Dynamic adjustment of authentication policy
First Claim
1. A computer program product for managing an authentication policy for a user on a network of an organization, the computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions readable by a hardware processor to cause the processing circuit to perform a method comprising:
- determining an organizational role of a user within an organization;
assigning an organizational risk value for the user based on the organizational role of the user, wherein a first organizational role within the organization results in a higher organizational risk value than a second organizational role within the organization;
determining a history of historical violations committed by the user;
assigning a historical risk value based on the history of historical violations committed by the user;
determining at least one social media attribute of the user, the at least one social media attribute comprising at least one of;
how many social media accounts the user has, how many social media postings the user has made, how many social media friends the user has, and one or more associations of social media friends of the user;
assigning a social media risk value based on the at least one social media attribute of the user;
calculating a current risk assessment score of the user based on a weighted combination of the organizational risk value and the historical risk value, and is further based on the social media risk value;
wherein the calculating the current risk assessment score is further based on at least one of;
a number of devices that the user uses to access the network, a type of device that the user uses to access the network, and an operating system running on a device that the user uses to access the network; and
determining the authentication policy for the user based on the current risk assessment score.
2 Assignments
0 Petitions
Accused Products
Abstract
Embodiments relate to managing authentication policies for users on a network of an organization. A computer-implemented method for managing an authentication policy for a user on a network of an organization is provided. The method maintains a current risk assessment score of the user based on an organizational role of the user within the organization and a history of security violations on the network. The method determines the authentication policy for the user based on the current risk assessment score.
-
Citations
16 Claims
-
1. A computer program product for managing an authentication policy for a user on a network of an organization, the computer program product comprising a non-transitory computer readable storage medium having program instructions embodied therewith, the program instructions readable by a hardware processor to cause the processing circuit to perform a method comprising:
-
determining an organizational role of a user within an organization; assigning an organizational risk value for the user based on the organizational role of the user, wherein a first organizational role within the organization results in a higher organizational risk value than a second organizational role within the organization; determining a history of historical violations committed by the user; assigning a historical risk value based on the history of historical violations committed by the user; determining at least one social media attribute of the user, the at least one social media attribute comprising at least one of;
how many social media accounts the user has, how many social media postings the user has made, how many social media friends the user has, and one or more associations of social media friends of the user;assigning a social media risk value based on the at least one social media attribute of the user; calculating a current risk assessment score of the user based on a weighted combination of the organizational risk value and the historical risk value, and is further based on the social media risk value; wherein the calculating the current risk assessment score is further based on at least one of;
a number of devices that the user uses to access the network, a type of device that the user uses to access the network, and an operating system running on a device that the user uses to access the network; anddetermining the authentication policy for the user based on the current risk assessment score. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A computer system for managing an authentication policy for a user on a network of an organization:
-
a memory having computer readable instructions; and a hardware processor configured to execute the computer readable instructions, the instructions comprising; determining an organizational role of a user within an organization; assigning an organizational risk value for the user based on the organizational role of the user, wherein a first organizational role within the organization results in a higher organizational risk value than a second organizational role within the organization; determining a history of historical violations committed by the user; assigning a historical risk value based on the history of historical violations committed by the user; determining at least one social media attribute of the user, the at least one social media attribute comprising at least one of;
how many social media accounts the user has, how many social media postings the user has made, how many social media friends the user has, and one or more associations of social media friends of the user;assigning a social media risk value based on the at least one social media attribute of the user; calculating a current risk assessment score of the user based on a weighted combination of the organizational risk value and the historical risk value, and is further based on the social media risk value; wherein the calculating the current risk assessment score is further based on at least one of;
a number of devices that the user uses to access the network, a type of device that the user uses to access the network, and an operating system running on a device that the user uses to access the network; anddetermining the authentication policy for the user based on the current risk assessment score. - View Dependent Claims (8, 9, 10, 11, 12)
-
-
13. A computer-implemented method for managing an authentication policy for a user on a network of an organization, the method comprising:
-
determining an organizational role of a user within an organization; assigning an organizational risk value for the user based on the organizational role of the user, wherein a first organizational role within the organization results in a higher organizational risk value than a second organizational role within the organization; determining a history of historical violations committed by the user; assigning a historical risk value based on the history of historical violations committed by the user; determining at least one social media attribute of the user, the at least one social media attribute comprising at least one of;
how many social media accounts the user has, how many social media postings the user has made, how many social media friends the user has, and one or more associations of social media friends of the user;assigning a social media risk value based on the at least one social media attribute of the user; calculating, by a hardware processor, a current risk assessment score of the user based on a weighted combination of the organizational risk value and the historical risk value, and is further based on the social media risk value; wherein the calculating the current risk assessment score is further based on at least one of;
a number of devices that the user uses to access the network, a type of device that the user uses to access the network, and an operating system running on a device that the user uses to access the network; anddetermining the authentication policy for the user based on the current risk assessment score. - View Dependent Claims (14, 15, 16)
-
Specification