Application research on network security operation automation practice based on RPA technology
The research focuses on the entire lifecycle of networks and information systems, aiming at the full-process scenarios of cybersecurity operations. It establishes a capability framework based on robotic process automation (RPA) technology and adaptive cybersecurity technology, along with address the...
Saved in:
Main Author: | |
---|---|
Format: | Article |
Language: | zho |
Published: |
Beijing Xintong Media Co., Ltd
2024-07-01
|
Series: | Dianxin kexue |
Subjects: | |
Online Access: | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2024190/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841528907188142080 |
---|---|
author | ZHOU Ying |
author_facet | ZHOU Ying |
author_sort | ZHOU Ying |
collection | DOAJ |
description | The research focuses on the entire lifecycle of networks and information systems, aiming at the full-process scenarios of cybersecurity operations. It establishes a capability framework based on robotic process automation (RPA) technology and adaptive cybersecurity technology, along with address the common pain points in cybersecurity operations, such as high manual dependency, relatively fragmented cybersecurity capability platforms, and missing key points in cybersecurity operations. By constructing an automated cybersecurity operation platform based on RPA technology, the automation transformation of daily cybersecurity work was realized, and the remaining human resources were allocated areas that cannot be automated at the moment, such as business-level cybersecurity analysis, business network security penetration, vulnerability mining, and automated operation script development. Ultimately, it aims to alleviate the contradiction of insufficient manpower, reduce personnel shortages, and improve the coverage and efficiency of cybersecurity work. |
format | Article |
id | doaj-art-f8b9624e4e5747579db81ff6e6821d6b |
institution | Kabale University |
issn | 1000-0801 |
language | zho |
publishDate | 2024-07-01 |
publisher | Beijing Xintong Media Co., Ltd |
record_format | Article |
series | Dianxin kexue |
spelling | doaj-art-f8b9624e4e5747579db81ff6e6821d6b2025-01-15T03:33:47ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012024-07-014016417467513288Application research on network security operation automation practice based on RPA technologyZHOU YingThe research focuses on the entire lifecycle of networks and information systems, aiming at the full-process scenarios of cybersecurity operations. It establishes a capability framework based on robotic process automation (RPA) technology and adaptive cybersecurity technology, along with address the common pain points in cybersecurity operations, such as high manual dependency, relatively fragmented cybersecurity capability platforms, and missing key points in cybersecurity operations. By constructing an automated cybersecurity operation platform based on RPA technology, the automation transformation of daily cybersecurity work was realized, and the remaining human resources were allocated areas that cannot be automated at the moment, such as business-level cybersecurity analysis, business network security penetration, vulnerability mining, and automated operation script development. Ultimately, it aims to alleviate the contradiction of insufficient manpower, reduce personnel shortages, and improve the coverage and efficiency of cybersecurity work.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2024190/RPAnetwork security operation automation platformnetwork security policy managementnetwork security operation systemnetwork security |
spellingShingle | ZHOU Ying Application research on network security operation automation practice based on RPA technology Dianxin kexue RPA network security operation automation platform network security policy management network security operation system network security |
title | Application research on network security operation automation practice based on RPA technology |
title_full | Application research on network security operation automation practice based on RPA technology |
title_fullStr | Application research on network security operation automation practice based on RPA technology |
title_full_unstemmed | Application research on network security operation automation practice based on RPA technology |
title_short | Application research on network security operation automation practice based on RPA technology |
title_sort | application research on network security operation automation practice based on rpa technology |
topic | RPA network security operation automation platform network security policy management network security operation system network security |
url | http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2024190/ |
work_keys_str_mv | AT zhouying applicationresearchonnetworksecurityoperationautomationpracticebasedonrpatechnology |