Social network security monitoring
First Claim
Patent Images
1. A computer-implemented method comprising:
- scanning, by one or more processors, security settings data associated with one or more profiles of a protected social entity on one or more social networks, wherein the security settings data is selected from a group consisting of a password strength, a password uniqueness, and a profile privacy;
assessing the security settings data associated with the one or more profiles of the protected social entity, wherein assessing the security settings data comprises comparing the security settings associated with the one or more profiles of the protected social entity to one or more security settings associated with an expert modeled profile;
determining based on the assessment of the security settings data, a first security risk score for the protected social entity;
providing the first security risk score to the protected social entity;
monitoring the security settings data associated with the one or more profiles of the protected social entity;
identifying one or more changes in the security settings data;
determining based on an assessment of the changed security settings data, a second security risk score;
providing the second security risk score to the protected social entity;
determining one or more changes to the security settings data that lowers the second security score; and
providing, to the protected social entity, a list of the one or more changes to the security settings data that lowers the second security score.
12 Assignments
0 Petitions
Accused Products
Abstract
A computer-implemented method includes security settings data associated with one or more profiles of a protected social entity on one or more social networks is scanned, and the security settings data associated with the one or more profiles of the protected social entity is assessed. A first security risk score for the protected social entity is determined based on the assessment of the security settings data, and the first security risk score is provided to the protected social entity.
-
Citations
17 Claims
-
1. A computer-implemented method comprising:
-
scanning, by one or more processors, security settings data associated with one or more profiles of a protected social entity on one or more social networks, wherein the security settings data is selected from a group consisting of a password strength, a password uniqueness, and a profile privacy; assessing the security settings data associated with the one or more profiles of the protected social entity, wherein assessing the security settings data comprises comparing the security settings associated with the one or more profiles of the protected social entity to one or more security settings associated with an expert modeled profile; determining based on the assessment of the security settings data, a first security risk score for the protected social entity; providing the first security risk score to the protected social entity; monitoring the security settings data associated with the one or more profiles of the protected social entity; identifying one or more changes in the security settings data; determining based on an assessment of the changed security settings data, a second security risk score; providing the second security risk score to the protected social entity; determining one or more changes to the security settings data that lowers the second security score; and providing, to the protected social entity, a list of the one or more changes to the security settings data that lowers the second security score. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 17)
-
-
10. A system comprising:
-
one or more processing devices; and one or more non-transitory computer-readable media coupled to the one or more processing devices having instructions stored thereon which, when executed by the one or more processing devices, cause the one or more processing devices to perform operations comprising; scanning, by one or more processors, security settings data associated with one or more profiles of a protected social entity on one or more social networks, wherein the security settings data is selected from a group consisting of a password strength, a password uniqueness, and a profile privacy; assessing the security settings data associated with the one or more profiles of the protected social entity, wherein assessing the security settings data comprises comparing the security settings associated with the one or more profiles of the protected social entity to one or more security settings associated with an expert modeled profile; determining based on the assessment of the security settings data, a first security risk score for the protected social entity; providing the first security risk score to the protected social entity; monitoring the security settings data associated with the one or more profiles of the protected social entity; identifying one or more changes in the security settings data; determining based on an assessment of the changed security settings data, a second security risk score; providing the second security risk score to the protected social entity; determining one or more changes to the security settings data that lowers the second security score; and providing, to the protected social entity, a list of the one or more changes to the security settings data that lowers the second security score. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A non-transitory computer-readable storage medium storing software comprising instructions executable by one or more computers which, upon such execution, cause the one or more computers to perform operations comprising:
-
scanning, by one or more processors, security settings data associated with one or more profiles of a protected social entity on one or more social networks, wherein the security settings data is selected from a group consisting of a password strength, a password uniqueness, and a profile privacy; and assessing the security settings data associated with the one or more profiles of the protected social entity, wherein assessing the security settings data comprises comparing the security settings associated with the one or more profiles of the protected social entity to one or more security settings associated with an expert modeled profile; determining based on the assessment of the security settings data, a first security risk score for the protected social entity; providing the first security risk score to the protected social entity; monitoring the security settings data associated with the one or more profiles of the protected social entity; identifying one or more changes in the security settings data; determining based on an assessment of the changed security settings data, a second security risk score; providing the second security risk score to the protected social entity; determining one or more changes to the security settings data that lowers the second security score; and providing, to the protected social entity, a list of the one or more changes to the security settings data that lowers the second security score.
-
Specification