Information security management based on adaptive security policy using user behavior analysis

dc.contributor.authorBROSSO, I.
dc.contributor.authorLA NEVE, A.
dc.date.accessioned2022-01-12T22:02:07Z
dc.date.available2022-01-12T22:02:07Z
dc.date.issued2012-01-05
dc.description.abstractThis chapter presents a system for information security management based on adaptative security policy using user's behavior analysis in Information Technology. This system must be able to acquire information about the environment, space, time, equipment, hardware, and software. This information is used in the user behavior analysis. This work proposes that, based on the evidence of the user behavior, it is possible to trust or not trust the user. Levels of trust are released according to the user behavior and the rules that were previously established for the parameters, which help to establish the evidences of behavioral trust, interacting with the environment information, so as to keep trust levels updated in a more accurate and faithful way. © 2012, IGI Global.
dc.description.firstpage326
dc.description.lastpage345
dc.identifier.citationBROSSO, I.; LA NEVE, A. Information security management based on adaptive security policy using user behavior analysis. Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, p. 326-345, 2012.
dc.identifier.doi10.4018/978-1-4666-0197-0.ch019
dc.identifier.urihttps://repositorio.fei.edu.br/handle/FEI/4113
dc.relation.ispartofStrategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions
dc.rightsAcesso Restrito
dc.titleInformation security management based on adaptive security policy using user behavior analysis
dc.typeCapítulo de livro
fei.scopus.citations1
fei.scopus.eid2-s2.0-84898310865
fei.scopus.updated2024-07-01
fei.scopus.urlhttps://www.scopus.com/inward/record.uri?partnerID=HzOxMe3b&scp=84898310865&origin=inward
Arquivos