METHODS, SYSTEMS, AND MEDIA FOR MEASURING COMPUTER SECURITY
First Claim
Patent Images
1. A method for measuring computer security, comprising:
- making at least one of decoys and non-threatening access violations accessible to a first user using a computer programmed to do so;
maintaining statistics on security violations and non-violations of the first user using a computer programmed to do so; and
presenting the statistics on a display.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods, systems, and media for measuring computer security are provided. In accordance with some embodiments, methods for measuring computer security are provided, the methods comprising: making at least one of decoys and non-threatening access violations accessible to a first user using a computer programmed to do so; maintaining statistics on security violations and non-violations of the first user using a computer programmed to do so; and presenting the statistics on a display.
423 Citations
21 Claims
-
1. A method for measuring computer security, comprising:
-
making at least one of decoys and non-threatening access violations accessible to a first user using a computer programmed to do so; maintaining statistics on security violations and non-violations of the first user using a computer programmed to do so; and presenting the statistics on a display. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. A system for measuring computer security, comprising:
a processor that; makes at least one of decoys and non-threatening access violations accessible to a first user; maintains statistics on security violations and non-violations of the first user; and presents the statistics on a display. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
15. A non-transitory computer-readable medium containing computer-executable instructions that, when executed by a processor, cause the processor to perform a method for measuring computer security, the method comprising:
-
making at least one of decoys and non-threatening access violations accessible to a first user; maintaining statistics on security violations and non-violations of the first user; and presenting the statistics on a display. - View Dependent Claims (16, 17, 18, 19, 20, 21)
-
Specification