Vulnerability analysis environment simulation method and system realized by utilizing cloud migration technology

The invention discloses a vulnerability analysis environment simulation method and system realized by using a cloud migration technology. The method comprises the steps of: S1, deploying simulation platform clients on each production system, and carrying out integrated real-time synchronization of a...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: YANG CHUNJIE, WANG JIEFENG, WANG CE, LONG YUJIANG, LI XUN, ZHOU JIN, GAN RUNDONG, WEI WEI, WANG XINGCHUAN
Format: Patent
Sprache:chi ; eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:The invention discloses a vulnerability analysis environment simulation method and system realized by using a cloud migration technology. The method comprises the steps of: S1, deploying simulation platform clients on each production system, and carrying out integrated real-time synchronization of an operation system, a database, an application and data of each production system to a simulation platform; S2, creating a plurality of security desktops on the simulation platform; and S3, completing different operations on the simulation platform through the different safety desktops. With the vulnerability analysis environment simulation method and system realized by utilizing the cloud migration technology adopted, the production environment can be simulated completely, and the requirements for testing, missed scanning and the like of the production systems are met to the maximum extent; a simulation service environment can be provided, a whole service system can be built in equipment by utilizing a built-in cl