Vulnerability full-life-cycle management operation system and method
The invention relates to a vulnerability full-life-cycle management operation system, and relates to the technical field of information security, and the system comprises a vulnerability discovery module which is used for collecting system information of a target system and carrying out vulnerabilit...
Saved in:
Main Authors | , , , , , |
---|---|
Format | Patent |
Language | Chinese English |
Published |
01.12.2023
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | The invention relates to a vulnerability full-life-cycle management operation system, and relates to the technical field of information security, and the system comprises a vulnerability discovery module which is used for collecting system information of a target system and carrying out vulnerability scanning to discover vulnerabilities; the vulnerability verification module is used for verifying the vulnerability discovered by the vulnerability discovery module and outputting a verification result; the vulnerability report module is used for sending a vulnerability report when the verification result output by the vulnerability verification module is that the vulnerability exists; the vulnerability report comprises vulnerability names, vulnerability types and vulnerability occurrence times; and the operation management module is used for receiving the vulnerability report sent by the vulnerability report module and classifying and filing the vulnerabilities based on the vulnerability report.
本申请涉及一种漏洞全生命周期管理 |
---|---|
Bibliography: | Application Number: CN202311132894 |