Information security policy evaluation system and method of controlling the same
    1.
    发明申请
    Information security policy evaluation system and method of controlling the same 失效
    信息安全政策评估体系及其控制方法

    公开(公告)号:US20050076243A1

    公开(公告)日:2005-04-07

    申请号:US10817054

    申请日:2004-04-02

    CPC分类号: H04L63/0227 G06Q40/08

    摘要: In order to provide an information security policy evaluation system in which information security policies can be efficiently and appropriately defined and operated in an organization, such as a corporation, treated threats operated on a second site 102 are transmitted from a second information processing apparatus 112 on the second site 102 to a first information processing apparatus 111 on a first site 101, threat information is transmitted from a third site 103 collecting information on threats to the first information processing apparatus 111 on the first site 101. The first information processing apparatus 111 extracts treated threats which have been effective for threats having occurred actually, and untreated threats, out of the received treated threat and generates an evaluation report in which these are described. Moreover, a compensation amount of insurance against threats is changed based on the generated evaluation report.

    摘要翻译: 为了提供一种信息安全策略评估系统,其中可以在诸如公司的组织中有效地适当地定义和操作信息安全策略,在第二站点102处操作的处理的威胁从第二信息处理设备112发送到 将第二站点102发送到第一站点101上的第一信息处理设备111,从第一站点101上的第一信息处理设备111的收集关于威胁的信息的第三站点103发送威胁信息。第一信息处理设备111提取 对已经发生的威胁进行有效的威胁,以及未经处理的威胁,不受处理的威胁,并产生一个评估报告。 此外,根据所产生的评估报告,更改对威胁的赔偿额。

    Information security policy evaluation system and method of controlling the same
    2.
    发明授权
    Information security policy evaluation system and method of controlling the same 失效
    信息安全政策评估体系及其控制方法

    公开(公告)号:US07415728B2

    公开(公告)日:2008-08-19

    申请号:US10817054

    申请日:2004-04-02

    IPC分类号: G06Q40/00 G06F15/18

    CPC分类号: H04L63/0227 G06Q40/08

    摘要: In order to provide an information security policy evaluation system in which information security policies can be efficiently and appropriately defined and operated in an organization, such as a corporation, treated threats operated on a second site are transmitted from a second information processing apparatus on the second site to a first information processing apparatus on a first site, threat information is transmitted from a third site collecting information on threats to the first information processing apparatus on the first site. The first information processing apparatus extracts treated threats which have been effective for threats having occurred actually, and untreated threats, out of the received treated threat and generates an evaluation report in which these are described. Moreover, a compensation amount of insurance against threats is changed based on the generated evaluation report.

    摘要翻译: 为了提供信息安全策略评估系统,其中可以在诸如公司的组织中有效且适当地定义和操作信息安全策略,在第二站点上从第二信息处理设备发送在第二站点上操作的处理的威胁 站点到第一站点上的第一信息处理设备,在第一站点上从第三站点收集关于对第一信息处理设备的威胁的信息的威胁信息。 第一信息处理设备提取对已经发生的威胁已经有效的处理的威胁以及未被处理的威胁,并且生成其中描述了这些威胁的评估报告。 此外,根据所产生的评估报告,更改对威胁的赔偿额。