CN114553500A - Safety operation management method, device, equipment and machine readable storage medium - Google Patents

Safety operation management method, device, equipment and machine readable storage medium Download PDF

Info

Publication number
CN114553500A
CN114553500A CN202210109462.1A CN202210109462A CN114553500A CN 114553500 A CN114553500 A CN 114553500A CN 202210109462 A CN202210109462 A CN 202210109462A CN 114553500 A CN114553500 A CN 114553500A
Authority
CN
China
Prior art keywords
office point
point
office
safe operation
local
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202210109462.1A
Other languages
Chinese (zh)
Inventor
顾涛
赵志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
New H3C Security Technologies Co Ltd
Original Assignee
New H3C Security Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by New H3C Security Technologies Co Ltd filed Critical New H3C Security Technologies Co Ltd
Priority to CN202210109462.1A priority Critical patent/CN114553500A/en
Publication of CN114553500A publication Critical patent/CN114553500A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/40Business processes related to the transportation industry

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Human Resources & Organizations (AREA)
  • General Engineering & Computer Science (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Alarm Systems (AREA)

Abstract

The present disclosure provides a secure operation management method, apparatus, device and machine-readable storage medium, the method comprising: acquiring office point safe operation data sent by each office point; acquiring the safe operation capacity of each office point according to the office point safe operation data of each office point; and responding to the request sent by the local point, generating a safety operation report related to the local point according to the safety operation capacity of each local point, and returning the safety operation report related to the local point. According to the technical scheme, the local points upload local safe operation data to the safe operation platform, the safe operation platform performs unified analysis and calculation according to the safe operation data of each local point, the safe operation capacity of each local point is obtained, and then a safe operation report which is obtained according to the safe operation capacity of each local point and aims at the local points is sent to the local points, so that the local points can obtain the safe operation condition of the local points and/or compare the safe operation condition with the safe operation condition of other local points, and a basis is provided for improving safe operation.

Description

Safety operation management method, device, equipment and machine readable storage medium
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a machine-readable storage medium for secure operation management.
Background
The network security is rapidly developed, and the demands and the emphasis of people on the network security are increasingly rising. Many users deploy security situation awareness platforms, and the network security level of the clients is improved. In the practice of security operations, it is easy to find that security operations do not rely only on security situation awareness platforms, but also on security service personnel. And a network security situation perception platform is also deployed, some local point security services are better, the overall security level is higher, and the network security of some local points is in a common level or even lower. In network security operation management, security services are very important.
In one technical scheme, after the safety equipment and the safety situation perception level are deployed, effective analysis on the local point is lacked, the safety operation level is difficult to improve, and the safety is reduced.
Disclosure of Invention
In view of the above, the present disclosure provides a method and an apparatus for managing security operations, an electronic device, and a machine-readable storage medium, so as to solve the problem of lack of effective analysis on local security operations.
The specific technical scheme is as follows:
the present disclosure provides a secure operation management method, applied to a secure operation platform, the method including: acquiring office point safe operation data sent by each office point; acquiring the safe operation capacity of each office point according to the office point safe operation data of each office point; and responding to the request sent by the local point, generating a safety operation report related to the local point according to the safety operation capacity of each local point, and returning the safety operation report related to the local point.
As a technical solution, the acquiring office point secure operation data sent by each office point includes: and decrypting the office point safe operation data sent by each office point encryption, wherein the safe operation data comprises a full-checking parameter, a quasi-checking parameter, a false-alarm parameter, a residual risk and an analysis parameter.
As a technical solution, the obtaining the safe operation capability of each office point according to the office point safe operation data of each office point includes: according to the office point safe operation data of each office point, calculating the office point safe operation data by using a preset algorithm, and acquiring the safe operation capacity of each office point according to the calculation result; the security operation capability includes a security operation score and/or a security operation ranking.
As a technical solution, the generating, in response to a request sent by an office point, a security operation report associated with the office point according to security operation capabilities of the office points, and returning the security operation report associated with the office point to the office point includes: responding to a request sent by a local point according to the request, and generating a safety operation report related to the request, wherein the safety operation report comprises a safety operation score of the local point, and/or a safety operation quality of the local point relative to other local points, and/or a safety operation defect and an improvement mode of the local point; and returning the security operation report to the office point so that the office point configures the security operation strategy according to the security operation report.
The present disclosure also provides a safe operation management device, which is applied to a safe operation platform, the device includes: the receiving module is used for acquiring office point safe operation data sent by each office point; the processing module is used for acquiring the safe operation capacity of each office point according to the office point safe operation data of each office point; and the sending module is used for responding to the request sent by the office point, generating a safety operation report related to the office point according to the safety operation capacity of each office point, and returning the safety operation report related to the office point.
As a technical solution, the acquiring office point secure operation data sent by each office point includes: and decrypting the office point safe operation data sent by each office point encryption, wherein the safe operation data comprises a full-checking parameter, a quasi-checking parameter, a false-alarm parameter, a residual risk and an analysis parameter.
As a technical solution, the obtaining the safe operation capability of each office point according to the office point safe operation data of each office point includes: according to the office point safe operation data of each office point, calculating the office point safe operation data by using a preset algorithm, and acquiring the safe operation capacity of each office point according to the calculation result; the security operation capability includes a security operation score and/or a security operation ranking.
As a technical solution, the generating, in response to a request sent by an office point, a security operation report associated with the office point according to security operation capabilities of the office points, and returning the security operation report associated with the office point to the office point includes: responding to a request sent by a local point according to the request, and generating a safety operation report related to the request, wherein the safety operation report comprises a safety operation score of the local point, and/or a safety operation quality of the local point relative to other local points, and/or a safety operation defect and an improvement mode of the local point; and returning the security operation report to the office point so that the office point configures the security operation strategy according to the security operation report.
The present disclosure also provides an electronic device, including a processor and a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions executable by the processor, and the processor executes the machine-executable instructions to implement the foregoing secure operation management method.
The present disclosure also provides a machine-readable storage medium having stored thereon machine-executable instructions that, when invoked and executed by a processor, cause the processor to implement the aforementioned secure operations management method.
The technical scheme provided by the disclosure at least brings the following beneficial effects:
the local point sends local safe operation data to the safe operation platform, the safe operation platform carries out unified analysis and calculation according to the safe operation data of each local point to obtain the safe operation capacity of each local point, and then sends a safe operation report which is obtained according to the safe operation capacity of each local point and aims at the local point to the local point, so that the local point obtains the safe operation condition of the local point and/or the comparison with the safe operation condition of other local points, and a basis is provided for improving safe operation.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments of the present disclosure or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present disclosure, and other drawings can be obtained by those skilled in the art according to the drawings of the embodiments of the present disclosure.
Fig. 1 is a flow chart of a secure operation management method in one embodiment of the present disclosure;
fig. 2 is a block diagram of a secure operation management apparatus in one embodiment of the present disclosure;
fig. 3 is a hardware configuration diagram of an electronic device in an embodiment of the present disclosure.
Detailed Description
The terminology used in the embodiments of the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein is meant to encompass any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information in the embodiments of the present disclosure, such information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. Depending on the context, moreover, the word "if" as used may be interpreted as "at … …" or "when … …" or "in response to a determination".
The present disclosure provides a security operation management method, device, electronic device, and machine-readable storage medium to solve the problem of lack of effective analysis on local security operations.
Specifically, the technical scheme is as follows.
The present disclosure provides a secure operation management method, applied to a secure operation platform, the method including: acquiring office point safe operation data sent by each office point; acquiring the safe operation capacity of each office point according to the office point safe operation data of each office point; and responding to the request sent by the local point, generating a safety operation report related to the local point according to the safety operation capacity of each local point, and returning the safety operation report related to the local point.
Specifically, as shown in fig. 1, the method comprises the following steps:
step S11, obtaining office point safety operation data sent by each office point;
step S12, according to the office point safe operation data of each office point, obtaining the safe operation ability of each office point;
step S13, in response to the request sent by the office point, generating a security operation report associated with the office point according to the security operation capability of each office point, and returning the security operation report associated with the office point to the office point.
The local point sends local safe operation data to the safe operation platform, the safe operation platform carries out unified analysis and calculation according to the safe operation data of each local point to obtain the safe operation capacity of each local point, and then sends a safe operation report which is obtained according to the safe operation capacity of each local point and aims at the local point to the local point, so that the local point obtains the safe operation condition of the local point and/or the comparison with the safe operation condition of other local points, and a basis is provided for improving safe operation.
In one embodiment, the acquiring the office point security operation data sent by each office point includes: and decrypting the office point safe operation data sent by each office point encryption, wherein the safe operation data comprises a full-checking parameter, a quasi-checking parameter, a false-alarm parameter, a residual risk and an analysis parameter.
Checking parameters to reflect the checking capability of the security events and the total number of different security event categories; checking the safety event, wherein the checking capability of the safety event is embodied, and the total number of the safety events to be handled is checked; misreport parameters, which embody the handling strength of misreport, and the misreport ignores the total number of security events; residual risk, which represents the size of the residual risk and the total risk of the unaddressed security events; and analyzing parameters to embody the safety analysis capability and the total times of safety event analysis.
In an embodiment, the obtaining, according to the office point safe operation data of each office point, the safe operation capability of each office point includes: according to the office point safe operation data of each office point, calculating the office point safe operation data by using a preset algorithm, and acquiring the safe operation capacity of each office point according to the calculation result; the security operation capability includes a security operation score and/or a security operation ranking.
The preset algorithm can be selected as required, in one implementation mode, a magic quadrant maturity model is used, data of actual operation of the office points are analyzed, the safe operation horizontal position of each office point is depicted in the dimensions of event check, accuracy check, false alarm handling, residual risk and the like, and transverse comparison among the office points is achieved. The magic quadrant distribution is not constant, and dynamic calculations are performed based on real-time local point data, typically set to a baseline or minimum standard baseline that 90% of local points meet. Meanwhile, the scale of false alarm events identified based on the gray system can be reflected. In addition, the similarly capable local points are classified using an AI clustering algorithm (such as K-Means). The safety operation level of each local point can be displayed in a graphical mode, for example, a quadrant graph is constructed, in a graphical display mode, the more the local point is close to the right, the stronger the capability of threat discovery and handling of safety events is, the more the local point is close to the upper part, the lower the residual risk is, and the safety operation condition of the local point is clear to safety management personnel.
In another embodiment, a historical baseline maturity model is used, the change trend of the historical safe operation level of the office point is depicted from four-dimensional indexes and three-state evaluation, and the network safe operation capacity and the promotion direction of the office point are measured and guided. Obtaining a historical data change trend broken line by performing linear fitting on historical data points by using a least square method, wherein the slope of the broken line can be defined as follows: greater than K indicates a rising trend, less than-1 x K indicates a falling trend, and between-1 x K and K indicates a relatively smooth trend, where the value of K may be set empirically or updated to adjust, such as to set to 2. The larger the absolute value of the slope value is, the more unstable the display is, and the more stable the display is, the later stage of the operation construction is.
In one embodiment, the generating, in response to the request sent by the office point, a security operation report associated with the office point according to the security operation capability of each office point, and returning the security operation report associated with the office point to the office point includes: responding to a request sent by a local point according to the request, and generating a safety operation report related to the request, wherein the safety operation report comprises a safety operation score of the local point, and/or a safety operation quality of the local point relative to other local points, and/or a safety operation defect and an improvement mode of the local point; and returning the security operation report to the office point so that the office point configures the security operation strategy according to the security operation report.
In one embodiment, the office uses its own public key to encrypt the "office name", and uses the public key unified by the security operation platform to encrypt the whole piece of security operation data, and sends the encrypted piece of security operation data to the security operation platform. And after decryption, the safety operation platform acquires non-encrypted data except the local point name and uses the encrypted local point A and the like to represent the local point name. After the decrypted safe operation data is calculated by using a preset algorithm, the result is marked by corresponding identification marks such as 'encrypted local point A' and the like to generate a safe operation report related to the local point initiating the request, and the safe operation analysis result of each local point marked in an identification mode is returned, so that the local point obtains the transverse comparison between the local point and each local point under the condition of ensuring the information safety and finds out the deficiency, the improvement is realized, in addition, a defect improvement mode can be issued according to the safe operation data analysis result of a specific local point, and the safe operation strategy is correspondingly configured for the local point.
In an embodiment, the present disclosure also provides a secure operation management apparatus, as shown in fig. 2, applied to a secure operation platform, the apparatus including: a receiving module 21, configured to obtain office point safe operation data sent by each office point; the processing module 22 is configured to obtain the safe operation capability of each office point according to the office point safe operation data of each office point; the sending module 23 is configured to, in response to the request sent by the office point, generate a security operation report associated with the office point according to the security operation capability of each office point, and return the security operation report associated with the office point to the office point.
In one embodiment, the acquiring office point safe operation data sent by each office point includes: and decrypting the office point safe operation data sent by each office point encryption, wherein the safe operation data comprises a full-checking parameter, a quasi-checking parameter, a false-alarm parameter, a residual risk and an analysis parameter.
In an embodiment, the obtaining, according to the office point safe operation data of each office point, the safe operation capability of each office point includes: according to the office point safe operation data of each office point, calculating the office point safe operation data by using a preset algorithm, and acquiring the safe operation capacity of each office point according to the calculation result; the security operation capability includes a security operation score and/or a security operation ranking.
In one embodiment, the generating, in response to the request sent by the office point, a security operation report associated with the office point according to the security operation capability of each office point, and returning the security operation report associated with the office point to the office point includes: responding to a request sent by a local point according to the request, and generating a safety operation report related to the request, wherein the safety operation report comprises a safety operation score of the local point, and/or a safety operation quality of the local point relative to other local points, and/or a safety operation defect and an improvement mode of the local point; and returning the security operation report to the office point so that the office point configures the security operation strategy according to the security operation report.
The device embodiments are the same or similar to the corresponding method embodiments and are not described herein again.
In an embodiment, the present disclosure provides an electronic device, including a processor and a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions executable by the processor, and the processor executes the machine-executable instructions to implement the foregoing secure operation management method, and from a hardware level, a hardware architecture diagram may be as shown in fig. 3.
In one embodiment, the present disclosure provides a machine-readable storage medium having stored thereon machine-executable instructions that, when invoked and executed by a processor, cause the processor to implement the aforementioned secure operations management method.
Here, a machine-readable storage medium may be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and so forth. For example, the machine-readable storage medium may be: a RAM (random Access Memory), a volatile Memory, a non-volatile Memory, a flash Memory, a storage drive (e.g., a hard drive), a solid state drive, any type of storage disk (e.g., an optical disk, a dvd, etc.), or similar storage medium, or a combination thereof.
The systems, devices, modules or units described in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the various elements may be implemented in the same one or more software and/or hardware implementations in practicing the disclosure.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Furthermore, these computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (which may include, but is not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an embodiment of the present disclosure, and is not intended to limit the present disclosure. Various modifications and variations of this disclosure will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present disclosure should be included in the scope of the claims of the present disclosure.

Claims (10)

1. A secure operation management method is applied to a secure operation platform, and comprises the following steps:
acquiring office point safe operation data sent by each office point;
acquiring the safe operation capacity of each office point according to the office point safe operation data of each office point;
and responding to the request sent by the local point, generating a safety operation report related to the local point according to the safety operation capacity of each local point, and returning the safety operation report related to the local point.
2. The method according to claim 1, wherein the acquiring the office point secure operation data sent by each office point comprises:
and decrypting the office point safe operation data sent by each office point encryption, wherein the safe operation data comprises a full-checking parameter, a quasi-checking parameter, a false-alarm parameter, a residual risk and an analysis parameter.
3. The method according to claim 1, wherein the obtaining the safe operation capability of each office point according to the office point safe operation data of each office point comprises:
according to the office point safe operation data of each office point, calculating the office point safe operation data by using a preset algorithm, and acquiring the safe operation capacity of each office point according to the calculation result;
the security operation capability includes a security operation score and/or a security operation ranking.
4. The method of claim 1, wherein the generating a security operation report associated with each office point according to the security operation capability of the office point in response to the request sent by the office point and returning the security operation report associated with the office point to the office point comprises:
responding to a request sent by a local point according to the request, and generating a safety operation report related to the request, wherein the safety operation report comprises a safety operation score of the local point, and/or a safety operation quality of the local point relative to other local points, and/or a safety operation defect and an improvement mode of the local point;
and returning the security operation report to the office point so that the office point configures the security operation strategy according to the security operation report.
5. A secure operation management device applied to a secure operation platform, the device comprising:
the receiving module is used for acquiring the office point safe operation data sent by each office point;
the processing module is used for acquiring the safe operation capacity of each office point according to the office point safe operation data of each office point;
and the sending module is used for responding to the request sent by the office point, generating a safety operation report related to the office point according to the safety operation capacity of each office point, and returning the safety operation report related to the office point.
6. The apparatus of claim 5, wherein the obtaining of the office point safe operation data sent by each office point comprises:
and decrypting the office point safe operation data sent up by each office point encryption, wherein the safe operation data comprises a full checking parameter, a quasi checking parameter, a false alarm parameter, a residual risk and an analysis parameter.
7. The apparatus according to claim 5, wherein said obtaining the safe operation capability of each office point according to the office point safe operation data of each office point comprises:
according to the office point safe operation data of each office point, calculating the office point safe operation data by using a preset algorithm, and acquiring the safe operation capacity of each office point according to the calculation result;
the security operation capability includes a security operation score and/or a security operation ranking.
8. The apparatus of claim 5, wherein the means for generating a security operation report associated with each office point according to the security operation capability of the office point in response to the request sent by the office point and returning the security operation report associated with the office point to the office point comprises:
responding to a request sent by a local point according to the request, and generating a safety operation report related to the request, wherein the safety operation report comprises a safety operation score of the local point, and/or a safety operation quality of the local point relative to other local points, and/or a safety operation defect and an improvement mode of the local point;
and returning the security operation report to the office point so that the office point configures the security operation strategy according to the security operation report.
9. An electronic device, comprising: a processor and a machine-readable storage medium storing machine-executable instructions executable by the processor to perform the method of any one of claims 1 to 4.
10. A machine-readable storage medium having stored thereon machine-executable instructions which, when invoked and executed by a processor, cause the processor to implement the method of any of claims 1-4.
CN202210109462.1A 2022-01-28 2022-01-28 Safety operation management method, device, equipment and machine readable storage medium Withdrawn CN114553500A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210109462.1A CN114553500A (en) 2022-01-28 2022-01-28 Safety operation management method, device, equipment and machine readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210109462.1A CN114553500A (en) 2022-01-28 2022-01-28 Safety operation management method, device, equipment and machine readable storage medium

Publications (1)

Publication Number Publication Date
CN114553500A true CN114553500A (en) 2022-05-27

Family

ID=81672962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210109462.1A Withdrawn CN114553500A (en) 2022-01-28 2022-01-28 Safety operation management method, device, equipment and machine readable storage medium

Country Status (1)

Country Link
CN (1) CN114553500A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056198A (en) * 2006-04-10 2007-10-17 华为技术有限公司 An information security management platform
CN106355319A (en) * 2016-08-26 2017-01-25 南京安全无忧网络科技有限公司 Safety risk assessment system and method
CN108833372A (en) * 2018-05-29 2018-11-16 深圳万发创新进出口贸易有限公司 A kind of enterprise network security management cloud service platform system
CN110648035A (en) * 2018-06-27 2020-01-03 中国移动通信有限公司研究院 Cloud computing maturity evaluation method and device and computer-readable storage medium
CN113486339A (en) * 2021-06-29 2021-10-08 新华三信息安全技术有限公司 Data processing method, device, equipment and machine-readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101056198A (en) * 2006-04-10 2007-10-17 华为技术有限公司 An information security management platform
CN106355319A (en) * 2016-08-26 2017-01-25 南京安全无忧网络科技有限公司 Safety risk assessment system and method
CN108833372A (en) * 2018-05-29 2018-11-16 深圳万发创新进出口贸易有限公司 A kind of enterprise network security management cloud service platform system
CN110648035A (en) * 2018-06-27 2020-01-03 中国移动通信有限公司研究院 Cloud computing maturity evaluation method and device and computer-readable storage medium
CN113486339A (en) * 2021-06-29 2021-10-08 新华三信息安全技术有限公司 Data processing method, device, equipment and machine-readable storage medium

Similar Documents

Publication Publication Date Title
CN116506217B (en) Analysis method, system, storage medium and terminal for security risk of service data stream
CN109063969B (en) Account risk assessment method and device
CN110290522B (en) Risk identification method and device for mobile equipment and computer system
US20170364691A1 (en) Method and System for Controlling Encryption of Information and Analyzing Information as well as Terminal
CN108256721B (en) Task scheduling method, terminal device and medium
CN112184177B (en) Project supervision method, equipment and storage medium
CN109495467B (en) Method and device for updating interception rule and computer readable storage medium
CN112132676B (en) Method and device for determining contribution degree of joint training target model and terminal equipment
US20130097694A1 (en) Protecting an electronic device against unathorized hardware use
CN110633309A (en) Block chain transaction processing method and device
CN111756522A (en) Data processing method and system
CN107465642A (en) A kind of method and device for judging account abnormal login
CN109684863B (en) Data leakage prevention method, device, equipment and storage medium
CN112073444B (en) Data set processing method and device and server
US20230205849A1 (en) Digital and physical asset tracking and authentication via non-fungible tokens on a distributed ledger
CN113132297A (en) Data leakage detection method and device
CN117272386B (en) Internet big data information security encryption method, device, equipment and system
CN114218176A (en) Cross-platform data secure sharing and exchanging method
CN114218577A (en) API risk determination method, device, equipment and medium
CN114553500A (en) Safety operation management method, device, equipment and machine readable storage medium
WO2020228564A1 (en) Application service method and device
CN106469166A (en) A kind of information processing method and device
EP4254241A1 (en) Method and device for image-based malware detection, and artificial intelligence-based endpoint detection and response system using same
CN113065122A (en) Temporary authority management method, device and computer readable medium
EP3543882B1 (en) Method and system for identifying original data by using data order

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20220527

WW01 Invention patent application withdrawn after publication