BROSSO, I.LA NEVE, A.2022-01-122022-01-122012-01-05BROSSO, I.; LA NEVE, A. Information security management based on adaptive security policy using user behavior analysis. Strategic and Practical Approaches for Information Security Governance: Technologies and Applied Solutions, p. 326-345, 2012.https://repositorio.fei.edu.br/handle/FEI/4113This chapter presents a system for information security management based on adaptative security policy using user's behavior analysis in Information Technology. This system must be able to acquire information about the environment, space, time, equipment, hardware, and software. This information is used in the user behavior analysis. This work proposes that, based on the evidence of the user behavior, it is possible to trust or not trust the user. Levels of trust are released according to the user behavior and the rules that were previously established for the parameters, which help to establish the evidences of behavioral trust, interacting with the environment information, so as to keep trust levels updated in a more accurate and faithful way. © 2012, IGI Global.Acesso RestritoInformation security management based on adaptive security policy using user behavior analysisCapítulo de livro10.4018/978-1-4666-0197-0.ch019