CN118194318A - Data processing strategy adjustment method, device and equipment - Google Patents

Data processing strategy adjustment method, device and equipment Download PDF

Info

Publication number
CN118194318A
CN118194318A CN202410259443.6A CN202410259443A CN118194318A CN 118194318 A CN118194318 A CN 118194318A CN 202410259443 A CN202410259443 A CN 202410259443A CN 118194318 A CN118194318 A CN 118194318A
Authority
CN
China
Prior art keywords
data
evaluation coefficient
time point
information
comprehensive evaluation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410259443.6A
Other languages
Chinese (zh)
Inventor
刘兆年
高博
崔亚奇
武鹏
陈绍凯
李为冲
张垚
袁帅
常莉
任为
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Research Center of CNOOC China Ltd
CNOOC China Ltd
Original Assignee
Beijing Research Center of CNOOC China Ltd
CNOOC China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Research Center of CNOOC China Ltd, CNOOC China Ltd filed Critical Beijing Research Center of CNOOC China Ltd
Priority to CN202410259443.6A priority Critical patent/CN118194318A/en
Publication of CN118194318A publication Critical patent/CN118194318A/en
Pending legal-status Critical Current

Links

Landscapes

  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The invention relates to the field of data security, and discloses a data processing strategy adjustment method, a device and equipment, which can collect the operation information of a data processing system at a periodic time point; generating a corresponding comprehensive evaluation coefficient according to the operation information; and when the data encryption of the data processing system at the periodic time point is determined to be in an invalid state based on the comprehensive evaluation coefficient, adjusting the data security processing strategy corresponding to the periodic time point according to the comprehensive evaluation coefficient. The invention can enhance the diversity of the data processing strategy adjustment modes and effectively avoid the data security risk related problems possibly caused by the lack of the data processing strategy adjustment modes.

Description

Data processing strategy adjustment method, device and equipment
Technical Field
The present invention relates to the field of data security, and in particular, to a method, an apparatus, and a device for adjusting a data processing policy.
Background
Large-scale data storage systems, such as cloud storage, large-scale databases and the like, have the defects of huge data volume, complex storage structure, and the need of dynamically adjusting data security processing strategies such as data encryption strategies according to real-time changes under the conditions of complex network environment and frequent security threats so as to ensure the security and confidentiality of data.
However, the data processing policy adjustment mode in the related art is single.
Disclosure of Invention
The invention provides a data processing strategy adjustment method, a device and equipment, which are used for solving the defect that the data processing strategy adjustment mode is single in the related technology and enhancing the diversity of the data processing strategy adjustment mode.
In a first aspect, the present invention provides a method for adjusting a data processing policy, the method comprising:
Collecting operation information of a data processing system at a periodic time point; wherein the operation information comprises at least one of security response information, sensitive data information and network environment information;
generating a corresponding comprehensive evaluation coefficient according to the operation information;
And when the data encryption of the data processing system at the period time point is determined to be in an invalid state based on the comprehensive evaluation coefficient, adjusting the data security processing strategy corresponding to the period time point according to the comprehensive evaluation coefficient.
Optionally, when the operation information includes the security response information, the sensitive data information and the network environment information, the generating a corresponding comprehensive evaluation coefficient according to the operation information includes:
generating corresponding safety response evaluation coefficients, sensitive data evaluation coefficients and network environment evaluation coefficients according to the safety response information, the sensitive data information and the network environment information in the operation information respectively;
And generating the comprehensive evaluation coefficient based on the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient.
Optionally, when the security response information includes the abnormal login number, the permission change number and the file access number, the security response evaluation coefficient is generated according to the security response information, including:
Generating the safety response evaluation coefficient according to the abnormal login times, the authority change times and the file access times in the safety response information;
When the sensitive data information comprises sensitive data quantity, access times and access time corresponding to each data sensitivity level, generating the sensitive data evaluation coefficient according to the sensitive data information, wherein the sensitive data evaluation coefficient comprises the following steps:
generating the sensitive data evaluation coefficient according to the sensitive data quantity in the sensitive data information, the access times and the access time corresponding to each data sensitivity level;
When the network environment information includes a network bandwidth delay rate, a packet loss rate and a load rate, generating the network environment evaluation coefficient according to the network environment information, including:
And generating the network environment evaluation coefficient according to the network bandwidth delay rate, the packet loss rate and the load rate in the network environment information.
Optionally, the generating the comprehensive evaluation coefficient based on the security response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient includes:
inputting the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient into a target formula to obtain the comprehensive evaluation coefficient; wherein, the target formula is:
Wherein δ i is the periodic time point, e is a natural constant, α i is the safety response evaluation coefficient, β i is the sensitive data evaluation coefficient, χ i is the network environment evaluation coefficient;
And lambda 1、λ2、λ3 is the weight factors corresponding to the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient respectively.
Optionally, the determining, based on the comprehensive evaluation coefficient, that the data encryption performed by the data processing system at the period time point is in an invalid state includes:
judging whether the comprehensive evaluation coefficient is larger than a preset standard comprehensive evaluation coefficient or not;
if the comprehensive evaluation coefficient is larger than the standard comprehensive evaluation coefficient, determining that data encryption performed by the data processing system at the periodic time point is in an invalid state;
and if the comprehensive evaluation coefficient is not greater than the standard comprehensive evaluation coefficient, determining that the data encryption performed by the data processing system at the periodic time point is in a valid state.
Optionally, after the determining that the data encryption performed by the data processing system at the periodic time point is in a valid state, the method further includes:
and prohibiting adjustment of the data security processing strategy corresponding to the periodic time point.
Optionally, the adjusting the data security processing policy corresponding to the period time point according to the comprehensive evaluation coefficient includes:
Searching a corresponding target strategy in the corresponding relation between the coefficient stored in the database and the strategy according to the comprehensive evaluation coefficient;
and adjusting the data security processing strategy corresponding to the periodic time point to the target strategy.
Optionally, when the data security processing policy includes a data encryption policy and a data transmission policy, searching a corresponding target policy in a corresponding relation between coefficients stored in a database according to the comprehensive evaluation coefficient includes:
Searching corresponding target encryption strategies and target transmission strategies in the corresponding relation between the coefficients stored in the database and the encryption strategies and the corresponding relation between the coefficients and the transmission strategies according to the comprehensive evaluation coefficients;
Determining the target encryption policy and the data transmission policy as the target policy;
The adjusting the data security processing policy corresponding to the periodic time point to the target policy includes:
and respectively adjusting the data encryption strategy and the data transmission strategy corresponding to the periodic time point into the target encryption strategy and the data transmission strategy in the target strategy.
In a second aspect, the present invention provides a data processing policy adjustment device, the device comprising:
The acquisition unit is used for acquiring the operation information of the data processing system at the periodic time point; wherein the operation information comprises at least one of security response information, sensitive data information and network environment information;
the generating unit is used for generating corresponding comprehensive evaluation coefficients according to the operation information;
And the adjusting unit is used for adjusting the data security processing strategy corresponding to the period time point according to the comprehensive evaluation coefficient when the data encryption of the data processing system at the period time point is determined to be in an invalid state based on the comprehensive evaluation coefficient.
Optionally, when the operation information includes the security response information, the sensitive data information, and the network environment information, the generating unit is further configured to:
Generating corresponding safety response evaluation coefficients, sensitive data evaluation coefficients and network environment evaluation coefficients according to the safety response information, the sensitive data information and the network environment information in the operation information respectively;
and generating a comprehensive evaluation coefficient based on the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient.
Optionally, when the security response information includes the abnormal login number, the permission change number and the file access number, the generating unit is further configured to:
generating a security response evaluation coefficient according to the abnormal login times, the permission change times and the file access times in the security response information;
when the sensitive data information includes a sensitive data amount, an access number corresponding to each data sensitivity level, and an access time, the generating unit is further configured to:
Generating a sensitive data evaluation coefficient according to the sensitive data quantity in the sensitive data information, the access times and the access time corresponding to each data sensitivity level;
when the network environment information includes the network bandwidth delay rate, the packet loss rate, and the load rate, the generating unit 102 is further configured to:
and generating a network environment evaluation coefficient according to the network bandwidth delay rate, the packet loss rate and the load rate in the network environment information.
Optionally, the generating unit is further configured to:
Inputting the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient into a target formula to obtain a comprehensive evaluation coefficient; wherein, the target formula is:
Wherein delta i is a periodic time point, e is a natural constant, alpha i is a safety response evaluation coefficient, beta i is a sensitive data evaluation coefficient, and χ i is a network environment evaluation coefficient;
lambda 1、λ2、λ3 is the weight factor corresponding to the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient respectively.
Optionally, the adjusting unit is further configured to:
judging whether the comprehensive evaluation coefficient is larger than a preset standard comprehensive evaluation coefficient or not;
if the comprehensive evaluation coefficient is larger than the standard comprehensive evaluation coefficient, determining that data encryption performed by the data processing system at the periodic time point is in an invalid state;
and if the comprehensive evaluation coefficient is not greater than the standard comprehensive evaluation coefficient, determining that the data encryption performed by the data processing system at the periodic time point is in a valid state.
Optionally, the apparatus further includes:
and the prohibiting unit is used for prohibiting the adjustment of the data security processing strategy corresponding to the period time point after the data encryption of the data processing system at the period time point is determined to be in an effective state.
Optionally, the adjusting unit is further configured to:
Searching a corresponding target strategy in the corresponding relation between the coefficients stored in the database and the strategies according to the comprehensive evaluation coefficients;
and adjusting the data security processing strategy corresponding to the periodic time point into a target strategy.
Optionally, when the data security processing policy includes a data encryption policy and a data transmission policy, the adjusting unit is further configured to:
Searching corresponding target encryption strategies and target transmission strategies in the corresponding relation between the coefficients stored in the database and the encryption strategies and the corresponding relation between the coefficients and the transmission strategies according to the comprehensive evaluation coefficients;
determining a target encryption policy and a data transmission policy as target policies;
The data security processing strategy corresponding to the periodic time point is adjusted to be a target strategy, which comprises the following steps:
and respectively adjusting the data encryption strategy and the data transmission strategy corresponding to the period time point into a target encryption strategy and a data transmission strategy in the target strategy.
In a third aspect, the present invention provides a computer device comprising: the data processing policy adjustment method according to the first aspect or any of the embodiments thereof is implemented by the processor and the memory, the memory and the processor are communicatively connected to each other, and the memory stores computer instructions, and the processor executes the computer instructions.
The data processing strategy adjustment method, the device and the equipment provided by the invention can collect the operation information of the data processing system at the periodic time point; generating a corresponding comprehensive evaluation coefficient according to the operation information; and when the data encryption of the data processing system at the periodic time point is determined to be in an invalid state based on the comprehensive evaluation coefficient, adjusting the data security processing strategy corresponding to the periodic time point according to the comprehensive evaluation coefficient. The invention can enhance the diversity of the data processing strategy adjustment modes and effectively avoid the data security risk related problems possibly caused by the lack of the data processing strategy adjustment modes.
Drawings
In order to more clearly illustrate the invention or the technical solutions of the prior art, the following description will briefly explain the drawings used in the embodiments or the description of the prior art, and it is obvious that the drawings in the following description are some embodiments of the invention, and other drawings can be obtained according to the drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flowchart of a method for adjusting a data processing policy according to an embodiment of the present invention;
FIG. 2 is a flowchart of another method for adjusting a data processing policy according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a data processing policy adjustment device according to an embodiment of the present invention;
Fig. 4 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present invention more apparent, the technical solutions of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is apparent that the described embodiments are some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the invention without making any inventive effort, are intended to be within the scope of the invention.
The data processing policy adjustment method of the present invention is described below with reference to fig. 1-2.
As shown in fig. 1, this embodiment proposes a first data processing policy adjustment method, which may include the following steps:
S101, collecting operation information of the data processing system at a periodic time point. Wherein the operation information includes at least one of security response information, sensitive data information, and network environment information.
Wherein the data processing system may be used in a system that performs some kind of processing on data. The data processing system may be a data storage system.
The periodic time point may be a period or time that occurs at intervals, such as 1 to 2 points per day, and further such as 1 point per day.
In particular, the operational information may include parameter values for some operational parameters of the data processing system, which may be indicative of performance and operational conditions of the data processing system.
S102, generating corresponding comprehensive evaluation coefficients according to the operation information.
In particular, the integrated evaluation coefficients may be used to evaluate whether the data processing system is efficient for data encryption at periodic points in time.
Optionally, the operation information includes security response information, sensitive data information and network environment information; step S102 may include:
Generating corresponding safety response evaluation coefficients, sensitive data evaluation coefficients and network environment evaluation coefficients according to the safety response information, the sensitive data information and the network environment information in the operation information respectively;
and generating a comprehensive evaluation coefficient based on the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient.
Optionally, when the security response information includes the abnormal login number, the permission change number and the file access number, generating the security response evaluation coefficient according to the security response information includes:
And generating a security response evaluation coefficient according to the abnormal login times, the permission change times and the file access times in the security response information.
Specifically, in this embodiment, the abnormal login number, the permission change number, and the file access number may be respectively recorded as a i、Bi and C i, where i represents a period time point, and the secure response evaluation coefficient α i is determined by substituting a formula. Wherein, the formula can be:
Wherein A ', B ', C ' are respectively the standard abnormal login times, the standard permission change times and the standard file access times. And v 1、υ2、υ3 is a weight factor corresponding to the abnormal login times, the permission change times and the file access times, wherein the weight factor is more than 0 and less than 1.
Note that, the standard abnormal login times, the standard authority change times, the standard file access times, and the weight factors may be set by a technician according to actual situations, and the present embodiment is not limited.
Optionally, when the sensitive data information includes the sensitive data amount, the access times corresponding to each data sensitivity level and the access time, generating the sensitive data evaluation coefficient according to the sensitive data information includes:
And generating a sensitive data evaluation coefficient according to the sensitive data quantity in the sensitive data information, the access times and the access times corresponding to each data sensitivity level.
Specifically, in this embodiment, the sensitivity data amount, the number of accesses corresponding to each data sensitivity level, and the access time may be respectively denoted as D i,And/>Wherein g represents the number corresponding to each data sensitivity level, g=1, 2. The..u. u is any integer greater than 2, and the sensitive data evaluation coefficient beta i is determined by substituting the formula. Wherein, the formula can be:
wherein D ', E ', F ' are respectively the standard sensitivity data amount, the standard access times and the standard access time corresponding to the data sensitivity level, The weight factors are respectively corresponding to the sensitivity data quantity, the access times and the access time, and the weight factors are more than 0 and less than 1.
It should be noted that, the standard sensitivity data amount, the standard access times corresponding to the data sensitivity level, the standard access time, and the weight factor may be set by a technician according to the actual situation, which is not limited in this embodiment.
When the network environment information includes the network bandwidth delay rate, the packet loss rate and the load rate, generating a network environment evaluation coefficient according to the network environment information, including:
and generating a network environment evaluation coefficient according to the network bandwidth delay rate, the packet loss rate and the load rate in the network environment information.
Specifically, in this embodiment, the network bandwidth delay rate, the packet loss rate and the load rate may be respectively recorded as H i、Ti and Y i, and input into a formula to determine the network environment evaluation coefficient χ i. The formula may be:
Wherein, H i、Ti and Y i are respectively a standard network bandwidth delay rate, a standard packet loss rate and a standard load rate, σ 1、σ2、σ3 is respectively a weight factor corresponding to the network bandwidth delay rate, the packet loss rate and the load rate, and the weight factor is greater than 0 and less than 1.
It should be noted that, the standard network bandwidth delay rate, the standard packet loss rate, the standard load rate and the weight factor may be set by a technician according to actual situations, which is not limited in this embodiment.
Optionally, the generating the comprehensive evaluation coefficient based on the security response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient includes:
Inputting the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient into a target formula to obtain a comprehensive evaluation coefficient; wherein, the target formula is:
Wherein delta i is a periodic time point, e is a natural constant, alpha i is a safety response evaluation coefficient, beta i is a sensitive data evaluation coefficient, and χ i is a network environment evaluation coefficient;
And lambda 1、λ2、λ3 is a weight factor corresponding to the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient respectively, wherein the weight factor is more than 0 and less than 1.
It should be noted that, the weighting factors corresponding to the security response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient may be set by a technician according to actual situations, which is not limited in this embodiment.
And S103, when the data encryption of the data processing system at the period time point is determined to be in an invalid state based on the comprehensive evaluation coefficient, adjusting the data security processing strategy corresponding to the period time point according to the comprehensive evaluation coefficient.
Specifically, the embodiment can determine whether the data encryption performed by the data processing system at the periodic time point is valid or not according to the determined comprehensive evaluation coefficient.
The data security processing policy may be a data security related data processing policy, such as a data encryption policy and a data transmission policy.
Optionally, the data security processing policy may include a data encryption policy and/or a data transmission policy.
Optionally, determining that the data encryption performed by the data processing system at the period time point is in an invalid state based on the comprehensive evaluation coefficients includes:
Judging whether the comprehensive evaluation coefficient is larger than a preset standard comprehensive evaluation coefficient or not;
if the comprehensive evaluation coefficient is larger than the standard comprehensive evaluation coefficient, determining that the data encryption performed by the data processing system at the periodic time point is in an invalid state;
And if the comprehensive evaluation coefficient is not greater than the standard comprehensive evaluation coefficient, determining that the data encryption performed by the data processing system at the periodic time point is in a valid state.
Specifically, the embodiment can determine whether the comprehensive evaluation coefficient is greater than a preset standard comprehensive evaluation coefficient. If the comprehensive evaluation coefficient is larger than the standard comprehensive evaluation coefficient, determining that the data encryption performed by the data processing system at the periodic time point is invalid; and if the comprehensive evaluation coefficient is not greater than the standard comprehensive evaluation coefficient, determining that the data encryption performed by the data processing system at the periodic time point is effective.
The standard comprehensive evaluation coefficient may be set by a technician according to actual situations, and the embodiment is not limited.
Specifically, in this embodiment, when the integrated evaluation coefficient is greater than the standard integrated evaluation coefficient, it may be determined that data encryption performed by the data processing system at the periodic time point is invalid, and the periodic time point is determined as the time point to be adjusted.
Optionally, after determining that the data encryption performed by the data processing system at the periodic time point is in a valid state, the method further includes:
And prohibiting adjustment of the data security processing strategy corresponding to the periodic time point.
Specifically, when the comprehensive evaluation coefficient is not greater than the standard comprehensive evaluation coefficient, the embodiment can determine that the data encryption performed by the data processing system at the periodic time point is effective, and the data security processing strategy corresponding to the periodic time point does not need to be adjusted.
Specifically, when it is determined that data encryption performed by the data processing system at a periodic time point is invalid, the data security processing policy corresponding to the periodic time point may be adjusted according to the comprehensive evaluation coefficient. Optionally, the adjusting the data security processing policy corresponding to the period time point according to the comprehensive evaluation coefficient includes:
Searching a corresponding target strategy in the corresponding relation between the coefficients stored in the database and the strategies according to the comprehensive evaluation coefficients;
and adjusting the data security processing strategy corresponding to the periodic time point into a target strategy.
The corresponding relation between the coefficients and the policies may include a one-to-one corresponding relation between a plurality of comprehensive evaluation coefficients and a plurality of data security processing policies.
Specifically, according to the embodiment, according to the comprehensive evaluation coefficient corresponding to the period time point of the data processing system, the data security processing strategy corresponding to the comprehensive evaluation coefficient is searched in the corresponding relation between the coefficient stored in the database and the strategy and is used as the target strategy.
Optionally, when the data security processing policy includes a data encryption policy and a data transmission policy, searching a corresponding target policy in a corresponding relation between a coefficient stored in the database and the policy according to the comprehensive evaluation coefficient includes:
Searching corresponding target encryption strategies and target transmission strategies in the corresponding relation between the coefficients stored in the database and the encryption strategies and the corresponding relation between the coefficients and the transmission strategies according to the comprehensive evaluation coefficients;
and determining the target encryption strategy and the data transmission strategy as target strategies.
The adjusting the data security processing policy corresponding to the period time point to the target policy includes:
and respectively adjusting the data encryption strategy and the data transmission strategy corresponding to the period time point into a target encryption strategy and a data transmission strategy in the target strategy.
It can be understood that the present embodiment may perform the processing of the foregoing steps for a plurality of cycle time points, so as to monitor and adjust a data security processing policy used by the data processing system at the plurality of cycle time points, thereby further enhancing data security.
It should be noted that, the lack of data processing policy adjustment manners in the related art, such as dynamic data encryption, may cause the data to face greater risks and challenges in terms of security, compliance, integrity, and the like, and at least the following problems exist:
1. The data can be more easily attacked and compromised in the transmission and storage processes, especially the data can be more easily stolen in the storage and backup processes, without dynamic data encryption, the data can be exposed to unauthorized access, and the data privacy and security are threatened.
2. Data may be more susceptible to tampering and data integrity problems, affecting the accuracy and trustworthiness of the data, and in the absence of dynamic data encryption, may violate some data protection regulations and compliance requirements, facing potential legal risks and fines.
3. The data is easy to attack from the inside or the outside in the process of storage and transmission, the security of the data is insufficient, and the risk that the data is easy to be disturbed, eavesdropped or tampered in the process of transmission is increased.
It should be further noted that, the embodiment can realize the beneficial effects of real-time data protection, dynamic encryption policy, data transmission confidentiality, data security enhancement and the like, is beneficial to improving data security, protecting data from attack and leakage risk, and has various beneficial effects of real-time performance, high efficiency, self-adaption, management convenience and the like.
According to the embodiment, the safety response information, the sensitive data information and the network environment information of the data processing system are collected, and the comprehensive evaluation coefficient is obtained through real-time analysis according to the information, so that the timely judgment and adjustment of the effectiveness of data encryption can be realized, the real-time performance and flexibility of the data encryption are improved, the safety condition of the data processing system and the effectiveness of a data encryption strategy can be evaluated more accurately, the data encryption and data transmission strategy can be adjusted more efficiently, and the data safety and protection effect are improved.
The embodiment can evaluate and adjust according to the data collected in real time and the system condition, can dynamically adapt to different environments and conditions, ensures the effectiveness and adaptability of a data security processing strategy, thereby better coping with the constantly changing security threat and demand, effectively improving the security of the data by timely adjusting the data encryption and data transmission strategy, protecting the data from unauthorized access and malicious attack, avoiding data leakage and tampering, realizing the automatic management of the data encryption system, relieving the workload of management staff, and improving the convenience and efficiency of the data security management.
The data processing strategy adjustment method provided by the embodiment can collect the operation information of the data processing system at the periodic time point; generating a corresponding comprehensive evaluation coefficient according to the operation information; and when the data encryption of the data processing system at the periodic time point is determined to be in an invalid state based on the comprehensive evaluation coefficient, adjusting the data security processing strategy corresponding to the periodic time point according to the comprehensive evaluation coefficient. The embodiment can enhance the diversity of the data processing strategy adjustment modes and effectively avoid the problem related to the data security risk possibly caused by the lack of the data processing strategy adjustment modes.
As shown in fig. 2, this embodiment proposes a second data processing policy adjustment method, which may include the following steps:
s201, acquiring real-time information. The embodiment can set a plurality of period time points in the data processing system, so that safety response information, sensitive data information and network environment information corresponding to the data processing system are collected at each period time point.
S202, analyzing real-time information. According to the embodiment, the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient corresponding to the data processing system in each period time point can be obtained through analysis according to the safety response information, the sensitive data information and the network environment information corresponding to the data processing system in each period time point.
S203, acquiring comprehensive evaluation coefficients. According to the embodiment, the comprehensive evaluation coefficients corresponding to the data processing systems in each period time point can be obtained through analysis according to the safety response evaluation coefficients, the sensitive data evaluation coefficients and the network environment evaluation coefficients corresponding to the data processing systems in each period time point.
S204, judging the effectiveness of data encryption. According to the embodiment, whether the data encryption of the data processing system has effectiveness or not can be judged according to the comprehensive evaluation coefficient corresponding to the data processing system in each period time point, and each period time point, in which the data encryption of the data processing system does not have effectiveness, is marked as a time point to be adjusted.
S205, adjusting a data encryption strategy. According to the embodiment, corresponding target encryption strategies can be determined according to the comprehensive evaluation coefficients corresponding to the time points to be adjusted, and the data encryption strategies corresponding to the time points to be adjusted are adjusted to target encryption strategies.
S206, adjusting a data transmission strategy. According to the embodiment, corresponding target transmission strategies can be determined according to the comprehensive evaluation coefficients corresponding to the time points to be adjusted, and the data transmission strategies corresponding to the time points to be adjusted are adjusted to be target transmission strategies.
The data processing strategy adjustment method provided by the embodiment can effectively enhance the diversity and effectiveness of the data processing strategy adjustment mode, enhance the safety and confidentiality of the data processing system in the data processing process, and avoid the data security risk problem.
Corresponding to the method shown in fig. 1, as shown in fig. 3, this embodiment proposes a data processing policy adjustment device, which may include:
The acquisition unit is used for acquiring the operation information of the data processing system at the periodic time point; the operation information comprises at least one of security response information, sensitive data information and network environment information;
The generating unit is used for generating corresponding comprehensive evaluation coefficients according to the operation information;
And the adjusting unit is used for adjusting the data security processing strategy corresponding to the period time point according to the comprehensive evaluation coefficient when the data encryption of the data processing system at the period time point is determined to be in an invalid state based on the comprehensive evaluation coefficient.
Optionally, when the operation information includes the security response information, the sensitive data information, and the network environment information, the generating unit is further configured to:
Generating corresponding safety response evaluation coefficients, sensitive data evaluation coefficients and network environment evaluation coefficients according to the safety response information, the sensitive data information and the network environment information in the operation information respectively;
and generating a comprehensive evaluation coefficient based on the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient.
Optionally, when the security response information includes the abnormal login number, the permission change number and the file access number, the generating unit is further configured to:
generating a security response evaluation coefficient according to the abnormal login times, the permission change times and the file access times in the security response information;
when the sensitive data information includes a sensitive data amount, an access number corresponding to each data sensitivity level, and an access time, the generating unit is further configured to:
Generating a sensitive data evaluation coefficient according to the sensitive data quantity in the sensitive data information, the access times and the access time corresponding to each data sensitivity level;
when the network environment information includes the network bandwidth delay rate, the packet loss rate, and the load rate, the generating unit 102 is further configured to:
and generating a network environment evaluation coefficient according to the network bandwidth delay rate, the packet loss rate and the load rate in the network environment information.
Optionally, the generating unit is further configured to:
Inputting the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient into a target formula to obtain a comprehensive evaluation coefficient; wherein, the target formula is:
Wherein delta i is a periodic time point, e is a natural constant, alpha i is a safety response evaluation coefficient, beta i is a sensitive data evaluation coefficient, and χ i is a network environment evaluation coefficient;
lambda 1、λ2、λ3 is the weight factor corresponding to the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient respectively.
Optionally, the adjusting unit is further configured to:
Judging whether the comprehensive evaluation coefficient is larger than a preset standard comprehensive evaluation coefficient or not;
if the comprehensive evaluation coefficient is larger than the standard comprehensive evaluation coefficient, determining that the data encryption performed by the data processing system at the periodic time point is in an invalid state;
And if the comprehensive evaluation coefficient is not greater than the standard comprehensive evaluation coefficient, determining that the data encryption performed by the data processing system at the periodic time point is in a valid state.
Optionally, the apparatus further includes:
And the prohibiting unit is used for prohibiting the adjustment of the data security processing strategy corresponding to the period time point after the data encryption carried out by the data processing system at the period time point is determined to be in a valid state.
Optionally, the adjusting unit is further configured to:
Searching a corresponding target strategy in the corresponding relation between the coefficients stored in the database and the strategies according to the comprehensive evaluation coefficients;
and adjusting the data security processing strategy corresponding to the periodic time point into a target strategy.
Optionally, when the data security processing policy includes a data encryption policy and a data transmission policy, the adjusting unit is further configured to:
Searching corresponding target encryption strategies and target transmission strategies in the corresponding relation between the coefficients stored in the database and the encryption strategies and the corresponding relation between the coefficients and the transmission strategies according to the comprehensive evaluation coefficients;
determining a target encryption policy and a data transmission policy as target policies;
The data security processing strategy corresponding to the periodic time point is adjusted to be a target strategy, which comprises the following steps:
and respectively adjusting the data encryption strategy and the data transmission strategy corresponding to the period time point into a target encryption strategy and a data transmission strategy in the target strategy.
The data processing strategy adjusting device provided by the embodiment can collect the operation information of the data processing system at the periodic time point; generating a corresponding comprehensive evaluation coefficient according to the operation information; and when the data encryption of the data processing system at the periodic time point is determined to be in an invalid state based on the comprehensive evaluation coefficient, adjusting the data security processing strategy corresponding to the periodic time point according to the comprehensive evaluation coefficient. The embodiment can enhance the diversity of the data processing strategy adjustment modes and effectively avoid the problem related to the data security risk possibly caused by the lack of the data processing strategy adjustment modes.
The data processing policy adjustment device in this embodiment is presented as a functional unit, where the unit refers to an ASIC (Application SPECIFIC INTEGRATED Circuit) Circuit, a processor and a memory that execute one or more software or firmware programs, and/or other devices that can provide the above functions.
The embodiment of the invention also provides computer equipment, which is provided with the data processing strategy adjusting device shown in the figure 3.
Referring to fig. 4, fig. 4 is a schematic structural diagram of a computer device according to an alternative embodiment of the present invention, as shown in fig. 4, the computer device includes: one or more processors 10, memory 20, and interfaces for connecting the various components, including high-speed interfaces and low-speed interfaces. The various components are communicatively coupled to each other using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions executing within the computer device, including instructions stored in or on memory to display graphical information of the GUI on an external input/output device, such as a display device coupled to the interface. In some alternative embodiments, multiple processors and/or multiple buses may be used, if desired, along with multiple memories and multiple memories. Also, multiple computer devices may be connected, each providing a portion of the necessary operations (e.g., as a server array, a set of blade servers, or a multiprocessor system). One processor 10 is illustrated in fig. 4.
The processor 10 may be a central processor, a network processor, or a combination thereof. The processor 10 may further include a hardware chip, among others. The hardware chip may be an application specific integrated circuit, a programmable logic device, or a combination thereof. The programmable logic device may be a complex programmable logic device, a field programmable gate array, a general-purpose array logic, or any combination thereof.
Wherein the memory 20 stores instructions executable by the at least one processor 10 to cause the at least one processor 10 to perform a method for implementing the embodiments described above.
The memory 20 may include a storage program area that may store an operating system, at least one application program required for functions, and a storage data area. The storage data area may store data created according to the use of the computer device, etc. In addition, the memory 20 may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid-state storage device. In some alternative embodiments, memory 20 may optionally include memory located remotely from processor 10, which may be connected to the computer device via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The memory 20 may include volatile memory, such as random access memory. The memory may also include non-volatile memory, such as flash memory, a hard disk, or a solid state disk. The memory 20 may also comprise a combination of the above types of memories.
The computer device also includes a communication interface 30 for the computer device to communicate with other devices or communication networks.
The embodiments of the present invention also provide a computer readable storage medium, and the method according to the embodiments of the present invention described above may be implemented in hardware, firmware, or as a computer code which may be recorded on a storage medium, or as original stored in a remote storage medium or a non-transitory machine readable storage medium downloaded through a network and to be stored in a local storage medium, so that the method described herein may be stored on such software process on a storage medium using a general purpose computer, a special purpose processor, or programmable or special purpose hardware. The storage medium can be a magnetic disk, an optical disk, a read-only memory, a random access memory, a flash memory, a hard disk, a solid state disk or the like; further, the storage medium may also comprise a combination of memories of the kind described above. It will be appreciated that a computer, processor, microprocessor controller or programmable hardware includes a storage element that can store or receive software or computer code that, when accessed and executed by the computer, processor or hardware, implements the methods illustrated by the above embodiments.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present invention, and are not limiting; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A method for adjusting a data processing policy, comprising:
Collecting operation information of a data processing system at a periodic time point; wherein the operation information comprises at least one of security response information, sensitive data information and network environment information;
generating a corresponding comprehensive evaluation coefficient according to the operation information;
And when the data encryption of the data processing system at the period time point is determined to be in an invalid state based on the comprehensive evaluation coefficient, adjusting the data security processing strategy corresponding to the period time point according to the comprehensive evaluation coefficient.
2. The method of claim 1, wherein when the operation information includes security response information, sensitive data information, and network environment information, the generating the corresponding comprehensive evaluation coefficients according to the operation information includes:
generating corresponding safety response evaluation coefficients, sensitive data evaluation coefficients and network environment evaluation coefficients according to the safety response information, the sensitive data information and the network environment information in the operation information respectively;
And generating the comprehensive evaluation coefficient based on the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient.
3. The method according to claim 2, wherein when the number of abnormal logins, the number of rights changes, and the number of file accesses are included in the security response information, generating the security response evaluation coefficient from the security response information includes:
Generating the safety response evaluation coefficient according to the abnormal login times, the authority change times and the file access times in the safety response information;
When the sensitive data information comprises sensitive data quantity, access times and access time corresponding to each data sensitivity level, generating the sensitive data evaluation coefficient according to the sensitive data information, wherein the sensitive data evaluation coefficient comprises the following steps:
generating the sensitive data evaluation coefficient according to the sensitive data quantity in the sensitive data information, the access times and the access time corresponding to each data sensitivity level;
When the network environment information includes a network bandwidth delay rate, a packet loss rate and a load rate, generating the network environment evaluation coefficient according to the network environment information, including:
And generating the network environment evaluation coefficient according to the network bandwidth delay rate, the packet loss rate and the load rate in the network environment information.
4. The method of claim 2, wherein the generating the composite evaluation factor based on the security response evaluation factor, the sensitive data evaluation factor, and the network environment evaluation factor comprises:
inputting the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient into a target formula to obtain the comprehensive evaluation coefficient; wherein, the target formula is:
Wherein δ i is the periodic time point, e is a natural constant, α i is the safety response evaluation coefficient, β i is the sensitive data evaluation coefficient, χ i is the network environment evaluation coefficient;
And lambda 1、λ2、λ3 is the weight factors corresponding to the safety response evaluation coefficient, the sensitive data evaluation coefficient and the network environment evaluation coefficient respectively.
5. The method of claim 1, wherein determining that data encryption by the data processing system at the periodic point in time is invalid based on the composite evaluation coefficient comprises:
judging whether the comprehensive evaluation coefficient is larger than a preset standard comprehensive evaluation coefficient or not;
if the comprehensive evaluation coefficient is larger than the standard comprehensive evaluation coefficient, determining that data encryption performed by the data processing system at the periodic time point is in an invalid state;
and if the comprehensive evaluation coefficient is not greater than the standard comprehensive evaluation coefficient, determining that the data encryption performed by the data processing system at the periodic time point is in a valid state.
6. The method of claim 5, wherein after said determining that data encryption by the data processing system at the periodic point in time is valid, the method further comprises:
and prohibiting adjustment of the data security processing strategy corresponding to the periodic time point.
7. The method according to any one of claims 1 to 6, wherein said adjusting the data security processing policy corresponding to the periodic time point according to the comprehensive evaluation coefficient comprises:
Searching a corresponding target strategy in the corresponding relation between the coefficient stored in the database and the strategy according to the comprehensive evaluation coefficient;
and adjusting the data security processing strategy corresponding to the periodic time point to the target strategy.
8. The method according to claim 7, wherein when the data security processing policy includes a data encryption policy and a data transmission policy, the searching for a corresponding target policy in the coefficient-policy correspondence stored in the database according to the comprehensive evaluation coefficient includes:
Searching corresponding target encryption strategies and target transmission strategies in the corresponding relation between the coefficients stored in the database and the encryption strategies and the corresponding relation between the coefficients and the transmission strategies according to the comprehensive evaluation coefficients;
Determining the target encryption policy and the data transmission policy as the target policy;
The adjusting the data security processing policy corresponding to the periodic time point to the target policy includes:
and respectively adjusting the data encryption strategy and the data transmission strategy corresponding to the periodic time point into the target encryption strategy and the data transmission strategy in the target strategy.
9. A data processing policy adjustment device, comprising:
The acquisition unit is used for acquiring the operation information of the data processing system at the periodic time point; wherein the operation information comprises at least one of security response information, sensitive data information and network environment information;
the generating unit is used for generating corresponding comprehensive evaluation coefficients according to the operation information;
And the adjusting unit is used for adjusting the data security processing strategy corresponding to the period time point according to the comprehensive evaluation coefficient when the data encryption of the data processing system at the period time point is determined to be in an invalid state based on the comprehensive evaluation coefficient.
10. A computer device, comprising:
A memory and a processor, the memory and the processor being communicatively connected to each other, the memory having stored therein computer instructions, the processor executing the computer instructions to perform the data processing policy adjustment method of any of claims 1 to 8.
CN202410259443.6A 2024-03-07 2024-03-07 Data processing strategy adjustment method, device and equipment Pending CN118194318A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410259443.6A CN118194318A (en) 2024-03-07 2024-03-07 Data processing strategy adjustment method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410259443.6A CN118194318A (en) 2024-03-07 2024-03-07 Data processing strategy adjustment method, device and equipment

Publications (1)

Publication Number Publication Date
CN118194318A true CN118194318A (en) 2024-06-14

Family

ID=91407933

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410259443.6A Pending CN118194318A (en) 2024-03-07 2024-03-07 Data processing strategy adjustment method, device and equipment

Country Status (1)

Country Link
CN (1) CN118194318A (en)

Similar Documents

Publication Publication Date Title
US11184401B2 (en) AI-driven defensive cybersecurity strategy analysis and recommendation system
CN111859400B (en) Risk assessment method, risk assessment device, computer system and medium
CN103023983B (en) For the system of the process of distributed computer safe task
US20220201042A1 (en) Ai-driven defensive penetration test analysis and recommendation system
Tien et al. KubAnomaly: Anomaly detection for the Docker orchestration platform with neural network approaches
CN112073389B (en) Cloud host security situation awareness system, method, device and storage medium
CN103051707A (en) Dynamic user behavior-based cloud forensics method and dynamic user behavior-based cloud forensics system
CN113364753B (en) Anti-crawler method and device, electronic equipment and computer readable storage medium
Uemura et al. Availability analysis of an intrusion tolerant distributed server system with preventive maintenance
CN116305155A (en) Program safety detection protection method, device, medium and electronic equipment
CN117478433B (en) Network and information security dynamic early warning system
RU2481633C2 (en) System and method for automatic investigation of safety incidents
Peng et al. Micro-architectural features for malware detection
US12010139B2 (en) Detecting malware infection path in a cloud computing environment utilizing a security graph
CN117370701A (en) Browser risk detection method, browser risk detection device, computer equipment and storage medium
US20230208862A1 (en) Detecting malware infection path in a cloud computing environment utilizing a security graph
JP2005234661A (en) Access policy creation system, method and program
CN118194318A (en) Data processing strategy adjustment method, device and equipment
KR102541888B1 (en) Image-based malicious code analysis method and apparatus and artificial intelligence-based endpoint detection and response system using the same
CN113704749B (en) Malicious mining detection processing method and device
WO2019113492A1 (en) Detecting and mitigating forged authentication object attacks using an advanced cyber decision platform
US8756699B1 (en) Counting unique identifiers securely
CN115085965B (en) Power system information network attack risk assessment method, device and equipment
CN108471430A (en) A kind of Internet of Things embedded-type security means of defence and device
CN117290823B (en) APP intelligent detection and safety protection method, computer equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination