FIELD: information security.
SUBSTANCE: risk management tools in enterprise information security, as well as decision support systems in the field of information security. A method for optimizing information security policies based on user behaviour patterns includes the following actions: ranking assessment of the resources of user workstations available for information security tools (hereinafter referred to as IST); monitoring user behaviour, vulnerability index and behaviour anomalies in real time; detection of behaviour patterns; assessing complexity of information security policies; optimization of hardware and software information protection systems. To do this, all user workstations are first ranked according to the level of available hardware resources. Also, for workstations, an additive level of complexity of information security policies and the level of response of the information security service are introduced. Then, a list of user behaviour patterns is entered, i.e. such categories of users that require an increase in the level of information security policies or the level of response. Optimization criteria for these levels are introduced for the previously measured assessment of free hardware resources of workstations.
EFFECT: reduced level of requirements for enterprise information security hardware resources and reduced labour costs of information security officers and administrators in providing response measures to incidents identified by information security.
2 cl, 6 dwg
Title | Year | Author | Number |
---|---|---|---|
METHOD AND SYSTEM FOR DETECTION OF ABNORMAL USER BEHAVIOR | 2021 |
|
RU2775861C1 |
METHOD OF SAFE USE OF AN ELECTRONIC DOCUMENT | 2018 |
|
RU2699234C1 |
METHOD FOR ENSURING THE PROTECTION OF INFORMATION IN A CORPORATE NETWORK FROM UNAUTHORIZED ACCESS AND EXTERNAL COMPUTER ATTACKS AND A SYSTEM FOR ITS IMPLEMENTATION | 2022 |
|
RU2801247C1 |
SYSTEM AND METHOD FOR COMMUNICATION MEANS IDENTIFICATION AND CONTROL | 2017 |
|
RU2691191C2 |
METHOD FOR CREATING AND APPLYING AN APPLICATION INTERACTION RULE ON AN IOT DEVICE | 2021 |
|
RU2757651C1 |
AUTOMATION SYSTEM FOR THE EXCHANGE OF MARKING CODES | 2021 |
|
RU2773429C1 |
METHOD FOR APPLYING PERSONAL DATA PROCESSING POLICIES FOR AN IoT DEVICE | 2021 |
|
RU2767714C1 |
METHOD FOR CONFIGURATION OF IoT APPARATUSES DEPENDING ON THE TYPE OF NETWORK | 2021 |
|
RU2760625C1 |
METHOD FOR CONTROLLING AN IoT APPARATUS FROM THE SIDE OF AN ELEMENT OF THE NETWORK INFRASTRUCTURE | 2021 |
|
RU2769632C1 |
METHOD FOR USING A MODEL OF THE IoT APPARATUS TO DETECT ANOMALIES IN THE OPERATION OF THE APPARATUS | 2021 |
|
RU2772072C1 |
Authors
Dates
2024-01-16—Published
2022-06-29—Filed