SYSTEM, METHOD, AND COMPUTER PROGRAM PRODUCT FOR REACTING IN RESPONSE TO A DETECTION OF AN ATTEMPT TO STORE A CONFIGURATION FILE AND AN EXECUTABLE FILE ON A REMOVABLE DEVICE
9 Assignments
0 Petitions
Accused Products
Abstract
A system, method, and computer program product are provided for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device. In use, a first device removably coupled to a second device is identified. Additionally, an attempt to store on the first device a configuration file for the first device and an executable file is detected. Further, a reaction is performed in response to the detection of the attempt.
17 Citations
40 Claims
-
1-20. -20. (canceled)
-
21. A non-transitory tangible computer readable medium comprising one or more instructions that when executed on a processor configure the processor to perform operations for preventing propagation of malware from a first device to a second device via a removable storage device, the operations comprising:
-
monitoring, by a security system of the first device, ports of the first device to identify that the removable storage device coupled to the first device; monitoring, by the security system, file copy or create operations directed to the removable storage device to detect an attempt by a program on the first device to store a configuration file and an executable file on the removable storage device; and in response to detecting the attempt, providing, by the security system, an alert to a user of the first device of the attempt to store the configuration file and the executable file on the removable storage device. - View Dependent Claims (22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36)
-
-
37. A first device for preventing propagation of malware from the first device to a second device via a removable storage device, the device comprising:
-
a processor, a memory having instructions stored thereon, wherein the instructions are executable by the processor to cause the first device to; monitor, by a security system of the first device, ports of the first device to identify that the removable storage device coupled to the first device; monitor, by the security system, file copy or create operations directed to the removable storage device to detect an attempt by a program on the first device to store a configuration file and an executable file on the removable storage device; and in response to detecting the attempt, provide, by the security system, an alert to a user of the first device of the attempt to store the configuration file and the executable file on the removable storage device. - View Dependent Claims (38)
-
-
39. A method for preventing propagation of malware from a first device to a second device via a removable storage device, the method comprising:
-
monitoring, by a security system of the first device, ports of the first device to identify that the removable storage device coupled to the first device; monitoring, by the security system, file copy or create operations directed to the removable storage device to detect an attempt by a program on the first device to store a configuration file and an executable file on the removable storage device; and in response to detecting the attempt, providing, by the security system, an alert to a user of the first device of the attempt to store the configuration file and the executable file on the removable storage device. - View Dependent Claims (40)
-
Specification