The Knowing, Practices and Thoughts on “Cybersecurity Maps” from CubeSec
Journal of Information Security Reserach ›› 2021, Vol. 7 ›› Issue (E1): 140-.
Previous Articles Next Articles
Online:
Published:
陈达鑫;蓝朝贤;侯俊
通讯作者:
作者简介:
Abstract: In the field of cyberspace security, the “cybersecurity maps” refers to the visualization and analysis of assets, vulnerabilities, and threats through new technologies such as knowledge mapping and graph computing. The product adopt a variety of technological means to sort out networkwide asset and vulnerability data for users, and use knowledge mapping, graph computing, and other new technologies to draw a “vulnerability derivation maps” according to the firewall release rules, which can provide important data support, aid decision making and command operations in various red teamblue team exercises.Key words cybersecurity maps; red team-blue team exercises; vulnerability visualization; information security; cybersecurity
Key words: cybersecurity maps, red team-blue team exercises, vulnerability visualization, information security, cybersecurity
摘要: “挂图作战”在网络空间安全领域,指代通过知识图谱、图计算等新技术对资产、脆弱性、威胁进行可视化呈现与分析.产品采用多种技术手段,为用户梳理全网资产及脆弱性数据,根据防火墙放行规则,利用知识图谱、图计算等新技术绘制出“脆弱性推演图”,可在各类红蓝对抗、实战演练活动中提供重要的数据支撑,辅助决策,指挥作战.关键词挂图作战;红蓝对抗;脆弱性可视化;信息安全;网络安全
关键词: 挂图作战, 红蓝对抗, 脆弱性可视化, 信息安全, 网络安全
陈达鑫, 蓝朝贤, 侯俊. 真挂图,挂真图——魔方安全对“挂图作战”的认识、实践与思考[J]. 信息安全研究, 2021, 7(E1): 140-.
0 / / Recommend
Add to citation manager EndNote|Ris|BibTeX
URL: http://www.sicris.cn/EN/
http://www.sicris.cn/EN/Y2021/V7/IE1/140