METHOD FOR OPTIMIZING INFORMATION SECURITY POLICIES BASED ON USER BEHAVIOUR PATTERNS Russian patent published in 2024 - IPC G06F21/00 

Abstract RU 2811731 C2

FIELD: information security.

SUBSTANCE: risk management tools in enterprise information security, as well as decision support systems in the field of information security. A method for optimizing information security policies based on user behaviour patterns includes the following actions: ranking assessment of the resources of user workstations available for information security tools (hereinafter referred to as IST); monitoring user behaviour, vulnerability index and behaviour anomalies in real time; detection of behaviour patterns; assessing complexity of information security policies; optimization of hardware and software information protection systems. To do this, all user workstations are first ranked according to the level of available hardware resources. Also, for workstations, an additive level of complexity of information security policies and the level of response of the information security service are introduced. Then, a list of user behaviour patterns is entered, i.e. such categories of users that require an increase in the level of information security policies or the level of response. Optimization criteria for these levels are introduced for the previously measured assessment of free hardware resources of workstations.

EFFECT: reduced level of requirements for enterprise information security hardware resources and reduced labour costs of information security officers and administrators in providing response measures to incidents identified by information security.

2 cl, 6 dwg

Similar patents RU2811731C2

Title Year Author Number
METHOD AND SYSTEM FOR DETECTION OF ABNORMAL USER BEHAVIOR 2021
  • Buzinov Maksim Sergeevich
RU2775861C1
METHOD OF SAFE USE OF AN ELECTRONIC DOCUMENT 2018
  • Golosov Aleksej Olegovich
  • Pustarnakov Valerij Fedorovich
  • Kalajda Igor Alekseevich
  • Sivokhin Dmitrij Vyacheslavovich
RU2699234C1
METHOD FOR ENSURING THE PROTECTION OF INFORMATION IN A CORPORATE NETWORK FROM UNAUTHORIZED ACCESS AND EXTERNAL COMPUTER ATTACKS AND A SYSTEM FOR ITS IMPLEMENTATION 2022
  • Konkin Aleksandr Andreevich
  • Lynov Evgenij Vasilevich
  • Nikiforov Maksim Sergeevich
  • Rumyantsev Ilya Evgenevich
  • Yureva Olga Aleksandrovna
RU2801247C1
SYSTEM AND METHOD FOR COMMUNICATION MEANS IDENTIFICATION AND CONTROL 2017
  • Zujkov Aleksandr Vasilevich
  • Kharkov Sergej Mikhajlovich
  • Volchkov Pavel Aleksandrovich
  • Aristov Maksim Sergeevich
RU2691191C2
METHOD FOR CREATING AND APPLYING AN APPLICATION INTERACTION RULE ON AN IOT DEVICE 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2757651C1
AUTOMATION SYSTEM FOR THE EXCHANGE OF MARKING CODES 2021
  • Dankov Dmitrij Alekseevich
RU2773429C1
METHOD FOR APPLYING PERSONAL DATA PROCESSING POLICIES FOR AN IoT DEVICE 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2767714C1
METHOD FOR CONFIGURATION OF IoT APPARATUSES DEPENDING ON THE TYPE OF NETWORK 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2760625C1
METHOD FOR CONTROLLING AN IoT APPARATUS FROM THE SIDE OF AN ELEMENT OF THE NETWORK INFRASTRUCTURE 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2769632C1
METHOD FOR USING A MODEL OF THE IoT APPARATUS TO DETECT ANOMALIES IN THE OPERATION OF THE APPARATUS 2021
  • Tikhomirov Anton Vladimirovich
  • Tatarinov Ivan Ivanovich
  • Konoplev Sergei Valerevich
RU2772072C1

RU 2 811 731 C2

Authors

Buzinov Maksim Sergeevich

Dates

2024-01-16Published

2022-06-29Filed