{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T06:46:12Z","timestamp":1742971572768,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":31,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789813349216"},{"type":"electronic","value":"9789813349223"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,1,19]],"date-time":"2021-01-19T00:00:00Z","timestamp":1611014400000},"content-version":"vor","delay-in-days":384,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>\nDuring the digital development process, enterprises have accumulated a lot of network asset including hardware, software and websites. Effective management of network asset can reduce the internet risk. Network asset is the primary object of information security. Therefore, the essential content of enterprise information security operation is ensuring the security of network assets sufficiently. This paper has investigated researches about detection, management and applications of network assets. The difficulty and current solutions have been summarized by the review. Moreover, this paper puts forward a solution of network asset management according to the bank situation.<\/jats:p>","DOI":"10.1007\/978-981-33-4922-3_16","type":"book-chapter","created":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T11:21:04Z","timestamp":1610968864000},"page":"215-221","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Brief Introduction of Network Security Asset Management for Banks"],"prefix":"10.1007","author":[{"given":"Yumo","family":"Wang","sequence":"first","affiliation":[]},{"given":"Qinghua","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,1,19]]},"reference":[{"key":"16_CR1","unstructured":"Wang, C., Guo, Y., Zhen, S., Yang, W.: Research on network asset detection technology. Comput. Sci., 24\u201331 (2018)"},{"key":"16_CR2","unstructured":"Zhang, H., Wang, S., Jin, H., Deng, X.: Detection of operator network asset security management and control technology and solutions. Guangdong Commun. Technol. 5\u20139 (2019)"},{"key":"16_CR3","unstructured":"Yao, M., Lu, N., Bai, Z., Liu, Y., Shi, W.: Building method of device fingerprint search engine for network asset vulnerability assessment. J. Electron. 2354\u20132358 (2019)"},{"key":"16_CR4","unstructured":"Pei, Z., Li, B., Wang, X.: Logic processing design of IP and port scanning system. Network Secur. Technol. Appl. 26\u201327 (2017)"},{"key":"16_CR5","unstructured":"Ding, Y., Gao, Q., He, L.: Design and realization of assets sacn system based on complement protocol. J. Shanghai Univ. Technol. 196\u2013200(2010)"},{"key":"16_CR6","unstructured":"Yu, X.: Design and realization of TCP\/IP network scan strategy. J. Wuhan Vocational Techn. College, 54\u201356 (2009)"},{"key":"16_CR7","unstructured":"Li, J., Liu, P., Cai, G.: Dynamic network asset monitoring based on traffic perception. Inf. Secur. Res. 523\u2013529 (2020)"},{"key":"16_CR8","unstructured":"Deng, X., Jin, H., Wang, S., Zhang, H.: Research on active discovery of IP assets in enterprise open network environment. Guangdong Commun. Technol. 2\u20134 (2019)"},{"key":"16_CR9","unstructured":"Lin, P.: Research on web risk scanning of internet information assets of postal enterprises. Postal Res. 15\u201317 (2008)"},{"key":"16_CR10","unstructured":"Chen, Z.: Case analysis and practice of web penetration. Network Secur. Technol. Appl. 22\u201324 (2020)"},{"key":"16_CR11","unstructured":"Wang, K., Li, Z., Wang, R., Gao, W., Wang, W., Wang, J.: Vulnerability scanning based on Nmap&Nessus. Commun. Power Technol. 135\u2013136 (2020)"},{"key":"16_CR12","unstructured":"Zou, H.: Exploring the strategy of strengthening network asset management in the communication industry. Modern State-owned Enterprise Res. 49\u201350 (2015)"},{"key":"16_CR13","unstructured":"Li, Y.: On the role and importance of IP address planning and management in large and medium-sized enterprises. Commun. World, 20\u201321 (2019)"},{"key":"16_CR14","unstructured":"Wang, W.: Study on computer network security management and maintenance in hospital informatization construction. Technology, 115\u2013116 (2020)"},{"key":"16_CR15","unstructured":"Zhang, X., Yuan, S., Ma, Z., Zhang, M., Gao, F.: Cloud-oriented asset security management scheme. Post Telecommun. Des. Technol. 12\u201315 (2019)"},{"key":"16_CR16","unstructured":"Xiao, Y., He, M., Wang, L.: Application research and practice of telecom operators\u2019 network asset security management technology. Guangdong Commun. Technol. (2018)"},{"key":"16_CR17","unstructured":"Song, J., Tang, G.: Research and application of network security situational awareness technology. Commun. Technol. 1419\u20131424 (2018)"},{"key":"16_CR18","unstructured":"Yang, X.: Thoughts on implementing dynamic management of network assets in the communication industry. Chinese Foreign Entrepreneurs, pp. 68\u201369 (2014)"},{"key":"16_CR19","unstructured":"Xie, R.: Lean management of optical network assets. Commun. Enterprise Manage. 24\u201327 (2017)"},{"key":"16_CR20","unstructured":"Zhang, S.: Network security technology based on blockchain. Inf. Technol. Inform. 129\u2013131 (2019)"},{"key":"16_CR21","unstructured":"Chen, J.: Pre-matching scheme of network asset resources based on weighted cosine similarity. Telecommun. Technol. 46\u201349 (2018)"},{"key":"16_CR22","unstructured":"Lei, B.: About operation and maintenance management of IP addresses in enterprise networks. Network Secur. Technol. Appl. 106\u2013107 (2019)"},{"key":"16_CR23","unstructured":"Yue, J.: Building an e-government network health evaluation platform based on situational awareness technology. Inform. China, 44\u201348 (2018)"},{"key":"16_CR24","unstructured":"Xia, Z., Li, L.: Research and design of network security situational awareness system. Inf. Commun. 147\u2013148 (2017)"},{"key":"16_CR25","unstructured":"Li, H., Huang, X.: Illegal access detection of wireless routing equipment based on asset identification technology. China Secur. 101\u2013105 (2019)"},{"key":"16_CR26","unstructured":"Xiao, X., et al.: A review of research on security situation prediction technology based on artificial intelligence. Inf. Security Res. 506\u2013513 (2020)"},{"key":"16_CR27","unstructured":"Zhao, C., Sun, H., Wang, G., Lu, X.: Network security analysis of power information system based on big data. Electron. Des. Eng. 148\u2013152 (2019)"},{"key":"16_CR28","unstructured":"Ma, Y.: Research on information security and protection of computer networks in the era of big data. Wind Sci. Technol. 82 (2020)"},{"key":"16_CR29","unstructured":"Hua, R.: Vulnerability management five: ten best practices. Instrument and Instrument, 60\u201362 (2016)"},{"key":"16_CR30","unstructured":"Liu, Z.: Theory and practice of Internet finance users\u2019 privacy data security. Secur. Cyberspace, 11\u201315 (2020)"},{"key":"16_CR31","unstructured":"Cai, G., Liu, P., Li, C.: Analysis of traffic security baseline of government websites. Inf. Secur. Res. 537\u2013542 (2020)"}],"container-title":["Communications in Computer and Information Science","Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-33-4922-3_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,1,18]],"date-time":"2021-01-18T11:38:44Z","timestamp":1610969924000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-33-4922-3_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9789813349216","9789813349223"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-981-33-4922-3_16","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"19 January 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"CNCERT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China Cyber Security Annual Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Beijing","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 August 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"cncert2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/conf.cert.org.cn","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}