Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method and system for evaluating individual information security capabilities based on PC terminal behavior

A technology of information security and evaluation method, which is applied in the field of individual information security capability evaluation based on PC terminal behavior, which can solve the problem of difficulty in reflecting the real implementation of user security awareness, the ability to detect user security threats, and the fixed content of questionnaires or tests To achieve scientific evaluation results, improve test efficiency, improve objectivity and accuracy

Active Publication Date: 2021-01-22
NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT +1
View PDF6 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the problem with this type of method is that even if individuals have high information security literacy in the test, it is difficult to guarantee whether they can implement these security awareness into specific behaviors in their actual activities. Under sensitive conditions such as questionnaires, users will consciously prepare and respond according to the test questions, which is difficult to reflect the real implementation of user safety awareness
However, the disadvantage of this type of method is that it only trains for a certain skill, which cannot adapt well to the current emerging security risks, and the development cost is high
[0010] To sum up, the current research on individual information security capability evaluation of PC terminal behavior is still highly subjective, the formal description of user behavior security analysis is lacking, the content of questionnaires or tests is fixed, and it is difficult to detect complex and changeable user responses in different scenarios. issues such as the ability of the security threat

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method and system for evaluating individual information security capabilities based on PC terminal behavior
  • A method and system for evaluating individual information security capabilities based on PC terminal behavior
  • A method and system for evaluating individual information security capabilities based on PC terminal behavior

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0065] In order to make the purpose, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below in conjunction with the drawings in the embodiments of the present invention. Obviously, the described embodiments It is a part of embodiments of the present invention, but not all embodiments. Based on the embodiments of the present invention, all other embodiments obtained by persons of ordinary skill in the art without making creative efforts belong to the protection scope of the present invention.

[0066] refer to figure 1 , figure 1 A method for evaluating individual information security capabilities based on PC terminal behavior provided by an embodiment of the present invention may include the following steps:

[0067] collect individual computer behavior data;

[0068] Extracting a behavior action set and a behavior weight set ba...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides an individual information safety capacity evaluation method and system based on a PC terminal behavior. The individual information safety capacity is determined by objectively assessing the individual computer behavior data, the problems that the existing evaluation method is single, and the evaluation comprehensiveness is insufficient are solved, the individual subject consciousness is considered, and the importance on the body analysis by more important objective behavior is taken into special consideration, thereby reflecting the information safety capacity of the user more real.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of information security capability evaluation, and in particular to a method and system for evaluating individual information security capability based on PC terminal behavior. Background technique [0002] With the increasing frequency of network security incidents and the widespread use of social engineering in network attacks, the importance of individual information security capabilities has gradually increased. Individual information security capabilities are weak, and problems with PC terminals, such as unreasonable password settings, firewall opening, and improper port opening settings, have brought great information security risks to individuals and enterprises. In 2003, Donner proposed the security ontology and defined it as "an ontology that describes security-related concepts and the interrelationships between these concepts in information systems". With the rise of the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06
CPCH04L63/20
Inventor 杨鹏黄元飞王鹏翩李燕伟罗森林潘丽敏郝靖伟胡雅娴
Owner NAT COMP NETWORK & INFORMATION SECURITY MANAGEMENT CENT
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products