FIELD: physics, computer engineering.
SUBSTANCE: invention relates to protecting information from unauthorised access and content alteration when storing and transmitting data. The method of detecting violation of data handling rules includes: a) modifying an application code by replacing a data handling function call with a handler function call; b) collecting information on access of the modified application to data handling functions through by calling corresponding handler functions; c) analysing information collected at step (b) for nonconformity with data handling rules established by a security policy; d) detecting violation of data handling rules based on the analysis.
EFFECT: improved security of organisation data owing to detection of violation of data handling rules by modifying data handling applications.
6 cl, 8 dwg
Title | Year | Author | Number |
---|---|---|---|
SYSTEM AND METHOD FOR DETECTING MALWARE BY CREATING ISOLATED ENVIRONMENT | 2012 |
|
RU2535175C2 |
METHODS AND SYSTEMS FOR SEARCHING FOR APPLICATION SOFTWARE | 2014 |
|
RU2598988C2 |
CENTRALIZED CONTROL OF SOFTWARE-DEFINED AUTOMATED SYSTEM | 2016 |
|
RU2747966C2 |
SOFTWARE-DEFINED AUTOMATED SYSTEM AND ARCHITECTURE | 2016 |
|
RU2729885C2 |
SYSTEM AND METHOD FOR BLOCKING THE APPLICATIONS ON THE MOBILE DEVICE | 2014 |
|
RU2654810C2 |
METHOD TO LOCK ACCESS TO DATA ON MOBILE DEVICE WITH API FOR USERS WITH DISABILITIES | 2015 |
|
RU2618946C1 |
METHOD AND SYSTEM FOR DETECTING MALICIOUS SOFTWARE BY CONTROL OF SOFTWARE IMPLEMENTATION RUNNING UNDER SCRIPT | 2013 |
|
RU2653985C2 |
METHOD OF CREATING SCRIPT OF POPULAR ACTIVATION EVENTS | 2015 |
|
RU2679783C2 |
HARDWARE VIRTUALIZED ISOLATION FOR ENSURING SECURITY | 2017 |
|
RU2755880C2 |
METHOD FOR ARRANGING WORKLOADS IN A PROGRAM-DEFINED AUTOMATED SYSTEM | 2016 |
|
RU2730534C2 |
Authors
Dates
2015-02-20—Published
2012-12-25—Filed