**Acknowledgements**

visualization (chart analysis) module, as shown in **Figure 7**. The scanning module integrates the automatic scanning function, as long as we input the network segment to be scanned and click "Start Scanning", the scanning can be done automatically. The buttons under the "Operation" column on the right enable you to manually access the device. For example, if the device has a weak password vulnerability, you can start shell through the "Operation" button to automatically use the weak password to login to the device for easy viewing. The "Operation" also includes manual uploading of the Mirai zombie program, etc. Data Query is designed for your viewing history scanning records; Weak Password Management for adding or removing the collected camera factory default password; Visual Analysis Module for displaying the network situation by means of geographic

information, data statistics and chart, etc.

**Figure 7.**

*Computer Security Threats*

**Figure 8.**

**50**

The prototype system is shown in **Figure 6**.

*Campus network security situation diagram based on geographic information.*

*Schematic diagram for the scanned result page by SA prototype system.*

Thanks to Shu Wang, Qing Ye, Na Wang, Haichang Yao, Kui Li, Ruchuan Wang and Lu Yao for their contributions. This work is supported by the National Key Research and Development Program of China (2017YFB1401301, 2017YFB1401302, 2017YFB0202204), the National Natural Science Foundation Program of China (61373017), the Key Research and Development Program of Jiangsu Province (BE2017166), the Natural Science Foundation Outstanding Youth Fund of Jiangsu Province (BK20170100), the Open Fund of Jiangsu High Technology Research Key Laboratory for Wireless Sensor Networks (WSNLBZY201514), the 1311 Project of Nanjing University of Posts and Telecommunications.
