Social network security monitoring
First Claim
Patent Images
1. A computer-implemented method for providing risk assessment data comprising:
- receiving, a security analysis module and from a user device of one or more employees of a company, authorization to access security data, wherein the security data is private data that controls access to one or more social network profiles of the one or more employees of the company;
accessing, by the security analysis module, the security data associated with the one or more social network profiles of one or more employees of the company;
determining, by the security analysis module, using a scoring algorithm, a security risk score for the company based on evaluating the security data associated with the one or more social network profiles of one or more employees of a company;
providing the determined security risk score to a user device of an entity associated with the company;
monitoring, on a continuous basis by the security analysis module, the security data associated with the one or more social network profiles of one or more employees of a company for changes to the security data that alter a level of security to access the one or more social network profiles of the one or more employees of the company;
updating, by the security analysis module, the security risk score for the company based on identifying changes to the security data associated with the one or more social network profiles of the one or more employees of the company;
comparing, by the security analysis module, the updated security risk score to a risk score threshold;
generating, by the security analysis module, an alert based on the security risk score exceeding the risk score threshold;
providing, by the security analysis module, the alert to the user device of the employee of the company associated with the changes to the security data;
storing, for each of the updated security risk scores, the updated security risk score, a timestamp, the risk score threshold, and a reason for generating the updated security risk score;
generating, by the security analysis module, a historical list of security risk scores based on the stored updated security risk scores; and
providing the company access to the historical list of security risk scores via a social protection tool platform.
12 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method includes security settings data associated with one or more profiles of a protected social entity on one or more social networks is scanned, and the security settings data associated with the one or more profiles of the protected social entity is assessed. A first security risk score for the protected social entity is determined based on the assessment of the security settings data, and the first security risk score is provided to the protected social entity.
-
Citations
17 Claims
-
1. A computer-implemented method for providing risk assessment data comprising:
-
receiving, a security analysis module and from a user device of one or more employees of a company, authorization to access security data, wherein the security data is private data that controls access to one or more social network profiles of the one or more employees of the company; accessing, by the security analysis module, the security data associated with the one or more social network profiles of one or more employees of the company; determining, by the security analysis module, using a scoring algorithm, a security risk score for the company based on evaluating the security data associated with the one or more social network profiles of one or more employees of a company; providing the determined security risk score to a user device of an entity associated with the company; monitoring, on a continuous basis by the security analysis module, the security data associated with the one or more social network profiles of one or more employees of a company for changes to the security data that alter a level of security to access the one or more social network profiles of the one or more employees of the company; updating, by the security analysis module, the security risk score for the company based on identifying changes to the security data associated with the one or more social network profiles of the one or more employees of the company; comparing, by the security analysis module, the updated security risk score to a risk score threshold; generating, by the security analysis module, an alert based on the security risk score exceeding the risk score threshold; providing, by the security analysis module, the alert to the user device of the employee of the company associated with the changes to the security data; storing, for each of the updated security risk scores, the updated security risk score, a timestamp, the risk score threshold, and a reason for generating the updated security risk score; generating, by the security analysis module, a historical list of security risk scores based on the stored updated security risk scores; and providing the company access to the historical list of security risk scores via a social protection tool platform. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system comprising:
-
one or more processing devices; and one or more non-transitory computer-readable media coupled to the one or more processing devices having instructions stored thereon which, when executed by the one or more processing devices, cause the one or more processing devices to perform operations comprising; receiving, by a security analysis module and from a user device of one or more employees of a company, authorization to access security data, wherein the security data is private data that controls access to one or more social network profiles of the one or more employees of the company; accessing, by the security analysis module, the security data associated with the one or more social network profiles of one or more employees of the company; determining, by the security analysis module, using a scoring algorithm, a security risk score for the company based on evaluating the security data associated with the one or more social network profiles of one or more employees of a company; providing the determined security risk score to a user device of an entity associated with the company; monitoring, on a continuous basis by the security analysis module, the security data associated with the one or more social network profiles of one or more employees of a company for changes to the security data that alters a level of security to access the one or more social network profiles of the one or more employees of the company; updating, by the security analysis module, the security risk score for the company based on identifying changes to the security data associated with the one or more social network profiles of the one or more employees of the company; comparing, by the security analysis module, the updated security risk score to a risk score threshold; generating, by the security analysis module, an alert based on the security risk score exceeding the risk score threshold; providing, by the security analysis module, the alert to the user device of the employee of the company associated with the changes to the security data; storing, for each of the updated security risk scores, the updated security risk score, a timestamp, the risk score threshold, and a reason for generating the updated security risk score; generating, by the security analysis module, a historical list of security risk scores based on the stored updated security risk scores; and providing the company access to the historical list of security risk scores via a social protection tool platform. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A non-transitory computer-readable storage medium storing software comprising instructions executable by one or more computers which, upon such execution, cause the one or more computers to perform operations comprising:
-
receiving, by a security analysis module and from a user device of one or more employees of a company, authorization to access security data, wherein the security data is private data that controls access to one or more social network profiles of the one or more employees of the company; accessing, by the security analysis module, the security data associated with the one or more social network profiles of one or more employees of the company; determining, by the security analysis module, using a scoring algorithm, a security risk score for the company based on evaluating the security data associated with the one or more social network profiles of one or more employees of a company; providing the determined security risk score to a user device of an entity associated with the company; monitoring, on a continuous basis by the security analysis module, the security data associated with the one or more social network profiles of one or more employees of a company for changes to the security data that alter a level of security to access the one or more social network profiles of the one or more employees of the company; updating, by the security analysis module, the security risk score for the company based on identifying changes to the security data associated with the one or more social network profiles of the one or more employees of the company; comparing, by the security analysis module, the updated security risk score to a risk score threshold; generating, by the security analysis module, an alert based on the security risk score exceeding the risk score threshold; providing, by the security analysis module, the alert to the user device of the employee of the company associated with the changes to the security data; storing, for each of the updated security risk scores, the updated security risk score, a timestamp, the risk score threshold, and a reason for generating the updated security risk score; generating, by the security analysis module, a historical list of security risk scores based on the stored updated security risk scores; and providing the company access to the historical list of security risk scores via a social protection tool platform. - View Dependent Claims (16, 17)
-
Specification