In-context security advisor in a computing environment
First Claim
1. In a computing environment, a system comprising:
- a plurality of sources of security-related information; and
a security service, the security service configured to monitor in real time the security-related information of the plurality of sources, and to perform actions to protect the computer system based on the security-related information.
2 Assignments
0 Petitions
Accused Products
Abstract
Provided is an in-context security advisor that unifies computer system security, and generally improves computer system security by proactively and reactively monitoring for changes to security settings made by users and programs. By operating in real time, advice comprising meaningful feedback is given for any intrusion, thus giving a user the proper context about the consequences of changes to security settings that negatively affect the level of protection on computer systems, and allowing automated correction. Files can also be monitored, e.g., to prevent certain files from being remotely accessed or transmitted. The security advisor may adjust its operation based on user preferences, policy information, and via a connection to a remote source such as a backend server. The security advisor can also output security-related information, such as to a log and/or to components that evaluate the overall health of the machine.
-
Citations
61 Claims
-
1. In a computing environment, a system comprising:
-
a plurality of sources of security-related information; and
a security service, the security service configured to monitor in real time the security-related information of the plurality of sources, and to perform actions to protect the computer system based on the security-related information. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40)
-
-
41. In a computing environment, a method comprising:
-
obtaining information from one of a plurality of sources, the information related to a change to a security setting;
accessing user preference information to determine whether the information should be acted upon; and
if the user preference information indicates that the change should be acted upon, accessing action preference data to determine an action to take with respect to the information. - View Dependent Claims (42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56)
-
-
57. In a computing environment, a method comprising:
-
detecting information from one of a plurality of sources, the information related to a change to a security setting;
outputting data to a user interface corresponding to a notification of the change to the security setting;
receiving an instruction via the user interface; and
taking an action with respect to the security setting based on the instruction. - View Dependent Claims (58, 59, 60)
-
-
61. In a computing system, a system comprising:
-
means for obtaining information from one of a plurality of sources, the information related to a change to a security setting;
means for accessing user preference information to determine whether the information should be acted upon; and
means for accessing action preference data to determine an action to take with respect to the information.
-
Specification