Data protection in a networked computing environment
First Claim
1. A method of providing data protection in a networked computing environment, comprising:
- detecting, by at least one computer device, a breach of a first system in the networked computing environment;
in response to the detecting of the breach of the first system, generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a database which includes a scrambled version of low value data and a patch which is a configuration update applied to the database of the second system that eliminates a vulnerability exposed by the breach; and
converting, by the at least one computer device, the first system to a decoy system.
2 Assignments
0 Petitions
Accused Products
Abstract
Approaches for providing data protection in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a first system in the networked computing environment. The method also includes generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a patch based on the breach. The method additionally includes converting, by the at least one computer device, the first system to a decoy system. The method further includes generating, by the at least one computer device, a third system in the networked computing environment, wherein the third system has reduced security relative to the first system.
148 Citations
20 Claims
-
1. A method of providing data protection in a networked computing environment, comprising:
-
detecting, by at least one computer device, a breach of a first system in the networked computing environment; in response to the detecting of the breach of the first system, generating, by the at least one computer device, a second system in the networked computing environment, wherein the second system includes a database which includes a scrambled version of low value data and a patch which is a configuration update applied to the database of the second system that eliminates a vulnerability exposed by the breach; and converting, by the at least one computer device, the first system to a decoy system. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 18, 19, 20)
-
-
10. A computer program product for providing data protection in a networked computing environment, the computer program product comprising a computer readable storage device having program instructions embodied therewith, the program instructions being executable by a computer device to cause the computer device to:
-
detect a breach of a first production system in the networked computing environment; in response to the detecting the breach of the first production system, generate a second production system in the networked computing environment, wherein the second production system includes a database which includes a scrambled version of low value data and a patch which is a configuration update applied to the database of the second system that eliminates a vulnerability exposed by the breach; and convert the first production system to a decoy system, wherein the scrambled version of the low value data is encrypted. - View Dependent Claims (11, 12, 13, 14, 15, 16, 17)
-
Specification