Protecting a computer device is an important task that requires software implementation, because not every user can choose the right set of security features for their device, and there are not many applications that can help a user choose the right set of security features. In this paper, the authors consider the following tools for finding the optimal strategy for protecting a computer device: the method of Savage, Hurwitz, Bayes, Monte Carlo, Thompson Sampling algorithm. Their features and advantages are highlighted. They are based on a software application that will allow users to calculate the optimal combination of tools designed to protect their computers, depending on the wishes of users and the characteristics of their devices. Such an application can be used by system administrators to select the optimal protection of the entire computer fleet. The authors conducted a series of experiments and comparative analysis of the simulation results. The average search time for an optimal strategy for protecting a computer device is estimated.
Read full abstract