Application research on network security operation automation practice based on RPA technology

The research focuses on the entire lifecycle of networks and information systems, aiming at the full-process scenarios of cybersecurity operations. It establishes a capability framework based on robotic process automation (RPA) technology and adaptive cybersecurity technology, along with address the...

Full description

Saved in:
Bibliographic Details
Main Author: ZHOU Ying
Format: Article
Language:zho
Published: Beijing Xintong Media Co., Ltd 2024-07-01
Series:Dianxin kexue
Subjects:
Online Access:http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2024190/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1841528907188142080
author ZHOU Ying
author_facet ZHOU Ying
author_sort ZHOU Ying
collection DOAJ
description The research focuses on the entire lifecycle of networks and information systems, aiming at the full-process scenarios of cybersecurity operations. It establishes a capability framework based on robotic process automation (RPA) technology and adaptive cybersecurity technology, along with address the common pain points in cybersecurity operations, such as high manual dependency, relatively fragmented cybersecurity capability platforms, and missing key points in cybersecurity operations. By constructing an automated cybersecurity operation platform based on RPA technology, the automation transformation of daily cybersecurity work was realized, and the remaining human resources were allocated areas that cannot be automated at the moment, such as business-level cybersecurity analysis, business network security penetration, vulnerability mining, and automated operation script development. Ultimately, it aims to alleviate the contradiction of insufficient manpower, reduce personnel shortages, and improve the coverage and efficiency of cybersecurity work.
format Article
id doaj-art-f8b9624e4e5747579db81ff6e6821d6b
institution Kabale University
issn 1000-0801
language zho
publishDate 2024-07-01
publisher Beijing Xintong Media Co., Ltd
record_format Article
series Dianxin kexue
spelling doaj-art-f8b9624e4e5747579db81ff6e6821d6b2025-01-15T03:33:47ZzhoBeijing Xintong Media Co., LtdDianxin kexue1000-08012024-07-014016417467513288Application research on network security operation automation practice based on RPA technologyZHOU YingThe research focuses on the entire lifecycle of networks and information systems, aiming at the full-process scenarios of cybersecurity operations. It establishes a capability framework based on robotic process automation (RPA) technology and adaptive cybersecurity technology, along with address the common pain points in cybersecurity operations, such as high manual dependency, relatively fragmented cybersecurity capability platforms, and missing key points in cybersecurity operations. By constructing an automated cybersecurity operation platform based on RPA technology, the automation transformation of daily cybersecurity work was realized, and the remaining human resources were allocated areas that cannot be automated at the moment, such as business-level cybersecurity analysis, business network security penetration, vulnerability mining, and automated operation script development. Ultimately, it aims to alleviate the contradiction of insufficient manpower, reduce personnel shortages, and improve the coverage and efficiency of cybersecurity work.http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2024190/RPAnetwork security operation automation platformnetwork security policy managementnetwork security operation systemnetwork security
spellingShingle ZHOU Ying
Application research on network security operation automation practice based on RPA technology
Dianxin kexue
RPA
network security operation automation platform
network security policy management
network security operation system
network security
title Application research on network security operation automation practice based on RPA technology
title_full Application research on network security operation automation practice based on RPA technology
title_fullStr Application research on network security operation automation practice based on RPA technology
title_full_unstemmed Application research on network security operation automation practice based on RPA technology
title_short Application research on network security operation automation practice based on RPA technology
title_sort application research on network security operation automation practice based on rpa technology
topic RPA
network security operation automation platform
network security policy management
network security operation system
network security
url http://www.telecomsci.com/zh/article/doi/10.11959/j.issn.1000-0801.2024190/
work_keys_str_mv AT zhouying applicationresearchonnetworksecurityoperationautomationpracticebasedonrpatechnology