FIELD: computer technology.
SUBSTANCE: invention is aimed at increasing the validity of the formation of a security policy for a corporate communication network by taking into account previously described, but not formalized and unstructured techniques for implementing computer attacks. It is achieved by including a document primary processing module into the system for automatically updating and developing techniques for implementing computer attacks; module for generating a linguistic description of the technology for implementing computer attacks; linguistic data processing module; module for converting descriptions of computer attack implementation techniques; data comparison module; wherein the integration module is connected to external sources of unstructured data on the implementation of computer attacks, the integration module is also supplemented with a module for polling information resources about the appearance of new documents, connected to a module for generating automatic queries and searching, connected to a module for interacting with elements of the data transmission network; the information storage facility is supplemented with an address registry, a local linguistic database and a local database of techniques for implementing computer attacks, taking into account any vulnerabilities.
EFFECT: increasing the validity of the formation of a security policy for a corporate communication network by taking into account previously described, but not formalized and unstructured techniques for implementing computer attacks.
1 cl, 3 dwg
Title | Year | Author | Number |
---|---|---|---|
CONTROL SYSTEM FOR SECURITY POLICY OF ELEMENTS OF CORPORATE COMMUNICATION NETWORK | 2023 |
|
RU2813469C1 |
INTELLIGENT CONTROL SYSTEM FOR CYBERTHREATS | 2019 |
|
RU2702269C1 |
INTELLIGENT RISK AND VULNERABILITY MANAGEMENT SYSTEM FOR INFRASTRUCTURE ELEMENTS | 2020 |
|
RU2747476C1 |
SYSTEM AND METHOD FOR IDENTIFYING MALICIOUS FILES | 2017 |
|
RU2673407C1 |
SYSTEM AND METHOD OF DETECTING THE SIGNS OF COMPUTER ATTACKS | 2017 |
|
RU2661533C1 |
METHOD AND SYSTEM FOR AUTOMATED DOCUMENTATION OF SECURITY THREATS AND VULNERABILITIES RELATED TO AN INFORMATION RESOURCE | 2022 |
|
RU2789990C1 |
SYSTEM AND METHOD OF GATEWAY CONFIGURATION FOR AUTOMATED SYSTEMS PROTECTION | 2019 |
|
RU2746105C2 |
SYSTEM AND METHOD OF PROTECTING AUTOMATED SYSTEMS USING GATEWAY | 2019 |
|
RU2724796C1 |
SYSTEM AND METHOD FOR TEMPORARY PROTECTION OF OPERATING SYSTEM OF HARDWARE AND SOFTWARE FROM VULNERABLE APPLICATIONS | 2013 |
|
RU2568295C2 |
SYSTEM AND METHOD OF CREATING RULES | 2018 |
|
RU2725033C2 |
Authors
Dates
2023-12-19—Published
2023-07-12—Filed