METHOD AND APPARATUS FOR DATA SECURITY ANALYSIS OF DATA FLOWS
First Claim
Patent Images
1. A method comprising:
- determining a data flow configuration associated with a data element processed by a system, wherein the system comprises a plurality of processing nodes and wherein the data flow configuration indicates an expected sequence of the processing nodes that will interact with the data element;
monitoring an observed sequence of the plurality of processing nodes that are detected to process the data element; and
identifying a potential security issue when there is a deviation of the observed sequence from the expected sequence.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and apparatus useful for data risk monitoring and management includes configuration and analysis of data flows to identify and assess risk and compliance to various regulatory standards and business practices. The evaluation of monitored data flows are then further used to identify potential security risks based on deviation from expected flows or compliant handling methods.
-
Citations
22 Claims
-
1. A method comprising:
-
determining a data flow configuration associated with a data element processed by a system, wherein the system comprises a plurality of processing nodes and wherein the data flow configuration indicates an expected sequence of the processing nodes that will interact with the data element; monitoring an observed sequence of the plurality of processing nodes that are detected to process the data element; and identifying a potential security issue when there is a deviation of the observed sequence from the expected sequence. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. An apparatus comprising:
-
at least one processor; and at least one memory including computer program code for one or more programs, the at least one memory and the computer program code configured to, with the at least one processor, cause the apparatus to perform at least the following, determine a data flow configuration associated with a data element processed by a system, wherein the system comprises a plurality of processing nodes and wherein the data flow configuration indicates an expected sequence of the processing nodes that will interact with the data element; monitor an observed sequence of the plurality of processing nodes that are detected to process the data element; and identify a potential security issue when there is a deviation of the observed sequence from the expected sequence. - View Dependent Claims (13, 14, 15, 16, 17, 18, 19, 20, 21, 22)
-
Specification