REMEDIAL ACTIONS BASED ON USER RISK ASSESSMENTS
First Claim
1. A method comprising:
- receiving, at a data processing apparatus and for each of a plurality of users, user activity data describing a plurality of actions taken by the user by use of a user device over a period of time;
determining, by the data processing apparatus, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device; and
determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.
3 Assignments
0 Petitions
Accused Products
Abstract
In some implementations, a method includes receiving, for each of multiple users, user activity data describing actions taken by the user by use of a user device over a period of time, determining, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device, and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.
-
Citations
20 Claims
-
1. A method comprising:
-
receiving, at a data processing apparatus and for each of a plurality of users, user activity data describing a plurality of actions taken by the user by use of a user device over a period of time; determining, by the data processing apparatus, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device; and determining, by the data processing apparatus, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16)
-
-
17. A system comprising:
-
one or more user devices; and a remote server, comprising one or more computing devices and connected to the one or more user devices over a network, that performs operations comprising; receiving, at the remote server and for each of a plurality of users from the one or more user devices, user activity data describing a plurality of actions taken by the user by use of a user device over a period of time; determining, by the remote server, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device; and determining, by the remote server, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation. - View Dependent Claims (18, 20)
-
-
19. A non-transitory computer readable medium storing instructions that when executed by one or more computing devices, cause the one or more computing devices to perform operations comprising:
-
receiving, at the one or more computing devices and for each of a plurality of users, user activity data describing a plurality of actions taken by the user by use of a user device over a period of time; determining, by the one or more computing devices, for each user and based on the actions taken by the user over the period of time and user responsibility data that describe responsibilities of the user, a risk assessment representative of a security risk resulting from the actions taken by the user by use of the user device; and determining, by the one or more computing devices, for each user and based on the risk assessment determined for the user, whether to implement a user-specific remedial action directed to risk mitigation.
-
Specification