Vulnerability full-life-cycle management operation system and method

The invention relates to a vulnerability full-life-cycle management operation system, and relates to the technical field of information security, and the system comprises a vulnerability discovery module which is used for collecting system information of a target system and carrying out vulnerabilit...

Full description

Saved in:
Bibliographic Details
Main Authors XIE ANWEI, LI WEN, CAI WENCHANG, LI NA, WU XINGLIANG, HUANG WEILONG
Format Patent
LanguageChinese
English
Published 01.12.2023
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:The invention relates to a vulnerability full-life-cycle management operation system, and relates to the technical field of information security, and the system comprises a vulnerability discovery module which is used for collecting system information of a target system and carrying out vulnerability scanning to discover vulnerabilities; the vulnerability verification module is used for verifying the vulnerability discovered by the vulnerability discovery module and outputting a verification result; the vulnerability report module is used for sending a vulnerability report when the verification result output by the vulnerability verification module is that the vulnerability exists; the vulnerability report comprises vulnerability names, vulnerability types and vulnerability occurrence times; and the operation management module is used for receiving the vulnerability report sent by the vulnerability report module and classifying and filing the vulnerabilities based on the vulnerability report. 本申请涉及一种漏洞全生命周期管理
Bibliography:Application Number: CN202311132894