MX2016014095A - Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware. - Google Patents

Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware.

Info

Publication number
MX2016014095A
MX2016014095A MX2016014095A MX2016014095A MX2016014095A MX 2016014095 A MX2016014095 A MX 2016014095A MX 2016014095 A MX2016014095 A MX 2016014095A MX 2016014095 A MX2016014095 A MX 2016014095A MX 2016014095 A MX2016014095 A MX 2016014095A
Authority
MX
Mexico
Prior art keywords
protection
activity
malware
prediction
warning
Prior art date
Application number
MX2016014095A
Other languages
English (en)
Inventor
Ronen Royi
Ziklik Elad
FEUERSTEIN Corina
Brand Tomer
Original Assignee
Microsoft Technology Licensing Llc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Microsoft Technology Licensing Llc filed Critical Microsoft Technology Licensing Llc
Publication of MX2016014095A publication Critical patent/MX2016014095A/es

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/552Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/56Computer malware detection or handling, e.g. anti-virus arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Virology (AREA)
  • Storage Device Security (AREA)
  • Alarm Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Medical Treatment And Welfare Office Work (AREA)

Abstract

Lo que se describe en este documento es un sistema y método para determinar si el nivel de protección de un sistema de protección es el adecuado para el modo en que el usuario de un sistema de cómputo está utilizando el dispositivo. El sistema de protección monitorea la actividad del usuario mientras están utilizando las diversas aplicaciones en el dispositivo. El sistema de protección identifica un registro de actividad que es el más similar a la actividad del usuario y compara el nivel de protección actual con el nivel de protección del registro asociado. El sistema de protección puede cambiar el nivel de protección cuando el nivel de protección del usuario y el nivel de protección del registro asociado son diferentes.
MX2016014095A 2014-04-29 2015-04-27 Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware. MX2016014095A (es)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US14/265,308 US20150310213A1 (en) 2014-04-29 2014-04-29 Adjustment of protection based on prediction and warning of malware-prone activity
PCT/US2015/027687 WO2015167973A1 (en) 2014-04-29 2015-04-27 Adjustment of protection based on prediction and warning of malware-prone activity

Publications (1)

Publication Number Publication Date
MX2016014095A true MX2016014095A (es) 2017-02-09

Family

ID=53059499

Family Applications (1)

Application Number Title Priority Date Filing Date
MX2016014095A MX2016014095A (es) 2014-04-29 2015-04-27 Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware.

Country Status (10)

Country Link
US (1) US20150310213A1 (es)
EP (1) EP3138039A1 (es)
JP (1) JP2017515235A (es)
KR (1) KR20160148544A (es)
CN (1) CN106233297A (es)
AU (1) AU2015253468A1 (es)
CA (1) CA2944910A1 (es)
MX (1) MX2016014095A (es)
RU (1) RU2016142483A (es)
WO (1) WO2015167973A1 (es)

Families Citing this family (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10805331B2 (en) 2010-09-24 2020-10-13 BitSight Technologies, Inc. Information technology security assessment system
US9438615B2 (en) 2013-09-09 2016-09-06 BitSight Technologies, Inc. Security risk management
US20160034404A1 (en) * 2014-07-31 2016-02-04 International Business Machines Corporation Managing access to storage
US11182720B2 (en) 2016-02-16 2021-11-23 BitSight Technologies, Inc. Relationships among technology assets and services and the entities responsible for them
US10990284B1 (en) * 2016-09-30 2021-04-27 EMC IP Holding Company LLC Alert configuration for data protection
US10425380B2 (en) 2017-06-22 2019-09-24 BitSight Technologies, Inc. Methods for mapping IP addresses and domains to organizations using user activity data
US10257219B1 (en) 2018-03-12 2019-04-09 BitSight Technologies, Inc. Correlated risk in cybersecurity
US10812520B2 (en) 2018-04-17 2020-10-20 BitSight Technologies, Inc. Systems and methods for external detection of misconfigured systems
US10938839B2 (en) 2018-08-31 2021-03-02 Sophos Limited Threat detection with business impact scoring
US11200323B2 (en) 2018-10-17 2021-12-14 BitSight Technologies, Inc. Systems and methods for forecasting cybersecurity ratings based on event-rate scenarios
US10521583B1 (en) 2018-10-25 2019-12-31 BitSight Technologies, Inc. Systems and methods for remote detection of software through browser webinjects
US10726136B1 (en) 2019-07-17 2020-07-28 BitSight Technologies, Inc. Systems and methods for generating security improvement plans for entities
US11956265B2 (en) 2019-08-23 2024-04-09 BitSight Technologies, Inc. Systems and methods for inferring entity relationships via network communications of users or user devices
US10848382B1 (en) 2019-09-26 2020-11-24 BitSight Technologies, Inc. Systems and methods for network asset discovery and association thereof with entities
US11032244B2 (en) 2019-09-30 2021-06-08 BitSight Technologies, Inc. Systems and methods for determining asset importance in security risk management
US10791140B1 (en) 2020-01-29 2020-09-29 BitSight Technologies, Inc. Systems and methods for assessing cybersecurity state of entities based on computer network characterization
US10893067B1 (en) 2020-01-31 2021-01-12 BitSight Technologies, Inc. Systems and methods for rapidly generating security ratings
US10764298B1 (en) 2020-02-26 2020-09-01 BitSight Technologies, Inc. Systems and methods for improving a security profile of an entity based on peer security profiles
US11023585B1 (en) 2020-05-27 2021-06-01 BitSight Technologies, Inc. Systems and methods for managing cybersecurity alerts
US11122073B1 (en) 2020-12-11 2021-09-14 BitSight Technologies, Inc. Systems and methods for cybersecurity risk mitigation and management

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8477009B2 (en) * 2005-08-28 2013-07-02 Marcon International, Inc. Asset security system and associated methods for selectively granting access
US7627893B2 (en) * 2005-10-20 2009-12-01 International Business Machines Corporation Method and system for dynamic adjustment of computer security based on network activity of users
US7954143B2 (en) * 2006-11-13 2011-05-31 At&T Intellectual Property I, Lp Methods, network services, and computer program products for dynamically assigning users to firewall policy groups
US8069230B2 (en) * 2007-10-31 2011-11-29 Affinegy, Inc. System and method of configuring a network
US8275899B2 (en) * 2008-12-29 2012-09-25 At&T Intellectual Property I, L.P. Methods, devices and computer program products for regulating network activity using a subscriber scoring system
US20100301993A1 (en) * 2009-05-28 2010-12-02 International Business Machines Corporation Pattern based security authorization
US8910279B2 (en) * 2010-03-10 2014-12-09 Sonicwall, Inc. Reputation-based threat protection
US20120167218A1 (en) * 2010-12-23 2012-06-28 Rajesh Poornachandran Signature-independent, system behavior-based malware detection
WO2013048492A1 (en) * 2011-09-30 2013-04-04 Intel Corporation Mechanism for providing a secure environment for acceleration of software applications at computing devices
US20140279527A1 (en) * 2013-03-14 2014-09-18 Sas Institute Inc. Enterprise Cascade Models

Also Published As

Publication number Publication date
AU2015253468A1 (en) 2016-10-06
RU2016142483A3 (es) 2018-11-02
JP2017515235A (ja) 2017-06-08
KR20160148544A (ko) 2016-12-26
US20150310213A1 (en) 2015-10-29
CN106233297A (zh) 2016-12-14
WO2015167973A1 (en) 2015-11-05
EP3138039A1 (en) 2017-03-08
CA2944910A1 (en) 2015-11-05
RU2016142483A (ru) 2018-04-28

Similar Documents

Publication Publication Date Title
MX2016014095A (es) Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware.
WO2018237210A8 (en) Linking observed human activity on video to a user account
MX2016012199A (es) Recomendacion personalizada basada en la declaracion explicita del usuario.
IN2015KO00053A (es)
EP4299047A3 (en) Adaptive interface for continuous monitoring devices
WO2013181025A3 (en) Systems and methods for dynamically providing fonts based on language settings
MX2016009391A (es) Sistemas y metodos de control de estabilidad de la bicicleta.
MX362556B (es) Metodo y aparato de recordatorio de informacion anormal de video.
MX2018004074A (es) Sistemas y metodos para el ajuste de dispositivos.
TW201614990A (en) Security in software defined network
TW201612724A (en) Electronic device and display interface adjusting method thereof
MY199109A (en) Systems and methods of flexibly activating particular temporary attended delivery /pickup locations
SG10201809428UA (en) Insulin receptor partial agonists
WO2014150405A3 (en) Context aware localization, mapping, and tracking
WO2015112275A3 (en) Determing data associated with proximate computing devices
NZ766062A (en) Automated password generation and change
WO2015107383A3 (en) Role-based anonymization
GB2558985A (en) Predicting user needs for a particular context
EP4246530A3 (en) Event detection using a variable threshold
GB2534969B (en) Methods and systems for granting partial or full access to an application based on level of confidence that print corresponds to user profile
EP3218862A4 (en) User active lead management system and uses thereof
EP3240473A4 (en) Systems and methods for providing user insights based on real-time physiological parameters
GB2562317A (en) Methods and systems for restricting data usage at a network device
EP3238658A4 (en) System and device for monitoring the reproductive activity of animals
HK1221057A1 (zh) 用於跟蹤多個第三方站點上的用戶參與的方法和系統