Internal threat model establishing method based on layered mapping
A technology for model building and modeling, which is applied in the field of insider threat models based on the hierarchical mapping of subject and object, which can solve problems such as misuse and deliberate destruction by internal legal personnel.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0059] A complete insider threat establishment method is:
[0060] 1) Establishment of the internal threat hierarchy model of subject and object: use the user's access control authority to resources defined in the access control relationship of the system to establish a partial order relationship, so as to establish a hierarchical model of subject and object through the established partial order. The process is as follows:
[0061] 1.1) Let U={u1, u2,...} be the set of system users, R={r1, r2,...} be the set of system resources, and the access relation matrix of the system A={(u, r)∈U×R : User u has access rights to resource r} defines the access control relationship between users and system resources.
[0062] For user u, R ( u ) ⊆ R Represents the set of resources that u can access; for resources r∈R, U ( r ) ⊆ ...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com