CN114553500A - Safety operation management method, device, equipment and machine readable storage medium - Google Patents
Safety operation management method, device, equipment and machine readable storage medium Download PDFInfo
- Publication number
- CN114553500A CN114553500A CN202210109462.1A CN202210109462A CN114553500A CN 114553500 A CN114553500 A CN 114553500A CN 202210109462 A CN202210109462 A CN 202210109462A CN 114553500 A CN114553500 A CN 114553500A
- Authority
- CN
- China
- Prior art keywords
- office point
- point
- office
- safe operation
- local
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000003860 storage Methods 0.000 title claims abstract description 26
- 238000007726 management method Methods 0.000 title claims abstract description 19
- 238000000034 method Methods 0.000 claims abstract description 17
- 238000004458 analytical method Methods 0.000 claims abstract description 15
- 238000004364 calculation method Methods 0.000 claims abstract description 10
- 238000004422 calculation algorithm Methods 0.000 claims description 9
- 230000006872 improvement Effects 0.000 claims description 9
- 230000004044 response Effects 0.000 claims description 9
- 230000007547 defect Effects 0.000 claims description 7
- 238000013486 operation strategy Methods 0.000 claims description 7
- 238000012545 processing Methods 0.000 claims description 7
- 238000010586 diagram Methods 0.000 description 11
- 238000004590 computer program Methods 0.000 description 9
- 230000006870 function Effects 0.000 description 6
- 230000003287 optical effect Effects 0.000 description 4
- 230000008859 change Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000008447 perception Effects 0.000 description 2
- 230000000630 rising effect Effects 0.000 description 2
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000009826 distribution Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000011156 evaluation Methods 0.000 description 1
- 230000000977 initiatory effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/40—Business processes related to the transportation industry
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- General Health & Medical Sciences (AREA)
- Marketing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computing Systems (AREA)
- Health & Medical Sciences (AREA)
- Economics (AREA)
- Computer Hardware Design (AREA)
- Human Resources & Organizations (AREA)
- General Engineering & Computer Science (AREA)
- Primary Health Care (AREA)
- Strategic Management (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Alarm Systems (AREA)
Abstract
The present disclosure provides a secure operation management method, apparatus, device and machine-readable storage medium, the method comprising: acquiring office point safe operation data sent by each office point; acquiring the safe operation capacity of each office point according to the office point safe operation data of each office point; and responding to the request sent by the local point, generating a safety operation report related to the local point according to the safety operation capacity of each local point, and returning the safety operation report related to the local point. According to the technical scheme, the local points upload local safe operation data to the safe operation platform, the safe operation platform performs unified analysis and calculation according to the safe operation data of each local point, the safe operation capacity of each local point is obtained, and then a safe operation report which is obtained according to the safe operation capacity of each local point and aims at the local points is sent to the local points, so that the local points can obtain the safe operation condition of the local points and/or compare the safe operation condition with the safe operation condition of other local points, and a basis is provided for improving safe operation.
Description
Technical Field
The present disclosure relates to the field of communications technologies, and in particular, to a method, an apparatus, a device, and a machine-readable storage medium for secure operation management.
Background
The network security is rapidly developed, and the demands and the emphasis of people on the network security are increasingly rising. Many users deploy security situation awareness platforms, and the network security level of the clients is improved. In the practice of security operations, it is easy to find that security operations do not rely only on security situation awareness platforms, but also on security service personnel. And a network security situation perception platform is also deployed, some local point security services are better, the overall security level is higher, and the network security of some local points is in a common level or even lower. In network security operation management, security services are very important.
In one technical scheme, after the safety equipment and the safety situation perception level are deployed, effective analysis on the local point is lacked, the safety operation level is difficult to improve, and the safety is reduced.
Disclosure of Invention
In view of the above, the present disclosure provides a method and an apparatus for managing security operations, an electronic device, and a machine-readable storage medium, so as to solve the problem of lack of effective analysis on local security operations.
The specific technical scheme is as follows:
the present disclosure provides a secure operation management method, applied to a secure operation platform, the method including: acquiring office point safe operation data sent by each office point; acquiring the safe operation capacity of each office point according to the office point safe operation data of each office point; and responding to the request sent by the local point, generating a safety operation report related to the local point according to the safety operation capacity of each local point, and returning the safety operation report related to the local point.
As a technical solution, the acquiring office point secure operation data sent by each office point includes: and decrypting the office point safe operation data sent by each office point encryption, wherein the safe operation data comprises a full-checking parameter, a quasi-checking parameter, a false-alarm parameter, a residual risk and an analysis parameter.
As a technical solution, the obtaining the safe operation capability of each office point according to the office point safe operation data of each office point includes: according to the office point safe operation data of each office point, calculating the office point safe operation data by using a preset algorithm, and acquiring the safe operation capacity of each office point according to the calculation result; the security operation capability includes a security operation score and/or a security operation ranking.
As a technical solution, the generating, in response to a request sent by an office point, a security operation report associated with the office point according to security operation capabilities of the office points, and returning the security operation report associated with the office point to the office point includes: responding to a request sent by a local point according to the request, and generating a safety operation report related to the request, wherein the safety operation report comprises a safety operation score of the local point, and/or a safety operation quality of the local point relative to other local points, and/or a safety operation defect and an improvement mode of the local point; and returning the security operation report to the office point so that the office point configures the security operation strategy according to the security operation report.
The present disclosure also provides a safe operation management device, which is applied to a safe operation platform, the device includes: the receiving module is used for acquiring office point safe operation data sent by each office point; the processing module is used for acquiring the safe operation capacity of each office point according to the office point safe operation data of each office point; and the sending module is used for responding to the request sent by the office point, generating a safety operation report related to the office point according to the safety operation capacity of each office point, and returning the safety operation report related to the office point.
As a technical solution, the acquiring office point secure operation data sent by each office point includes: and decrypting the office point safe operation data sent by each office point encryption, wherein the safe operation data comprises a full-checking parameter, a quasi-checking parameter, a false-alarm parameter, a residual risk and an analysis parameter.
As a technical solution, the obtaining the safe operation capability of each office point according to the office point safe operation data of each office point includes: according to the office point safe operation data of each office point, calculating the office point safe operation data by using a preset algorithm, and acquiring the safe operation capacity of each office point according to the calculation result; the security operation capability includes a security operation score and/or a security operation ranking.
As a technical solution, the generating, in response to a request sent by an office point, a security operation report associated with the office point according to security operation capabilities of the office points, and returning the security operation report associated with the office point to the office point includes: responding to a request sent by a local point according to the request, and generating a safety operation report related to the request, wherein the safety operation report comprises a safety operation score of the local point, and/or a safety operation quality of the local point relative to other local points, and/or a safety operation defect and an improvement mode of the local point; and returning the security operation report to the office point so that the office point configures the security operation strategy according to the security operation report.
The present disclosure also provides an electronic device, including a processor and a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions executable by the processor, and the processor executes the machine-executable instructions to implement the foregoing secure operation management method.
The present disclosure also provides a machine-readable storage medium having stored thereon machine-executable instructions that, when invoked and executed by a processor, cause the processor to implement the aforementioned secure operations management method.
The technical scheme provided by the disclosure at least brings the following beneficial effects:
the local point sends local safe operation data to the safe operation platform, the safe operation platform carries out unified analysis and calculation according to the safe operation data of each local point to obtain the safe operation capacity of each local point, and then sends a safe operation report which is obtained according to the safe operation capacity of each local point and aims at the local point to the local point, so that the local point obtains the safe operation condition of the local point and/or the comparison with the safe operation condition of other local points, and a basis is provided for improving safe operation.
Drawings
In order to more clearly illustrate the embodiments of the present disclosure or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments of the present disclosure or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present disclosure, and other drawings can be obtained by those skilled in the art according to the drawings of the embodiments of the present disclosure.
Fig. 1 is a flow chart of a secure operation management method in one embodiment of the present disclosure;
fig. 2 is a block diagram of a secure operation management apparatus in one embodiment of the present disclosure;
fig. 3 is a hardware configuration diagram of an electronic device in an embodiment of the present disclosure.
Detailed Description
The terminology used in the embodiments of the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein is meant to encompass any and all possible combinations of one or more of the associated listed items.
It is to be understood that although the terms first, second, third, etc. may be used herein to describe various information in the embodiments of the present disclosure, such information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of the present disclosure. Depending on the context, moreover, the word "if" as used may be interpreted as "at … …" or "when … …" or "in response to a determination".
The present disclosure provides a security operation management method, device, electronic device, and machine-readable storage medium to solve the problem of lack of effective analysis on local security operations.
Specifically, the technical scheme is as follows.
The present disclosure provides a secure operation management method, applied to a secure operation platform, the method including: acquiring office point safe operation data sent by each office point; acquiring the safe operation capacity of each office point according to the office point safe operation data of each office point; and responding to the request sent by the local point, generating a safety operation report related to the local point according to the safety operation capacity of each local point, and returning the safety operation report related to the local point.
Specifically, as shown in fig. 1, the method comprises the following steps:
step S11, obtaining office point safety operation data sent by each office point;
step S12, according to the office point safe operation data of each office point, obtaining the safe operation ability of each office point;
step S13, in response to the request sent by the office point, generating a security operation report associated with the office point according to the security operation capability of each office point, and returning the security operation report associated with the office point to the office point.
The local point sends local safe operation data to the safe operation platform, the safe operation platform carries out unified analysis and calculation according to the safe operation data of each local point to obtain the safe operation capacity of each local point, and then sends a safe operation report which is obtained according to the safe operation capacity of each local point and aims at the local point to the local point, so that the local point obtains the safe operation condition of the local point and/or the comparison with the safe operation condition of other local points, and a basis is provided for improving safe operation.
In one embodiment, the acquiring the office point security operation data sent by each office point includes: and decrypting the office point safe operation data sent by each office point encryption, wherein the safe operation data comprises a full-checking parameter, a quasi-checking parameter, a false-alarm parameter, a residual risk and an analysis parameter.
Checking parameters to reflect the checking capability of the security events and the total number of different security event categories; checking the safety event, wherein the checking capability of the safety event is embodied, and the total number of the safety events to be handled is checked; misreport parameters, which embody the handling strength of misreport, and the misreport ignores the total number of security events; residual risk, which represents the size of the residual risk and the total risk of the unaddressed security events; and analyzing parameters to embody the safety analysis capability and the total times of safety event analysis.
In an embodiment, the obtaining, according to the office point safe operation data of each office point, the safe operation capability of each office point includes: according to the office point safe operation data of each office point, calculating the office point safe operation data by using a preset algorithm, and acquiring the safe operation capacity of each office point according to the calculation result; the security operation capability includes a security operation score and/or a security operation ranking.
The preset algorithm can be selected as required, in one implementation mode, a magic quadrant maturity model is used, data of actual operation of the office points are analyzed, the safe operation horizontal position of each office point is depicted in the dimensions of event check, accuracy check, false alarm handling, residual risk and the like, and transverse comparison among the office points is achieved. The magic quadrant distribution is not constant, and dynamic calculations are performed based on real-time local point data, typically set to a baseline or minimum standard baseline that 90% of local points meet. Meanwhile, the scale of false alarm events identified based on the gray system can be reflected. In addition, the similarly capable local points are classified using an AI clustering algorithm (such as K-Means). The safety operation level of each local point can be displayed in a graphical mode, for example, a quadrant graph is constructed, in a graphical display mode, the more the local point is close to the right, the stronger the capability of threat discovery and handling of safety events is, the more the local point is close to the upper part, the lower the residual risk is, and the safety operation condition of the local point is clear to safety management personnel.
In another embodiment, a historical baseline maturity model is used, the change trend of the historical safe operation level of the office point is depicted from four-dimensional indexes and three-state evaluation, and the network safe operation capacity and the promotion direction of the office point are measured and guided. Obtaining a historical data change trend broken line by performing linear fitting on historical data points by using a least square method, wherein the slope of the broken line can be defined as follows: greater than K indicates a rising trend, less than-1 x K indicates a falling trend, and between-1 x K and K indicates a relatively smooth trend, where the value of K may be set empirically or updated to adjust, such as to set to 2. The larger the absolute value of the slope value is, the more unstable the display is, and the more stable the display is, the later stage of the operation construction is.
In one embodiment, the generating, in response to the request sent by the office point, a security operation report associated with the office point according to the security operation capability of each office point, and returning the security operation report associated with the office point to the office point includes: responding to a request sent by a local point according to the request, and generating a safety operation report related to the request, wherein the safety operation report comprises a safety operation score of the local point, and/or a safety operation quality of the local point relative to other local points, and/or a safety operation defect and an improvement mode of the local point; and returning the security operation report to the office point so that the office point configures the security operation strategy according to the security operation report.
In one embodiment, the office uses its own public key to encrypt the "office name", and uses the public key unified by the security operation platform to encrypt the whole piece of security operation data, and sends the encrypted piece of security operation data to the security operation platform. And after decryption, the safety operation platform acquires non-encrypted data except the local point name and uses the encrypted local point A and the like to represent the local point name. After the decrypted safe operation data is calculated by using a preset algorithm, the result is marked by corresponding identification marks such as 'encrypted local point A' and the like to generate a safe operation report related to the local point initiating the request, and the safe operation analysis result of each local point marked in an identification mode is returned, so that the local point obtains the transverse comparison between the local point and each local point under the condition of ensuring the information safety and finds out the deficiency, the improvement is realized, in addition, a defect improvement mode can be issued according to the safe operation data analysis result of a specific local point, and the safe operation strategy is correspondingly configured for the local point.
In an embodiment, the present disclosure also provides a secure operation management apparatus, as shown in fig. 2, applied to a secure operation platform, the apparatus including: a receiving module 21, configured to obtain office point safe operation data sent by each office point; the processing module 22 is configured to obtain the safe operation capability of each office point according to the office point safe operation data of each office point; the sending module 23 is configured to, in response to the request sent by the office point, generate a security operation report associated with the office point according to the security operation capability of each office point, and return the security operation report associated with the office point to the office point.
In one embodiment, the acquiring office point safe operation data sent by each office point includes: and decrypting the office point safe operation data sent by each office point encryption, wherein the safe operation data comprises a full-checking parameter, a quasi-checking parameter, a false-alarm parameter, a residual risk and an analysis parameter.
In an embodiment, the obtaining, according to the office point safe operation data of each office point, the safe operation capability of each office point includes: according to the office point safe operation data of each office point, calculating the office point safe operation data by using a preset algorithm, and acquiring the safe operation capacity of each office point according to the calculation result; the security operation capability includes a security operation score and/or a security operation ranking.
In one embodiment, the generating, in response to the request sent by the office point, a security operation report associated with the office point according to the security operation capability of each office point, and returning the security operation report associated with the office point to the office point includes: responding to a request sent by a local point according to the request, and generating a safety operation report related to the request, wherein the safety operation report comprises a safety operation score of the local point, and/or a safety operation quality of the local point relative to other local points, and/or a safety operation defect and an improvement mode of the local point; and returning the security operation report to the office point so that the office point configures the security operation strategy according to the security operation report.
The device embodiments are the same or similar to the corresponding method embodiments and are not described herein again.
In an embodiment, the present disclosure provides an electronic device, including a processor and a machine-readable storage medium, where the machine-readable storage medium stores machine-executable instructions executable by the processor, and the processor executes the machine-executable instructions to implement the foregoing secure operation management method, and from a hardware level, a hardware architecture diagram may be as shown in fig. 3.
In one embodiment, the present disclosure provides a machine-readable storage medium having stored thereon machine-executable instructions that, when invoked and executed by a processor, cause the processor to implement the aforementioned secure operations management method.
Here, a machine-readable storage medium may be any electronic, magnetic, optical, or other physical storage device that can contain or store information such as executable instructions, data, and so forth. For example, the machine-readable storage medium may be: a RAM (random Access Memory), a volatile Memory, a non-volatile Memory, a flash Memory, a storage drive (e.g., a hard drive), a solid state drive, any type of storage disk (e.g., an optical disk, a dvd, etc.), or similar storage medium, or a combination thereof.
The systems, devices, modules or units described in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the various elements may be implemented in the same one or more software and/or hardware implementations in practicing the disclosure.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present disclosure is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
Furthermore, these computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
As will be appreciated by one skilled in the art, embodiments of the present disclosure may be provided as a method, system, or computer program product. Accordingly, the present disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present disclosure may take the form of a computer program product embodied on one or more computer-usable storage media (which may include, but is not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above description is only an embodiment of the present disclosure, and is not intended to limit the present disclosure. Various modifications and variations of this disclosure will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present disclosure should be included in the scope of the claims of the present disclosure.
Claims (10)
1. A secure operation management method is applied to a secure operation platform, and comprises the following steps:
acquiring office point safe operation data sent by each office point;
acquiring the safe operation capacity of each office point according to the office point safe operation data of each office point;
and responding to the request sent by the local point, generating a safety operation report related to the local point according to the safety operation capacity of each local point, and returning the safety operation report related to the local point.
2. The method according to claim 1, wherein the acquiring the office point secure operation data sent by each office point comprises:
and decrypting the office point safe operation data sent by each office point encryption, wherein the safe operation data comprises a full-checking parameter, a quasi-checking parameter, a false-alarm parameter, a residual risk and an analysis parameter.
3. The method according to claim 1, wherein the obtaining the safe operation capability of each office point according to the office point safe operation data of each office point comprises:
according to the office point safe operation data of each office point, calculating the office point safe operation data by using a preset algorithm, and acquiring the safe operation capacity of each office point according to the calculation result;
the security operation capability includes a security operation score and/or a security operation ranking.
4. The method of claim 1, wherein the generating a security operation report associated with each office point according to the security operation capability of the office point in response to the request sent by the office point and returning the security operation report associated with the office point to the office point comprises:
responding to a request sent by a local point according to the request, and generating a safety operation report related to the request, wherein the safety operation report comprises a safety operation score of the local point, and/or a safety operation quality of the local point relative to other local points, and/or a safety operation defect and an improvement mode of the local point;
and returning the security operation report to the office point so that the office point configures the security operation strategy according to the security operation report.
5. A secure operation management device applied to a secure operation platform, the device comprising:
the receiving module is used for acquiring the office point safe operation data sent by each office point;
the processing module is used for acquiring the safe operation capacity of each office point according to the office point safe operation data of each office point;
and the sending module is used for responding to the request sent by the office point, generating a safety operation report related to the office point according to the safety operation capacity of each office point, and returning the safety operation report related to the office point.
6. The apparatus of claim 5, wherein the obtaining of the office point safe operation data sent by each office point comprises:
and decrypting the office point safe operation data sent up by each office point encryption, wherein the safe operation data comprises a full checking parameter, a quasi checking parameter, a false alarm parameter, a residual risk and an analysis parameter.
7. The apparatus according to claim 5, wherein said obtaining the safe operation capability of each office point according to the office point safe operation data of each office point comprises:
according to the office point safe operation data of each office point, calculating the office point safe operation data by using a preset algorithm, and acquiring the safe operation capacity of each office point according to the calculation result;
the security operation capability includes a security operation score and/or a security operation ranking.
8. The apparatus of claim 5, wherein the means for generating a security operation report associated with each office point according to the security operation capability of the office point in response to the request sent by the office point and returning the security operation report associated with the office point to the office point comprises:
responding to a request sent by a local point according to the request, and generating a safety operation report related to the request, wherein the safety operation report comprises a safety operation score of the local point, and/or a safety operation quality of the local point relative to other local points, and/or a safety operation defect and an improvement mode of the local point;
and returning the security operation report to the office point so that the office point configures the security operation strategy according to the security operation report.
9. An electronic device, comprising: a processor and a machine-readable storage medium storing machine-executable instructions executable by the processor to perform the method of any one of claims 1 to 4.
10. A machine-readable storage medium having stored thereon machine-executable instructions which, when invoked and executed by a processor, cause the processor to implement the method of any of claims 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210109462.1A CN114553500A (en) | 2022-01-28 | 2022-01-28 | Safety operation management method, device, equipment and machine readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210109462.1A CN114553500A (en) | 2022-01-28 | 2022-01-28 | Safety operation management method, device, equipment and machine readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114553500A true CN114553500A (en) | 2022-05-27 |
Family
ID=81672962
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210109462.1A Withdrawn CN114553500A (en) | 2022-01-28 | 2022-01-28 | Safety operation management method, device, equipment and machine readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114553500A (en) |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056198A (en) * | 2006-04-10 | 2007-10-17 | 华为技术有限公司 | An information security management platform |
CN106355319A (en) * | 2016-08-26 | 2017-01-25 | 南京安全无忧网络科技有限公司 | Safety risk assessment system and method |
CN108833372A (en) * | 2018-05-29 | 2018-11-16 | 深圳万发创新进出口贸易有限公司 | A kind of enterprise network security management cloud service platform system |
CN110648035A (en) * | 2018-06-27 | 2020-01-03 | 中国移动通信有限公司研究院 | Cloud computing maturity evaluation method and device and computer-readable storage medium |
CN113486339A (en) * | 2021-06-29 | 2021-10-08 | 新华三信息安全技术有限公司 | Data processing method, device, equipment and machine-readable storage medium |
-
2022
- 2022-01-28 CN CN202210109462.1A patent/CN114553500A/en not_active Withdrawn
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101056198A (en) * | 2006-04-10 | 2007-10-17 | 华为技术有限公司 | An information security management platform |
CN106355319A (en) * | 2016-08-26 | 2017-01-25 | 南京安全无忧网络科技有限公司 | Safety risk assessment system and method |
CN108833372A (en) * | 2018-05-29 | 2018-11-16 | 深圳万发创新进出口贸易有限公司 | A kind of enterprise network security management cloud service platform system |
CN110648035A (en) * | 2018-06-27 | 2020-01-03 | 中国移动通信有限公司研究院 | Cloud computing maturity evaluation method and device and computer-readable storage medium |
CN113486339A (en) * | 2021-06-29 | 2021-10-08 | 新华三信息安全技术有限公司 | Data processing method, device, equipment and machine-readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN116506217B (en) | Analysis method, system, storage medium and terminal for security risk of service data stream | |
CN109063969B (en) | Account risk assessment method and device | |
CN110290522B (en) | Risk identification method and device for mobile equipment and computer system | |
US20170364691A1 (en) | Method and System for Controlling Encryption of Information and Analyzing Information as well as Terminal | |
CN108256721B (en) | Task scheduling method, terminal device and medium | |
CN112184177B (en) | Project supervision method, equipment and storage medium | |
CN109495467B (en) | Method and device for updating interception rule and computer readable storage medium | |
CN112132676B (en) | Method and device for determining contribution degree of joint training target model and terminal equipment | |
US20130097694A1 (en) | Protecting an electronic device against unathorized hardware use | |
CN110633309A (en) | Block chain transaction processing method and device | |
CN111756522A (en) | Data processing method and system | |
CN107465642A (en) | A kind of method and device for judging account abnormal login | |
CN109684863B (en) | Data leakage prevention method, device, equipment and storage medium | |
CN112073444B (en) | Data set processing method and device and server | |
US20230205849A1 (en) | Digital and physical asset tracking and authentication via non-fungible tokens on a distributed ledger | |
CN113132297A (en) | Data leakage detection method and device | |
CN117272386B (en) | Internet big data information security encryption method, device, equipment and system | |
CN114218176A (en) | Cross-platform data secure sharing and exchanging method | |
CN114218577A (en) | API risk determination method, device, equipment and medium | |
CN114553500A (en) | Safety operation management method, device, equipment and machine readable storage medium | |
WO2020228564A1 (en) | Application service method and device | |
CN106469166A (en) | A kind of information processing method and device | |
EP4254241A1 (en) | Method and device for image-based malware detection, and artificial intelligence-based endpoint detection and response system using same | |
CN113065122A (en) | Temporary authority management method, device and computer readable medium | |
EP3543882B1 (en) | Method and system for identifying original data by using data order |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20220527 |
|
WW01 | Invention patent application withdrawn after publication |