SECURITY CONTROL FOR AN ENTERPRISE NETWORK
First Claim
1. A method for administering security for a network, comprising the steps of:
- detecting, by one or more processors, that a computing device has connected to a network;
determining, by one or more processors, whether the computing device is valid, wherein determining whether the computing device is valid further comprises comparing a MAC address associated with the computing device with a database containing one or more MAC addresses associated with one or more valid devices;
based on determining that the computing device is valid, determining, by one or more processors, whether the computing device is being utilized for one or more suspicious activities;
based on determining that the computing device is being utilized for one or more suspicious activities;
determining, by one or more processors, a location of the computing device;
determining, by one or more processors, whether a user associated with the computing device can be identified; and
based on determining that the user associated with the computing device cannot be identified, disabling the computing device and transmitting an alert to security personnel.
2 Assignments
0 Petitions
Accused Products
Abstract
A computing device detects that another computing device has connected to a network. The computing device determines whether the other computing device is valid and whether the computing device is being utilized for one or more suspicious activities. Based on determining that the other computing device is being utilized for one or more suspicious activities, the computing device determines a location of the other computing device, determines whether a user associated with the other computing device can be identified, and based on determining that the user associated with the other computing device cannot be identified, disables the other computing device, and transmits an alert to security personnel.
14 Citations
20 Claims
-
1. A method for administering security for a network, comprising the steps of:
-
detecting, by one or more processors, that a computing device has connected to a network; determining, by one or more processors, whether the computing device is valid, wherein determining whether the computing device is valid further comprises comparing a MAC address associated with the computing device with a database containing one or more MAC addresses associated with one or more valid devices; based on determining that the computing device is valid, determining, by one or more processors, whether the computing device is being utilized for one or more suspicious activities; based on determining that the computing device is being utilized for one or more suspicious activities; determining, by one or more processors, a location of the computing device; determining, by one or more processors, whether a user associated with the computing device can be identified; and based on determining that the user associated with the computing device cannot be identified, disabling the computing device and transmitting an alert to security personnel. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A computer program product for administering security for a network, the computer program product comprising:
-
one or more computer-readable storage devices and program instructions stored on at least one of the one or more computer-readable storage devices, the program instructions comprising; program instructions to detect that a computing device has connected to a network; program instructions to determine whether the computing device is valid, wherein determining whether the computing device is valid further comprises program instructions to compare a MAC address associated with the computing device with a database containing one or more MAC addresses associated with one or more valid devices; based on determining that the computing device is valid, program instructions to determine whether the computing device is being utilized for one or more suspicious activities; based on determining that the computing device is being utilized for one or more suspicious activities; program instructions to determine a location of the computing device; program instructions to determine whether a user associated with the computing device can be identified; and based on determining that the user associated with the computing device cannot be identified, program instructions to disable the computing device and transmit an alert to security personnel. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer system administering security for a network, the computer system comprising:
-
one or more processors, one or more computer-readable memories, one or more computer-readable tangible storage devices, and program instructions stored on at least one of the one or more computer-readable tangible storage devices for execution by at least one of the one or more processors via at least one of the one or more memories, the program instructions comprising; program instructions to detect that a computing device has connected to a network; program instructions to determine whether the computing device is valid, wherein determining whether the computing device is valid further comprises program instructions to compare a MAC address associated with the computing device with a database containing one or more MAC addresses associated with one or more valid devices; based on determining that the computing device is valid, program instructions to determine whether the computing device is being utilized for one or more suspicious activities; based on determining that the computing device is being utilized for one or more suspicious activities; program instructions to determine a location of the computing device; program instructions to determine whether a user associated with the computing device can be identified; and based on determining that the user associated with the computing device cannot be identified, program instructions to disable the computing device and transmit an alert to security personnel. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification