METHOD OF PRIORITIZING INFORMATION SECURITY THREATS BASED ON DATA FROM OPEN SOURCES
2023-12-08
专利权人ANGARA TECHNOLOGIES GROUP LLC (ANGA-Non-standard)
申请日期2023-12-08
专利号RU2833413-C1
成果简介NOVELTY - Invention relates to a method for prioritizing information security threats based on data from open sources. In the method, using the software of a computer, which includes a first database (DB 1) associated with the computer software, sending a request to the open source servers to search for reports (Reports) on the investigation of the activities of cybercriminals carrying out computer attacks, which include information on the sectors of the economy subjected to computer attacks, on groups of malefactors, on tactics, techniques and procedures (TTP), which are used by groups of malefactors when conducting computer attacks on industries, as well as methods of counteracting TTP used by groups of malefactors. Found reports are loaded and stored in database 1. With the help of computer software from the All-Russian classifier of types of economic activities (ARCTEA), the types of economic activities (TEA) of the said branches of the economy are added to DB 1. Computer software is used to associate each subject to computer attacks of TEA of the corresponding branch of the economy with the corresponding TTP. Using computer software, reports are analyzed and groups of malefactors and TTPs used by them are selected in accordance with each TEA. Computer software is used to establish links between TEA, a group of malefactors and the TTP used by them in the corresponding branch of the economy. With the help of computer software, information on organizations in respect to which it is necessary to perform profiling of the list of threats (LT) of computer attacks is added to the database, wherein each organization is associated with TEA in database 1. With the help of computer software for each branch of the economy in accordance with TEA, a ranked list of actual threats of computer attacks is created depending on the frequency of use of the corresponding TTP from the most common to the most rare TTP. With the help of computer software, LT profiling is performed for each organization depending on their TEA and determining priority measures for protection against current TTP in accordance with methods of counteracting used by groups of malefactors TTP, wherein the profiled list of threats is stored in database 1 and information security threats are prioritized for each organization. USE - Physics. ADVANTAGE - More accurate determination of personalized threats to information security with respect to a specific organization. 6 cl, 9 dwg
IPC 分类号G06F-016/00 ; G06Q-010/00
国家俄罗斯
专业领域信息技术
语种英语
成果类型专利
文献类型科技成果
条目标识符http://119.78.100.226:8889/handle/3KE4DYBR/19007
专题中国科学院新疆生态与地理研究所
作者单位
ANGARA TECHNOLOGIES GROUP LLC (ANGA-Non-standard)
推荐引用方式
GB/T 7714
NOSAREV A I,ZINNIATULLIN T I,VARLAMOVA V V,et al. METHOD OF PRIORITIZING INFORMATION SECURITY THREATS BASED ON DATA FROM OPEN SOURCES. RU2833413-C1[P]. 2023.
条目包含的文件
条目无相关文件。
所有评论 (0)
暂无评论
 

除非特别说明,本系统中所有内容都受版权保护,并保留所有权利。