Method for detecting secure ploicy contravention

2016 
This embodiment detects whether policy violations by category from the data generated from the user terminal to the connection phase information and phase information and use, compared to the violation of the security policy information stored in this database. Thus, the present embodiment is applied, but the divided security policy according to the network access and use for the illegal device, by applying the parsed information security policy violations can block the access to the illegal network fundamentally.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    0
    References
    0
    Citations
    NaN
    KQI
    []