embodiment of the present invention may execute the processing procedure provided in the embodiment of the information security construction scheme generation method, as shown in fig. 6, the electronic device 60 includes a memory 61, a processor 62, and a computer program; wherein the computer program is stored in the memory 61 and configured to be executed by the processor 62 to perform the information security construction scheme generation method described in the above embodiments. In addition, the electronic device 60 may also have a communication interface 63 for transmitting control instructions and data.
The electronic device of the embodiment shown in fig. 6 may be used to implement the technical solution of the above method embodiment, and the implementation principle and technical effect are similar, which are not described herein again.
In addition, the present embodiment also provides a computer-readable storage medium, on which a computer program is stored, the computer program being executed by a processor to implement the information security construction scheme generating method described in the above embodiment.
In addition, the present embodiment also provides a computer program product, which includes a computer program, and the computer program is executed by a processor to implement the information security construction scheme generating method described in the foregoing embodiment.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. An information security construction scheme generation method is characterized by comprising the following steps:
acquiring a current network topological graph;
receiving an operation instruction for adding an information security product in the current network topological graph, wherein the operation instruction comprises a target type and a target adding position of the newly added information security product;
adding the newly added information safety products of the target type at the target adding position of the current network topological graph to generate a target network topological graph;
and generating text contents of the information security construction scheme according to at least one of the target network topological graph, the preset description information of the newly added information security product and the preset information related to the information security construction scheme.
2. The method of claim 1, wherein the textual content of the information security construction scheme comprises at least one of:
the method comprises the following steps of describing the text content of the security defect of the current network, the text content of the security requirement, the text content of the security protection scheme and the text content of the security compliance description.
3. The method according to claim 2, wherein the generating the text content of the information security construction scheme according to at least one of the target network topology, the preset description information of the newly added information security product, and the preset information related to the information security construction scheme includes:
generating the text content of the security defect description and/or the text content of the security requirement of the current network according to the function description information of the newly added information security product and/or the preset security defect information; and/or
Generating text contents of a safety protection scheme according to the target network topological graph and preset function description information of the newly added information safety product; and/or
And generating text content of safety compliance description according to the function description information of the newly added information safety product and a preset safety standard.
4. The method according to any of claims 1-3, wherein the obtaining the current network topology map comprises:
receiving a network topological graph drawing instruction, and drawing a current network topological graph in an interface according to the network topological graph drawing instruction; or
And importing a preset current network topological graph.
5. The method according to claim 1, wherein the text content of the information security construction scheme further comprises text content of a current network status quo description; the method further comprises the following steps:
and generating text content of the current network status description according to the current network topological graph.
6. The method of claim 1, wherein the textual content of the information security construction scheme further comprises textual content of project embodiment descriptions, the method further comprising:
receiving input personnel configuration instructions and/or implementation-related information;
and generating the text content of the project embodiment description according to the personnel configuration instruction and/or the embodiment related information.
7. The method of claim 1, wherein the textual content of the information security construction plan further comprises textual content of a project implementation plan description and/or textual content of a project acceptance plan description, the method further comprising:
and receiving an input project progress chart, and generating text content described by the project implementation plan and/or text content described by the project acceptance scheme according to the project progress chart.
8. An information security construction scheme generation device, comprising:
the acquisition module is used for acquiring a current network topological graph;
the topological graph processing module is used for receiving an operation instruction for adding an information security product in the current network topological graph, wherein the operation instruction comprises a target type and a target adding position of the newly added information security product; adding the newly added information safety products of the target type at the target adding position of the current network topological graph to generate a target network topological graph;
and the generating module is used for generating the text content of the information security construction scheme according to at least one of the target network topological graph, the preset description information of the newly added information security product and the preset information related to the information security construction scheme.
9. An electronic device, comprising:
a memory for storing a computer program;
a processor for executing a computer program stored in the memory to implement the method of any one of claims 1-7.
10. A computer-readable storage medium, having stored thereon a computer program;
the computer program, when executed by a processor, implementing the method of any one of claims 1-7.
CN202111033514.3A 2021-09-03 2021-09-03 Information security construction scheme generation method and device, electronic equipment and storage medium Active CN113673966B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111033514.3A CN113673966B (en) 2021-09-03 2021-09-03 Information security construction scheme generation method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111033514.3A CN113673966B (en) 2021-09-03 2021-09-03 Information security construction scheme generation method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113673966A true CN113673966A (en) 2021-11-19
CN113673966B CN113673966B (en) 2024-03-08

Family

ID=78548412

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111033514.3A Active CN113673966B (en) 2021-09-03 2021-09-03 Information security construction scheme generation method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113673966B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1420317A2 (en) * 2002-10-21 2004-05-19 Rockwell Automation Technologies, Inc. System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
US20070206512A1 (en) * 2006-03-03 2007-09-06 Nortel Networks Limited Network data model and topology discovery method
US20120317050A1 (en) * 2010-02-15 2012-12-13 Db Systel Gmbh Method, computer program product and computer-readable storage medium for the generic creation of a structure tree for describing an it process
US20150193558A1 (en) * 2012-09-26 2015-07-09 Korea Electric Power Corporation Method and device for generating engineering topology of digital substation
CN107682211A (en) * 2017-11-14 2018-02-09 华信咨询设计研究院有限公司 A kind of network topology structure determination method, device and computer-readable recording medium
CN107888419A (en) * 2017-11-14 2018-04-06 广东电网有限责任公司电力科学研究院 A kind of switch network Topology g eneration method and device
CN108737137A (en) * 2017-04-18 2018-11-02 国家计算机网络与信息安全管理中心 The method, apparatus of network topology, system and computer-readable medium for identification
CN109861846A (en) * 2018-12-25 2019-06-07 顺丰科技有限公司 Using call relation acquisition methods, system and storage medium
CN109936474A (en) * 2018-12-28 2019-06-25 上海云轴信息科技有限公司 A kind of method and apparatus generating network topological diagram
CN110750975A (en) * 2019-10-21 2020-02-04 北京明略软件系统有限公司 Introduction text generation method and device
CN111966890A (en) * 2020-06-30 2020-11-20 北京百度网讯科技有限公司 Text-based event pushing method and device, electronic equipment and storage medium
CN112733515A (en) * 2020-12-31 2021-04-30 贝壳技术有限公司 Text generation method and device, electronic equipment and readable storage medium
CN112835998A (en) * 2020-12-31 2021-05-25 国家电网公司华中分部 Generation method of power grid dynamic topological graph
CN112948110A (en) * 2021-02-23 2021-06-11 上海宽带技术及应用工程研究中心 Topology and arrangement system and method of cloud application, storage medium and electronic device
CN113158189A (en) * 2021-04-28 2021-07-23 绿盟科技集团股份有限公司 Method, device, equipment and medium for generating malicious software analysis report

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1420317A2 (en) * 2002-10-21 2004-05-19 Rockwell Automation Technologies, Inc. System and methodology providing automation security analysis, validation, and learning in an industrial controller environment
US20070206512A1 (en) * 2006-03-03 2007-09-06 Nortel Networks Limited Network data model and topology discovery method
US20120317050A1 (en) * 2010-02-15 2012-12-13 Db Systel Gmbh Method, computer program product and computer-readable storage medium for the generic creation of a structure tree for describing an it process
US20150193558A1 (en) * 2012-09-26 2015-07-09 Korea Electric Power Corporation Method and device for generating engineering topology of digital substation
CN108737137A (en) * 2017-04-18 2018-11-02 国家计算机网络与信息安全管理中心 The method, apparatus of network topology, system and computer-readable medium for identification
CN107888419A (en) * 2017-11-14 2018-04-06 广东电网有限责任公司电力科学研究院 A kind of switch network Topology g eneration method and device
CN107682211A (en) * 2017-11-14 2018-02-09 华信咨询设计研究院有限公司 A kind of network topology structure determination method, device and computer-readable recording medium
CN109861846A (en) * 2018-12-25 2019-06-07 顺丰科技有限公司 Using call relation acquisition methods, system and storage medium
CN109936474A (en) * 2018-12-28 2019-06-25 上海云轴信息科技有限公司 A kind of method and apparatus generating network topological diagram
CN110750975A (en) * 2019-10-21 2020-02-04 北京明略软件系统有限公司 Introduction text generation method and device
CN111966890A (en) * 2020-06-30 2020-11-20 北京百度网讯科技有限公司 Text-based event pushing method and device, electronic equipment and storage medium
CN112733515A (en) * 2020-12-31 2021-04-30 贝壳技术有限公司 Text generation method and device, electronic equipment and readable storage medium
CN112835998A (en) * 2020-12-31 2021-05-25 国家电网公司华中分部 Generation method of power grid dynamic topological graph
CN112948110A (en) * 2021-02-23 2021-06-11 上海宽带技术及应用工程研究中心 Topology and arrangement system and method of cloud application, storage medium and electronic device
CN113158189A (en) * 2021-04-28 2021-07-23 绿盟科技集团股份有限公司 Method, device, equipment and medium for generating malicious software analysis report

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
苏瑞;王勇;杨指挥;: "基于PMSI网络拓扑编辑工具的设计与实现", 计算机技术与发展, no. 05 *

Also Published As

Publication number Publication date
CN113673966B (en) 2024-03-08

Similar Documents

Publication Publication Date Title
US11036867B2 (en) Advanced rule analyzer to identify similarities in security rules, deduplicate rules, and generate new rules
CA2946224C (en) Method and apparatus for automating the building of threat models for the public cloud
US8898796B2 (en) Managing network data
US20070250424A1 (en) Virtual asset groups in a compliance management system
CN112351014B (en) Firewall security policy compliance baseline management method and device between security domains
US20070250932A1 (en) Integrated enterprise-level compliance and risk management system
CN103106368A (en) Vulnerability scanning method for grade protection
WO2018216000A1 (en) A system and method for on-premise cyber training
Plósz et al. Combining safety and security analysis for industrial collaborative automation systems
CN110955897A (en) Software research and development safety control visualization method and system based on big data
CN110442582B (en) Scene detection method, device, equipment and medium
US20150188787A1 (en) Integrated solution for application data layer coverage discovery and gap analysis
CN113673966B (en) Information security construction scheme generation method and device, electronic equipment and storage medium
CN113301040B (en) Firewall strategy optimization method, device, equipment and storage medium
CN109165513B (en) System configuration information inspection method and device and server
CN111538994A (en) System security detection and repair method, device, storage medium and terminal
CN114866434B (en) Network asset security assessment method and application
Savola Towards measurement of security effectiveness enabling factors in software intensive systems
Raspotnig et al. Improving security and safety modelling with failure sequence diagrams
D’Hondt et al. Understanding SCAP Through a Simple Use Case
CN113271315A (en) Virtual private network abnormal use detection method and device and electronic equipment
JP4879090B2 (en) Information processing apparatus and information processing method
CN103067361A (en) Method for intelligently collecting Web application firewall white lists
US12015647B2 (en) System and method for securing computer infrastructure and devices that depend on cloud platforms
KR102403881B1 (en) Apparatus and method for visualizing causality of events

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: Room 3003, Tower D1, Qingdao International Innovation Park, No. 1, Keyuan Weiyi Road, Laoshan District, Qingdao, Shandong 266101

Applicant after: Kaos Digital Technology (Qingdao) Co.,Ltd.

Applicant after: CAOS industrial Intelligence Research Institute (Qingdao) Co.,Ltd.

Applicant after: Karos IoT Technology Co.,Ltd.

Address before: Room 402, block B, Qingdao International Innovation Park, No.1 Keyuan Weiyi Road, Zhonghan street, Laoshan District, Qingdao City, Shandong Province, 266101

Applicant before: Haier digital technology (Qingdao) Co.,Ltd.

Applicant before: QINGDAO HAIER INDUSTRIAL INTELLIGENCE RESEARCH INSTITUTE Co.,Ltd.

Applicant before: Haier Kaos IOT Technology Co.,Ltd.

Address after: Room 402, block B, Qingdao International Innovation Park, No.1 Keyuan Weiyi Road, Zhonghan street, Laoshan District, Qingdao City, Shandong Province, 266101

Applicant after: Haier digital technology (Qingdao) Co.,Ltd.

Applicant after: QINGDAO HAIER INDUSTRIAL INTELLIGENCE RESEARCH INSTITUTE Co.,Ltd.

Applicant after: Haier Kaos IOT Technology Co.,Ltd.

Address before: Room 402, block B, Qingdao International Innovation Park, No.1 Keyuan Weiyi Road, Zhonghan street, Laoshan District, Qingdao City, Shandong Province, 266101

Applicant before: Haier digital technology (Qingdao) Co.,Ltd.

Applicant before: QINGDAO HAIER INDUSTRIAL INTELLIGENCE RESEARCH INSTITUTE Co.,Ltd.

Applicant before: Haier CAOS IOT Ecological Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant