Information Security Management Based on Adaptive Security Policy Using User Behavior Analysis

Information Security Management Based on Adaptive Security Policy Using User Behavior Analysis

Ines Brosso, Alessandro La Neve
DOI: 10.4018/978-1-4666-0197-0.ch019
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter presents a system for information security management based on adaptative security policy using user’s behavior analysis in Information Technology. This system must be able to acquire information about the environment, space, time, equipment, hardware, and software. This information is used in the user behavior analysis. This work proposes that, based on the evidence of the user behavior, it is possible to trust or not trust the user. Levels of trust are released according to the user behavior and the rules that were previously established for the parameters, which help to establish the evidences of behavioral trust, interacting with the environment information, so as to keep trust levels updated in a more accurate and faithful way.
Chapter Preview
Top

Background

The methodology for the preparation of this book chapter consisted of literature review, researches on the Behavioral Theory, historical, social and psychological aspects, and the development of a Continuous Authentication System. Studies and research on mathematical methods for handling trust information,

Complete Chapter List

Search this Book:
Reset