Vulnerability analysis environment simulation method and system realized by utilizing cloud migration technology
The invention discloses a vulnerability analysis environment simulation method and system realized by using a cloud migration technology. The method comprises the steps of: S1, deploying simulation platform clients on each production system, and carrying out integrated real-time synchronization of a...
Gespeichert in:
Hauptverfasser: | , , , , , , , , |
---|---|
Format: | Patent |
Sprache: | chi ; eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | The invention discloses a vulnerability analysis environment simulation method and system realized by using a cloud migration technology. The method comprises the steps of: S1, deploying simulation platform clients on each production system, and carrying out integrated real-time synchronization of an operation system, a database, an application and data of each production system to a simulation platform; S2, creating a plurality of security desktops on the simulation platform; and S3, completing different operations on the simulation platform through the different safety desktops. With the vulnerability analysis environment simulation method and system realized by utilizing the cloud migration technology adopted, the production environment can be simulated completely, and the requirements for testing, missed scanning and the like of the production systems are met to the maximum extent; a simulation service environment can be provided, a whole service system can be built in equipment by utilizing a built-in cl |
---|