MX2016014095A - Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware. - Google Patents
Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware.Info
- Publication number
- MX2016014095A MX2016014095A MX2016014095A MX2016014095A MX2016014095A MX 2016014095 A MX2016014095 A MX 2016014095A MX 2016014095 A MX2016014095 A MX 2016014095A MX 2016014095 A MX2016014095 A MX 2016014095A MX 2016014095 A MX2016014095 A MX 2016014095A
- Authority
- MX
- Mexico
- Prior art keywords
- protection
- activity
- malware
- prediction
- warning
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/552—Detecting local intrusion or implementing counter-measures involving long-term monitoring or reporting
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/56—Computer malware detection or handling, e.g. anti-virus arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Virology (AREA)
- Storage Device Security (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Alarm Systems (AREA)
- Medical Treatment And Welfare Office Work (AREA)
Abstract
Lo que se describe en este documento es un sistema y método para determinar si el nivel de protección de un sistema de protección es el adecuado para el modo en que el usuario de un sistema de cómputo está utilizando el dispositivo. El sistema de protección monitorea la actividad del usuario mientras están utilizando las diversas aplicaciones en el dispositivo. El sistema de protección identifica un registro de actividad que es el más similar a la actividad del usuario y compara el nivel de protección actual con el nivel de protección del registro asociado. El sistema de protección puede cambiar el nivel de protección cuando el nivel de protección del usuario y el nivel de protección del registro asociado son diferentes.
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/265,308 US20150310213A1 (en) | 2014-04-29 | 2014-04-29 | Adjustment of protection based on prediction and warning of malware-prone activity |
PCT/US2015/027687 WO2015167973A1 (en) | 2014-04-29 | 2015-04-27 | Adjustment of protection based on prediction and warning of malware-prone activity |
Publications (1)
Publication Number | Publication Date |
---|---|
MX2016014095A true MX2016014095A (es) | 2017-02-09 |
Family
ID=53059499
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
MX2016014095A MX2016014095A (es) | 2014-04-29 | 2015-04-27 | Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware. |
Country Status (10)
Country | Link |
---|---|
US (1) | US20150310213A1 (es) |
EP (1) | EP3138039A1 (es) |
JP (1) | JP2017515235A (es) |
KR (1) | KR20160148544A (es) |
CN (1) | CN106233297A (es) |
AU (1) | AU2015253468A1 (es) |
CA (1) | CA2944910A1 (es) |
MX (1) | MX2016014095A (es) |
RU (1) | RU2016142483A (es) |
WO (1) | WO2015167973A1 (es) |
Families Citing this family (23)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10805331B2 (en) | 2010-09-24 | 2020-10-13 | BitSight Technologies, Inc. | Information technology security assessment system |
US9438615B2 (en) * | 2013-09-09 | 2016-09-06 | BitSight Technologies, Inc. | Security risk management |
US20160034404A1 (en) * | 2014-07-31 | 2016-02-04 | International Business Machines Corporation | Managing access to storage |
US11182720B2 (en) | 2016-02-16 | 2021-11-23 | BitSight Technologies, Inc. | Relationships among technology assets and services and the entities responsible for them |
US9967267B2 (en) | 2016-04-15 | 2018-05-08 | Sophos Limited | Forensic analysis of computing activity |
US12093383B2 (en) | 2016-04-15 | 2024-09-17 | Sophos Limited | Tracking malware root causes with an event graph |
US10990284B1 (en) * | 2016-09-30 | 2021-04-27 | EMC IP Holding Company LLC | Alert configuration for data protection |
US10425380B2 (en) | 2017-06-22 | 2019-09-24 | BitSight Technologies, Inc. | Methods for mapping IP addresses and domains to organizations using user activity data |
US10257219B1 (en) | 2018-03-12 | 2019-04-09 | BitSight Technologies, Inc. | Correlated risk in cybersecurity |
US10812520B2 (en) | 2018-04-17 | 2020-10-20 | BitSight Technologies, Inc. | Systems and methods for external detection of misconfigured systems |
US10938838B2 (en) | 2018-08-31 | 2021-03-02 | Sophos Limited | Computer augmented threat evaluation |
US11200323B2 (en) | 2018-10-17 | 2021-12-14 | BitSight Technologies, Inc. | Systems and methods for forecasting cybersecurity ratings based on event-rate scenarios |
US10521583B1 (en) | 2018-10-25 | 2019-12-31 | BitSight Technologies, Inc. | Systems and methods for remote detection of software through browser webinjects |
US10726136B1 (en) | 2019-07-17 | 2020-07-28 | BitSight Technologies, Inc. | Systems and methods for generating security improvement plans for entities |
US11956265B2 (en) | 2019-08-23 | 2024-04-09 | BitSight Technologies, Inc. | Systems and methods for inferring entity relationships via network communications of users or user devices |
US10848382B1 (en) | 2019-09-26 | 2020-11-24 | BitSight Technologies, Inc. | Systems and methods for network asset discovery and association thereof with entities |
US11032244B2 (en) | 2019-09-30 | 2021-06-08 | BitSight Technologies, Inc. | Systems and methods for determining asset importance in security risk management |
US10791140B1 (en) | 2020-01-29 | 2020-09-29 | BitSight Technologies, Inc. | Systems and methods for assessing cybersecurity state of entities based on computer network characterization |
US10893067B1 (en) | 2020-01-31 | 2021-01-12 | BitSight Technologies, Inc. | Systems and methods for rapidly generating security ratings |
US10764298B1 (en) | 2020-02-26 | 2020-09-01 | BitSight Technologies, Inc. | Systems and methods for improving a security profile of an entity based on peer security profiles |
US11023585B1 (en) | 2020-05-27 | 2021-06-01 | BitSight Technologies, Inc. | Systems and methods for managing cybersecurity alerts |
US11122073B1 (en) | 2020-12-11 | 2021-09-14 | BitSight Technologies, Inc. | Systems and methods for cybersecurity risk mitigation and management |
US12079347B2 (en) | 2021-03-31 | 2024-09-03 | BitSight Technologies, Inc. | Systems and methods for assessing cybersecurity risk in a work from home environment |
Family Cites Families (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8477009B2 (en) * | 2005-08-28 | 2013-07-02 | Marcon International, Inc. | Asset security system and associated methods for selectively granting access |
US7627893B2 (en) * | 2005-10-20 | 2009-12-01 | International Business Machines Corporation | Method and system for dynamic adjustment of computer security based on network activity of users |
US7954143B2 (en) * | 2006-11-13 | 2011-05-31 | At&T Intellectual Property I, Lp | Methods, network services, and computer program products for dynamically assigning users to firewall policy groups |
US8069230B2 (en) * | 2007-10-31 | 2011-11-29 | Affinegy, Inc. | System and method of configuring a network |
US8275899B2 (en) * | 2008-12-29 | 2012-09-25 | At&T Intellectual Property I, L.P. | Methods, devices and computer program products for regulating network activity using a subscriber scoring system |
US20100301993A1 (en) * | 2009-05-28 | 2010-12-02 | International Business Machines Corporation | Pattern based security authorization |
US8910279B2 (en) * | 2010-03-10 | 2014-12-09 | Sonicwall, Inc. | Reputation-based threat protection |
US20120167218A1 (en) * | 2010-12-23 | 2012-06-28 | Rajesh Poornachandran | Signature-independent, system behavior-based malware detection |
US20130276123A1 (en) * | 2011-09-30 | 2013-10-17 | Paul J. Thadikaran | Mechanism for providing a secure environment for acceleration of software applications at computing devices |
US20140279527A1 (en) * | 2013-03-14 | 2014-09-18 | Sas Institute Inc. | Enterprise Cascade Models |
-
2014
- 2014-04-29 US US14/265,308 patent/US20150310213A1/en not_active Abandoned
-
2015
- 2015-04-27 JP JP2016565280A patent/JP2017515235A/ja active Pending
- 2015-04-27 AU AU2015253468A patent/AU2015253468A1/en not_active Abandoned
- 2015-04-27 RU RU2016142483A patent/RU2016142483A/ru not_active Application Discontinuation
- 2015-04-27 MX MX2016014095A patent/MX2016014095A/es unknown
- 2015-04-27 KR KR1020167030088A patent/KR20160148544A/ko unknown
- 2015-04-27 WO PCT/US2015/027687 patent/WO2015167973A1/en active Application Filing
- 2015-04-27 CN CN201580021669.1A patent/CN106233297A/zh active Pending
- 2015-04-27 EP EP15721475.0A patent/EP3138039A1/en not_active Withdrawn
- 2015-04-27 CA CA2944910A patent/CA2944910A1/en not_active Abandoned
Also Published As
Publication number | Publication date |
---|---|
US20150310213A1 (en) | 2015-10-29 |
CA2944910A1 (en) | 2015-11-05 |
CN106233297A (zh) | 2016-12-14 |
AU2015253468A1 (en) | 2016-10-06 |
KR20160148544A (ko) | 2016-12-26 |
EP3138039A1 (en) | 2017-03-08 |
RU2016142483A3 (es) | 2018-11-02 |
WO2015167973A1 (en) | 2015-11-05 |
RU2016142483A (ru) | 2018-04-28 |
JP2017515235A (ja) | 2017-06-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
MX2016014095A (es) | Ajuste de proteccion con base en la prediccion y advertencia de actividad propensa a malware. | |
AU2018289552A1 (en) | Linking observed human activity on video to a user account | |
MX2016012199A (es) | Recomendacion personalizada basada en la declaracion explicita del usuario. | |
IN2015KO00053A (es) | ||
EP4299047A3 (en) | Adaptive interface for continuous monitoring devices | |
WO2013181025A3 (en) | Systems and methods for dynamically providing fonts based on language settings | |
MX2018004074A (es) | Sistemas y metodos para el ajuste de dispositivos. | |
WO2014140926A3 (en) | Systems, methods, and computer-readable media for identifying when a subject is likely to be affected by a medical condition | |
TW201614990A (en) | Security in software defined network | |
MX2016004429A (es) | Metodo y aparato de recordatorio de informacion anormal de video. | |
TW201612724A (en) | Electronic device and display interface adjusting method thereof | |
MY199109A (en) | Systems and methods of flexibly activating particular temporary attended delivery /pickup locations | |
WO2015112275A3 (en) | Determing data associated with proximate computing devices | |
WO2014150405A3 (en) | Context aware localization, mapping, and tracking | |
EP3629913A4 (en) | SYSTEMS AND PROCEDURES FOR MONITORING NERVOUS ACTIVITY | |
NZ766062A (en) | Automated password generation and change | |
GB2558985A (en) | Predicting user needs for a particular context | |
EP4246530A3 (en) | Event detection using a variable threshold | |
MX2015009734A (es) | Metodo y aparato para enviar informacion automaticamente. | |
GB2534969B (en) | Methods and systems for granting partial or full access to an application based on level of confidence that print corresponds to user profile | |
TW201613383A (en) | Automatic device configuration | |
EP3238658A4 (en) | System and device for monitoring the reproductive activity of animals | |
GB2562317A (en) | Methods and systems for restricting data usage at a network device | |
PH12018500491A1 (en) | Battery pack, battery system comprising the same, and method for distinguishing use application of battery pack | |
HK1221057A1 (zh) | 用於跟蹤多個第三方站點上的用戶參與的方法和系統 |