Font Size: a A A

Design And Implementation Of A Closed Loop Management System For Vulnerabilities And Threats

Posted on:2020-11-27Degree:MasterType:Thesis
Country:ChinaCandidate:R HuangFull Text:PDF
GTID:2428330602950532Subject:Engineering
Abstract/Summary:PDF Full Text Request
The rapid development of information communication and computer technology has changed people's way of life and promoted the transformation of production methods.However,the information security problems have increased and the security threats faced by network systems have also evolved.Vulnerabilities are one of the important reasons for security problems.Most of the network attacks are based on vulnerabilities.If a device in a production system is maliciously attacked by an illegal person through a vulnerability,it will cause unpredictable loss or even catastrophic damage.In order to avoid the threat of assets due to the existence of vulnerabilities,some enterprises may also deploy some corresponding network security products to reduce the security risks in the production process.As the IT environment continues to evolve,the number of vulnerabilities that are disclosed each year increases year by year,and threats change over time.If there is only one kind of security product,it is not able to comprehensively detect and reflect the safety of the production environment.If multiple security devices are used,the security products are relatively independent,which brings inconvenience to the enterprise in using and managing these security products.In addition,due to the increasing difficulty of enterprise security vulnerability management,enterprise security vulnerability management faces these challenges: the vulnerability management link is missing,for example,the vulnerability is not prioritized according to the actual impact of the enterprise.The emergency vulnerability is correspondingly passive and slow,such as the vulnerability cannot be timely discovered and known by the security administrators,failure to achieve timely protection.Internet exposure of assets is lack of supervision.The whole process of vulnerability management should include at least the vulnerability discovery to the vulnerability assessment to the patching and repairing,and should have the characteristics of closed-loop management and control.However,most of the current vulnerability management processes focus on discovery but not on patching.The main work after discovering and evaluating the vulnerability relies on manual and passive implementation,the lack of automated management methods makes people vulnerable to make mistakes in vulnerability management.Vulnerability management is a management link with high investment and effectiveness ratio in risk management.It is a very important link in network security work and it can effectively prevent the loss and impact caused by security incidents.The purpose of this paper is to design and implement a closed loop management system to solve the above problems.The system provides full process support for vulnerability management,with functions such as asset management,vulnerability collection and processing,vulnerability threat management,alarm management,and vulnerability management.The system improves the vulnerability management process by collecting information on the intranet host and vulnerability information,website vulnerability information,vulnerability threat information,etc.So that relevant security managers can intuitively grasp the vulnerability and governance,and receive response information in a timely manner.This system can help customers establish a rapid response mechanism and complete the patching work in a timely and effective manner.The system is based on Py Charm which is a visual Python integrated development environment,the background development uses Django framework to realize the main business logic of the system,and the database uses Postgre SQL database management system.After thoroughly analyzing the system requirements,the whole system function was designed and implemented.Finally,the system was fully tested,so that the system can meet the needs of users and the needs of enterprise security management.
Keywords/Search Tags:Vulnerability Management, Threat, Information Security, Automated, Closed-loop
PDF Full Text Request
Related items