FIELD: information technology.
SUBSTANCE: invention involves formation of a data base for storing information on ownership of information resources to a defined level of confidentiality. The invention also involves managing safe access to information resources of different levels of confidentiality based on classification of information resources into two main classes: 1) according to degree (type) of confidentiality of information and 2) according to the level of risk or danger of their influence on confidential corporate (protected) information. A user can access any information resource but is not allowed simultaneous access to resources of different levels of confidentiality.
EFFECT: preventing leakage of confidential information from a corporate computer network when working in networks of different levels of confidentiality.
3 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD OF CONTROLLING ACCESS TO INFORMATION RESOURCES OF COMPUTER NETWORKS OF DIFFERENT LEVELS OF CONFIDENTIALITY | 2013 |
|
RU2541170C2 |
METHOD AND DEVICE FOR CONTROLLING INTERNET ACCESS IN COMPUTER SYSTEM AND COMPUTER READ-OUT DATA MEDIUM FOR COMPUTER PROGRAM STORAGE | 2001 |
|
RU2231115C2 |
METHOD OF USING DEDICATED COMPUTER SECURITY SERVICE | 2015 |
|
RU2601162C1 |
SYSTEM AND METHOD OF CONNECTING SECURE DNS RESOLUTION PROTOCOL | 2018 |
|
RU2726879C2 |
SYSTEM AND METHOD FOR PROTECTION FROM LEAKAGE OF CONFIDENTIAL DATA IN WIRELESS NETWORKS | 2014 |
|
RU2602956C2 |
METHOD TO PROVIDE INFORMATION SECURITY DURING USER ACCESS TO EXTERNAL INFORMATION RESOURCES VIA INTERNET | 2011 |
|
RU2445692C1 |
SYSTEM AND METHOD FOR PREVENTION SAFETY INCIDENTS BASED ON USER DANGER RATING | 2011 |
|
RU2477929C2 |
METHOD OF ANALYSING MALICIOUS ACTIVITY ON INTERNET, DETECTING MALICIOUS NETWORK NODES AND NEIGHBOURING INTERMEDIATE NODES | 2012 |
|
RU2523114C2 |
METHOD OF BLOCKING NETWORK CONNECTIONS | 2018 |
|
RU2728506C2 |
SAFE AUTHENTICATION WITH LOGIN AND PASSWORD IN INTERNET NETWORK USING ADDITIONAL TWO-FACTOR AUTHENTICATION | 2016 |
|
RU2635276C1 |
Authors
Dates
2011-12-10—Published
2009-12-01—Filed