METHOD OF APPLICATION OF SAFETY POLICIES FOR COMPUTER SAFETY Russian patent published in 2017 - IPC G06F21/57 G06F17/30 G06N5/02 

Abstract RU 2623808 C2

FIELD: information technology.

SUBSTANCE: method is implemented by applying security policies on the specified device, depending on the current level of user knowledge. A method is proposed in which the user's current level of knowledge is selected from the database. The level of knowledge of the user is a numerical value reflecting the erudition of the user in the field of knowledge relating to the security of the computer. The information about the security of the computer is selected from the database based on the current level of knowledge of the user. The selected information is provided to the user. A feedback on the information provided is received from the user. Based on the feedback a new level of knowledge of the user is calculated and it becomes current, and is stored in the database. The security policies, that must be applied to the computer to ensure the security of the computer, are applied depending on the current level of user knowledge.

EFFECT: ensuring the safety of the computer.

3 cl, 3 dwg

Similar patents RU2623808C2

Title Year Author Number
SYSTEM AND METHOD FOR APPLYING FILE ACCESS RULES DURING TRANSFER THEREOF BETWEEN COMPUTERS 2013
  • Makarov Aleksandr Nikolaevich
  • Strogov Vladimir Vladimirovich
  • Kirikova Evgenija Pavlovna
RU2573785C2
SYSTEM AND METHOD FOR SECURING IOT DEVICES BY INSTALLING SECURITY COMPONENTS 2022
  • Filatov Konstantin Mikhailovich
  • Iablokov Viktor Vladimirovich
RU2798178C1
SECURITY-RELATED PROGRAM INTERFACE 2004
  • Taunsend Stefen V.
  • Fehjks Tomas F.
RU2377639C2
SYSTEM AND METHOD OF RAISING SECURITY LEVEL OF COMPUTER SYSTEM 2011
  • Zajtsev Oleg Vladimirovich
  • Shevchenko Stanislav Borisovich
RU2460122C1
MECHANISM FOR ESTIMATION OF SAFETY RISKS 2003
  • Gouldfeder Aaron
  • Khokins Dzhon
  • Khoran Serzh
  • Ramdatmisier Viresh
  • Fehrro Dzho
  • Fi Gregori Darrell
  • Ehpling Dzheremi
  • Bajbi Ehndrju
  • Sjuj Tszinjan
  • Shrajner Toni
  • Kul Dzhehmi
RU2334363C2
METHOD OF USING DEDICATED COMPUTER SECURITY SERVICE 2015
  • Efremov Andrej Anatolevich
  • Lapushkin Anton Sergeevich
RU2601162C1
HARDWARE VIRTUALIZED ISOLATION FOR ENSURING SECURITY 2017
  • Pai, Navin Narayan
  • Jeffries, Charles G.
  • Viswanathan, Giridhar
  • Schultz, Benjamin M.
  • Smith, Frederick J.
  • Reuther, Lars
  • Ebersol, Michael B.
  • Diaz Cuellar, Gerardo
  • Pashov, Ivan Dimitrov
  • Gaddehosur, Poornananda R.
  • Pulapaka, Hari R.
  • Rao, Vikram Mangalore
RU2755880C2
SYSTEM AND METHOD FOR PROVIDING SAFE SYSTEM CONFIGURATION CHANGE 2017
  • Kulagin Dmitrij Aleksandrovich
  • Dyakin Pavel Vladimirovich
RU2666645C1
SYSTEM AND METHOD FOR AUTOMATIC INVESTIGATION OF SAFETY INCIDENTS 2011
  • Zajtsev Oleg Vladimirovich
RU2481633C2
SYSTEM AND METHOD FOR SECURING IoT DEVICES THROUGH A GATEWAY 2022
  • Filatov Konstantin Mikhailovich
  • Iablokov Viktor Vladimirovich
RU2786201C1

RU 2 623 808 C2

Authors

Malanov Aleksej Vladimirovich

Martynenko Vladislav Valerevich

Dates

2017-06-29Published

2015-09-30Filed