MX2016014095A - Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware. - Google Patents
Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware.Info
- Publication number
- MX2016014095A MX2016014095A MX2016014095A MX2016014095A MX2016014095A MX 2016014095 A MX2016014095 A MX 2016014095A MX 2016014095 A MX2016014095 A MX 2016014095A MX 2016014095 A MX2016014095 A MX 2016014095A MX 2016014095 A MX2016014095 A MX 2016014095A
- Authority
- MX
- Mexico
- Prior art keywords
- protection
- activity
- malware
- prediction
- warning
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
- Alarm Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Medical Treatment And Welfare Office Work (AREA)
Abstract
Lo que se describe en este documento es un sistema y método para determinar si el nivel de protección de un sistema de protección es el adecuado para el modo en que el usuario de un sistema de cómputo está utilizando el dispositivo. El sistema de protección monitorea la actividad del usuario mientras están utilizando las diversas aplicaciones en el dispositivo. El sistema de protección identifica un registro de actividad que es el más similar a la actividad del usuario y compara el nivel de protección actual con el nivel de protección del registro asociado. El sistema de protección puede cambiar el nivel de protección cuando el nivel de protección del usuario y el nivel de protección del registro asociado son diferentes.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/265,308 US20150310213A1 (en) | 2014-04-29 | 2014-04-29 | Adjustment of protection based on prediction and warning of malware-prone activity |
PCT/US2015/027687 WO2015167973A1 (en) | 2014-04-29 | 2015-04-27 | Adjustment of protection based on prediction and warning of malware-prone activity |
Publications (1)
Publication Number | Publication Date |
---|---|
MX2016014095A true MX2016014095A (es) | 2017-02-09 |
Family
ID=53059499
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2016014095A MX2016014095A (es) | 2014-04-29 | 2015-04-27 | Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware. |
Country Status (10)
Country | Link |
---|---|
US (1) | US20150310213A1 (es) |
EP (1) | EP3138039A1 (es) |
JP (1) | JP2017515235A (es) |
KR (1) | KR20160148544A (es) |
CN (1) | CN106233297A (es) |
AU (1) | AU2015253468A1 (es) |
CA (1) | CA2944910A1 (es) |
MX (1) | MX2016014095A (es) |
RU (1) | RU2016142483A (es) |
WO (1) | WO2015167973A1 (es) |
Families Citing this family (20)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10805331B2 (en) | 2010-09-24 | 2020-10-13 | BitSight Technologies, Inc. | Information technology security assessment system |
US9438615B2 (en) | 2013-09-09 | 2016-09-06 | BitSight Technologies, Inc. | Security risk management |
US20160034404A1 (en) * | 2014-07-31 | 2016-02-04 | International Business Machines Corporation | Managing access to storage |
US11182720B2 (en) | 2016-02-16 | 2021-11-23 | BitSight Technologies, Inc. | Relationships among technology assets and services and the entities responsible for them |
US10990284B1 (en) * | 2016-09-30 | 2021-04-27 | EMC IP Holding Company LLC | Alert configuration for data protection |
US10425380B2 (en) | 2017-06-22 | 2019-09-24 | BitSight Technologies, Inc. | Methods for mapping IP addresses and domains to organizations using user activity data |
US10257219B1 (en) | 2018-03-12 | 2019-04-09 | BitSight Technologies, Inc. | Correlated risk in cybersecurity |
US10812520B2 (en) | 2018-04-17 | 2020-10-20 | BitSight Technologies, Inc. | Systems and methods for external detection of misconfigured systems |
US10938839B2 (en) | 2018-08-31 | 2021-03-02 | Sophos Limited | Threat detection with business impact scoring |
US11200323B2 (en) | 2018-10-17 | 2021-12-14 | BitSight Technologies, Inc. | Systems and methods for forecasting cybersecurity ratings based on event-rate scenarios |
US10521583B1 (en) | 2018-10-25 | 2019-12-31 | BitSight Technologies, Inc. | Systems and methods for remote detection of software through browser webinjects |
US10726136B1 (en) | 2019-07-17 | 2020-07-28 | BitSight Technologies, Inc. | Systems and methods for generating security improvement plans for entities |
US11956265B2 (en) | 2019-08-23 | 2024-04-09 | BitSight Technologies, Inc. | Systems and methods for inferring entity relationships via network communications of users or user devices |
US10848382B1 (en) | 2019-09-26 | 2020-11-24 | BitSight Technologies, Inc. | Systems and methods for network asset discovery and association thereof with entities |
US11032244B2 (en) | 2019-09-30 | 2021-06-08 | BitSight Technologies, Inc. | Systems and methods for determining asset importance in security risk management |
US10791140B1 (en) | 2020-01-29 | 2020-09-29 | BitSight Technologies, Inc. | Systems and methods for assessing cybersecurity state of entities based on computer network characterization |
US10893067B1 (en) | 2020-01-31 | 2021-01-12 | BitSight Technologies, Inc. | Systems and methods for rapidly generating security ratings |
US10764298B1 (en) | 2020-02-26 | 2020-09-01 | BitSight Technologies, Inc. | Systems and methods for improving a security profile of an entity based on peer security profiles |
US11023585B1 (en) | 2020-05-27 | 2021-06-01 | BitSight Technologies, Inc. | Systems and methods for managing cybersecurity alerts |
US11122073B1 (en) | 2020-12-11 | 2021-09-14 | BitSight Technologies, Inc. | Systems and methods for cybersecurity risk mitigation and management |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8477009B2 (en) * | 2005-08-28 | 2013-07-02 | Marcon International, Inc. | Asset security system and associated methods for selectively granting access |
US7627893B2 (en) * | 2005-10-20 | 2009-12-01 | International Business Machines Corporation | Method and system for dynamic adjustment of computer security based on network activity of users |
US7954143B2 (en) * | 2006-11-13 | 2011-05-31 | At&T Intellectual Property I, Lp | Methods, network services, and computer program products for dynamically assigning users to firewall policy groups |
US8069230B2 (en) * | 2007-10-31 | 2011-11-29 | Affinegy, Inc. | System and method of configuring a network |
US8275899B2 (en) * | 2008-12-29 | 2012-09-25 | At&T Intellectual Property I, L.P. | Methods, devices and computer program products for regulating network activity using a subscriber scoring system |
US20100301993A1 (en) * | 2009-05-28 | 2010-12-02 | International Business Machines Corporation | Pattern based security authorization |
US8910279B2 (en) * | 2010-03-10 | 2014-12-09 | Sonicwall, Inc. | Reputation-based threat protection |
US20120167218A1 (en) * | 2010-12-23 | 2012-06-28 | Rajesh Poornachandran | Signature-independent, system behavior-based malware detection |
WO2013048492A1 (en) * | 2011-09-30 | 2013-04-04 | Intel Corporation | Mechanism for providing a secure environment for acceleration of software applications at computing devices |
US20140279527A1 (en) * | 2013-03-14 | 2014-09-18 | Sas Institute Inc. | Enterprise Cascade Models |
-
2014
- 2014-04-29 US US14/265,308 patent/US20150310213A1/en not_active Abandoned
-
2015
- 2015-04-27 KR KR1020167030088A patent/KR20160148544A/ko unknown
- 2015-04-27 WO PCT/US2015/027687 patent/WO2015167973A1/en active Application Filing
- 2015-04-27 CA CA2944910A patent/CA2944910A1/en not_active Abandoned
- 2015-04-27 EP EP15721475.0A patent/EP3138039A1/en not_active Withdrawn
- 2015-04-27 AU AU2015253468A patent/AU2015253468A1/en not_active Abandoned
- 2015-04-27 MX MX2016014095A patent/MX2016014095A/es unknown
- 2015-04-27 RU RU2016142483A patent/RU2016142483A/ru not_active Application Discontinuation
- 2015-04-27 JP JP2016565280A patent/JP2017515235A/ja active Pending
- 2015-04-27 CN CN201580021669.1A patent/CN106233297A/zh active Pending
Also Published As
Publication number | Publication date |
---|---|
AU2015253468A1 (en) | 2016-10-06 |
RU2016142483A3 (es) | 2018-11-02 |
JP2017515235A (ja) | 2017-06-08 |
KR20160148544A (ko) | 2016-12-26 |
US20150310213A1 (en) | 2015-10-29 |
CN106233297A (zh) | 2016-12-14 |
WO2015167973A1 (en) | 2015-11-05 |
EP3138039A1 (en) | 2017-03-08 |
CA2944910A1 (en) | 2015-11-05 |
RU2016142483A (ru) | 2018-04-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2016014095A (es) | Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware. | |
WO2018237210A8 (en) | Linking observed human activity on video to a user account | |
MX2016012199A (es) | Recomendacion personalizada basada en la declaracion explicita del usuario. | |
IN2015KO00053A (es) | ||
EP4299047A3 (en) | Adaptive interface for continuous monitoring devices | |
WO2013181025A3 (en) | Systems and methods for dynamically providing fonts based on language settings | |
MX2016009391A (es) | Sistemas y metodos de control de estabilidad de la bicicleta. | |
MX362556B (es) | Metodo y aparato de recordatorio de informacion anormal de video. | |
MX2018004074A (es) | Sistemas y metodos para el ajuste de dispositivos. | |
TW201614990A (en) | Security in software defined network | |
TW201612724A (en) | Electronic device and display interface adjusting method thereof | |
MY199109A (en) | Systems and methods of flexibly activating particular temporary attended delivery /pickup locations | |
SG10201809428UA (en) | Insulin receptor partial agonists | |
WO2014150405A3 (en) | Context aware localization, mapping, and tracking | |
WO2015112275A3 (en) | Determing data associated with proximate computing devices | |
NZ766062A (en) | Automated password generation and change | |
WO2015107383A3 (en) | Role-based anonymization | |
GB2558985A (en) | Predicting user needs for a particular context | |
EP4246530A3 (en) | Event detection using a variable threshold | |
GB2534969B (en) | Methods and systems for granting partial or full access to an application based on level of confidence that print corresponds to user profile | |
EP3218862A4 (en) | User active lead management system and uses thereof | |
EP3240473A4 (en) | Systems and methods for providing user insights based on real-time physiological parameters | |
GB2562317A (en) | Methods and systems for restricting data usage at a network device | |
EP3238658A4 (en) | System and device for monitoring the reproductive activity of animals | |
HK1221057A1 (zh) | 用於跟蹤多個第三方站點上的用戶參與的方法和系統 |