STRATEGIES TO STUDY VULNERABILITIES AND TO SUPPRESS VULNERABILITIES CAUSED BY CAPTURING ACCOUNT DATA Russian patent published in 2012 - IPC G06F21/00 

Abstract RU 2462753 C2

FIELD: information technologies.

SUBSTANCE: when realising the method of scalable study of data processing environment security condition, at first access data is received, which reflects prehistory of access to a component in the data processing environment at the side of a subject that carries out access. Also data of the rights is received, which reflects the rights available to the subject authorised for access, at the same time the rights grant the right to the subject to access multiple components and present a subset of the rights to subjects that carry out access. Then the condition of data processing environment security is studied on the basis of access data and rights data. A degree is identified, to which the received rights for components of the first part of data processing environment may be used to compromise components of the second part of the data processing environment. A conclusion is provided, which reflects the result of the specified identification.

EFFECT: higher security of company data processing environment.

20 cl, 6 dwg

Similar patents RU2462753C2

Title Year Author Number
SYSTEM AND METHOD FOR DETECTING THE PRESENCE OF A VULNERABILITY IN THE OPERATING SYSTEM BASED ON DATA ON PROCESSES AND THREADS 2022
  • Monastyrskii Aleksei Vladimirovich
  • Kondratev Dmitrii Andreevich
RU2797716C1
METHOD AND SYSTEM FOR PREVENTING UNAUTHORIZED ACCESS TO CORPORATE NETWORK OBJECTS 2022
  • Balashov Aleksandr Viktorovich
  • Cherepanov Pavel
  • Nagornov Ivan Grigorevich
  • Glazunov Nikita Sergeevich
  • Solomatin Aleksandr Igorevich
RU2799117C1
SYSTEM AND METHOD OF GENERATING LOG WHEN EXECUTING FILE WITH VULNERABILITIES IN VIRTUAL MACHINE 2018
  • Monastyrskij Aleksej Vladimirovich
  • Pavlyushchik Mikhail Aleksandrovich
  • Pintijskij Vladislav Valerevich
  • Anikin Denis Vyacheslavovich
  • Kirsanov Dmitrij Aleksandrovich
RU2724790C1
CONTROL OF ASYMMETRIC KEYS IN CONSORTIUM BLOCKCHAIN NETWORKS 2018
  • Zhang, Yixiang
  • Li, Shubo
RU2733097C1
TECHNOLOGIES FOR PROVIDING NETWORK SECURITY THROUGH DYNAMICALLY ALLOCATED ACCOUNTS 2015
  • Brady Shane
  • Mathur Siddhartha
  • Dani Rajalakshmi
  • Kumar Santosh
  • Schoen Luke
  • Hetherington David
RU2691211C2
POLICY-CONTROLLED DELEGATION OF ACCOUNT DATA FOR SINGLE REGISTRATION IN NETWORK AND SECURED ACCESS TO NETWORK RESOURCES 2007
  • Medvinskij Gennadij
  • Ilak Kristian
  • Khagiu Kostin
  • Parsonz Dzhon Eh.
  • Fatkhalla Mokhamed Ehmad Ehl' Din
  • Lich Pol Dzh.
  • Kamel' Tarek Bukhaa Ehl'-Din Makhmud
RU2439692C2
INTERACTING MODULE FACILITIES FOR COLLECTION OF AUTHENTICATORS AND ACCESS 2004
  • Khats Bendzhamin A.
  • Ilas Krist'Jan
  • Perlin Ehrik K.
  • Flo Ehrik R.
  • Stefens Dzhon
  • Shutts Klaus U.
  • Richardz Stefan
  • Rizor Sterling M.
RU2369025C2
INSTALLATION MECHANISM AND PACKAGE FORMAT FOR PARALLELIZABLE RELIABLE INSTALLATIONS 2013
  • Khaubold Dzheremi
  • Pachchiarini Klaudio
RU2635891C2
REMEDIAL METHOD FOR ROUTER VULNERABILITIES 2016
  • Rusakov Vyacheslav Evgenevich
  • Yanus Marta
RU2614559C1
SYSTEM AND METHOD FOR PRIORITIZING INSTALLATION OF PATCHES ON COMPUTERS IN NETWORK 2023
  • Zaitsev Oleg Vladimirovich
RU2813483C1

RU 2 462 753 C2

Authors

Dungan Dzhon

Khartrehll Gregori D.

Sajmon Dehniel R.

Dates

2012-09-27Published

2007-12-06Filed