US20160226911A1 - Dynamic enterprise security control based on user risk factors - Google Patents
Dynamic enterprise security control based on user risk factors Download PDFInfo
- Publication number
- US20160226911A1 US20160226911A1 US14/613,746 US201514613746A US2016226911A1 US 20160226911 A1 US20160226911 A1 US 20160226911A1 US 201514613746 A US201514613746 A US 201514613746A US 2016226911 A1 US2016226911 A1 US 2016226911A1
- Authority
- US
- United States
- Prior art keywords
- user
- enterprise
- access
- risk
- security
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
- H04L63/107—Network architectures or network communication protocols for network security for controlling access to devices or network resources wherein the security policies are location-dependent, e.g. entities privileges depend on current location or allowing specific operations only from locally connected terminals
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/08—Access security
- H04W12/086—Access security using security domains
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2111—Location-sensitive, e.g. geographical location, GPS
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2149—Restricted operating environment
Definitions
- aspects of the present invention relate to computer and other programmable device security, and more particularly to enterprise level data security software implementations for controlling data access by users via remote-access, converged communications, cloud environment and mobile device and application domains.
- An enterprise may generally refer to a corporation, organization, department or other corporate structure wherein a plurality of different individuals work and function together toward a common purpose.
- Enterprise workspaces may feature local area network (LAN) security configurations that enable the access and sharing of data between enterprise storage devices and the devices of individual data users (employees, team members, consultants, students, etc.) while providing robust protection to secure data from outside access by requests originating outside of the LAN.
- LAN local area network
- users may work from home or other locations away from controlled physical locations defining a controlled workspace within the LAN domain, via a wide variety of remote access and mobile programmable device and application structures.
- Such home and mobile device environments may be outside the control and scope of enterprise security structures, providing greater risk for targeting for corporate espionage and for inadvertent exposure via unsecure network connections and devices.
- Intentional theft of confidential information from home and remote sites is also aided by social media and other public domain resources, which enable the identification of users within an enterprise who may have or have access to assets, such as confidential data and intellectual property.
- the devices and user login accesses of such users may be targeted for theft while in their home office or working via mobile devices off-site.
- the use of mobile devices to access confidential and high value corporate enterprise information is generally increasing.
- Such devices may be owned by an employee or other user, or operated off-premises in an insecure manner, resulting in increasing exposures to risk of physical loss relative to those devices and areas that remain under direct control of a given organization.
- a method for dynamically setting enterprise-level security rules as a function of assessing risk factors associated with a user includes determining risk values for respective ones of different attributes of a user.
- the risk values each represent a likelihood of loss of secure data of an enterprise as a function of association of the respective attribute with the user.
- the risk values are added together to generate a risk factor for the user, which is compared to one or more off-site access threshold values.
- security settings associated with the user are applied and access is granted pursuant to the applied security settings to the user to the enterprise secure data from an off-site location of the user that is not within a local network of the enterprise.
- the method determines whether additional security enhancements applicable to the user and not enabled within the applied security settings are available, and if so iteratively selects ones of the available additional security enhancements, revises the security settings by enabling the selected security enhancements, and revises the risk factor by a risk abrogation value of the selected security enhancement, until either (i) granting access to the user, pursuant to the revised security settings, to the enterprise secure data from the off-site location, in response to determining that the revised risk factor meets the off-site access threshold value(s); or (ii) denying access to the user to the enterprise secure data from the off-site location, in response to determining that there are no additional security enhancements applicable to the user and not enabled within the security settings.
- a method provides a service for dynamically setting enterprise-level security rules as a function of assessing risk factors associated with a user.
- the method includes integrating computer-readable program code into a computer system including hardware processor in circuit communication with computer readable memory and a computer readable storage medium.
- the risk values each represent a likelihood of loss of secure data of an enterprise as a function of association of the respective attribute with the user.
- the computer readable program code includes instructions for execution by the processor that cause the processor to add the risk values together to generate a risk factor for the user, which is compared to one or more off-site access threshold values.
- security settings associated with the user are applied and access is granted pursuant to the applied security settings to the user to the enterprise secure data from an off-site location of the user that is not within a local network of the enterprise.
- the processor determines whether additional security enhancements applicable to the user and not enabled within the applied security settings are available, and if so iteratively selects ones of the available additional security enhancements, revises the security settings by enabling the selected security enhancements, and revises the risk factor by a risk abrogation value of the selected security enhancement, until either (i) granting access to the user, pursuant to the revised security settings, to the enterprise secure data from the off-site location, in response to determining that the revised risk factor meets the off-site access threshold value(s); or (ii) denying access to the user to the enterprise secure data from the off-site location, in response to determining that there are no additional security enhancements applicable to the user and not enabled within the security settings.
- a system has a hardware processor in circuit communication with a computer readable memory and a computer-readable storage medium having program instructions stored thereon.
- the processor executes the program instructions stored on the computer-readable storage medium via the computer readable memory and thereby determines risk values for respective ones of different attributes of a user.
- the risk values each represent a likelihood of loss of secure data of an enterprise as a function of association of the respective attribute with the user.
- the risk values are added together to generate a risk factor for the user, which is compared to one or more off-site access threshold values.
- security settings associated with the user are applied and access is granted pursuant to the applied security settings to the user to the enterprise secure data from an off-site location of the user that is not within a local network of the enterprise.
- the processor determines whether additional security enhancements applicable to the user and not enabled within the applied security settings are available, and if so iteratively selects ones of the available additional security enhancements, revises the security settings by enabling the selected security enhancements, and revises the risk factor by a risk abrogation value of the selected security enhancement, until either (i) granting access to the user, pursuant to the revised security settings, to the enterprise secure data from the off-site location, in response to determining that the revised risk factor meets the off-site access threshold value(s); or (ii) denying access to the user to the enterprise secure data from the off-site location, in response to determining that there are no additional security enhancements applicable to the user and not enabled within the security settings.
- a computer program product for dynamically setting enterprise-level security rules as a function of assessing risk factors associated with a user has a computer-readable storage medium with computer readable program code embodied therewith.
- the computer readable program code includes instructions for execution which cause the processor to determine risk values for respective ones of different attributes of a user.
- the risk values each represent a likelihood of loss of secure data of an enterprise as a function of association of the respective attribute with the user.
- the risk values are added together to generate a risk factor for the user, which is compared to one or more off-site access threshold values.
- security settings associated with the user are applied and access is granted pursuant to the applied security settings to the user to the enterprise secure data from an off-site location of the user that is not within a local network of the enterprise.
- the processor In response to determining that the risk factor does not meet the off-site access threshold value(s), the processor is thereby caused to determine whether additional security enhancements applicable to the user and not enabled within the applied security settings are available, and if so iteratively select ones of the available additional security enhancements, revise the security settings by enabling the selected security enhancements, and revise the risk factor by a risk abrogation value of the selected security enhancement, until either (i) granting access to the user, pursuant to the revised security settings, to the enterprise secure data from the off-site location, in response to determining that the revised risk factor meets the off-site access threshold value(s); or (ii) denying access to the user to the enterprise secure data from the off-site location, in response to determining that there are no additional security enhancements applicable to the user and not enabled within the security settings.
- FIG. 1 depicts a cloud computing node according to an embodiment of the present invention.
- FIG. 2 depicts a cloud computing environment according to an embodiment of the present invention.
- FIG. 3 depicts abstraction model layers according to an embodiment of the present invention.
- FIG. 4 is a flow chart illustration of a method or process layers for dynamically setting enterprise-level off-site security rules for a user as a function of assessing risk factors associated with said user according to an embodiment of the present invention.
- FIG. 5 is a flow chart illustration of another method or process for dynamically setting enterprise-level off-site security rules for a user as a function of assessing risk factors associated with said user according to an embodiment of the present invention.
- FIG. 6 is a graphical, tabular depiction of a software algorithm useful for setting a risk factor from positive risk values and negative security abrogation values according to an embodiment of the present invention.
- the present invention may be a system, a method, and/or a computer program product.
- the computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
- the computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device.
- the computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
- a non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing.
- RAM random access memory
- ROM read-only memory
- EPROM or Flash memory erasable programmable read-only memory
- SRAM static random access memory
- CD-ROM compact disc read-only memory
- DVD digital versatile disk
- memory stick a floppy disk
- a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon
- a computer readable storage medium is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
- Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network.
- the network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers.
- a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
- Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
- the computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
- the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
- electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
- These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
- These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
- the computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
- each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s).
- the functions noted in the block may occur out of the order noted in the figures.
- two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
- Cloud computing is a model of service delivery for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service.
- This cloud model may include at least five characteristics, at least three service models, and at least four deployment models.
- On-demand self-service a cloud consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with the service's provider.
- Resource pooling the provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to demand. There is a sense of location independence in that the consumer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter).
- Rapid elasticity capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
- Measured service cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.
- level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts).
- SaaS Software as a Service: the capability provided to the consumer is to use the provider's applications running on a cloud infrastructure.
- the applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based e-mail).
- a web browser e.g., web-based e-mail
- the consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
- PaaS Platform as a Service
- the consumer does not manage or control the underlying cloud infrastructure including networks, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.
- IaaS Infrastructure as a Service
- the consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).
- Private cloud the cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on-premises or off-premises.
- Public cloud the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
- Hybrid cloud the cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).
- a cloud computing environment is service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability.
- An infrastructure comprising a network of interconnected nodes.
- Cloud computing node 10 is only one example of a suitable cloud computing node and is not intended to suggest any limitation as to the scope of use or functionality of embodiments of the invention described herein. Regardless, cloud computing node 10 is capable of being implemented and/or performing any of the functionality set forth hereinabove.
- cloud computing node 10 there is a computer system/server 12 , which is operational with numerous other general purpose or special purpose computing system environments or configurations.
- Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with computer system/server 12 include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputer systems, mainframe computer systems, and distributed cloud computing environments that include any of the above systems or devices, and the like.
- Computer system/server 12 may be described in the general context of computer system-executable instructions, such as program modules, being executed by a computer system.
- program modules may include routines, programs, objects, components, logic, data structures, and so on that perform particular tasks or implement particular abstract data types.
- Computer system/server 12 may be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network.
- program modules may be located in both local and remote computer system storage media including memory storage devices.
- computer system/server 12 in cloud computing node 10 is shown in the form of a general-purpose computing device.
- the components of computer system/server 12 may include, but are not limited to, one or more processors or processing units 16 , a system memory 28 , and a bus 18 that couples various system components including system memory 28 to processor 16 .
- Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures.
- bus architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnects (PCI) bus.
- Computer system/server 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 12 , and it includes both volatile and non-volatile media, removable and non-removable media.
- System memory 28 can include computer system readable media in the form of volatile memory, such as random access memory (RAM) 30 and/or cache memory 32 .
- Computer system/server 12 may further include other removable/non-removable, volatile/non-volatile computer system storage media.
- storage system 34 can be provided for reading from and writing to a non-removable, non-volatile magnetic media (not shown and typically called a “hard drive”).
- a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”).
- an optical disk drive for reading from or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM or other optical media can be provided.
- memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
- Program/utility 40 having a set (at least one) of program modules 42 , may be stored in memory 28 by way of example, and not limitation, as well as an operating system, one or more application programs, other program modules, and program data. Each of the operating system, one or more application programs, other program modules, and program data or some combination thereof, may include an implementation of a networking environment.
- Program modules 42 generally carry out the functions and/or methodologies of embodiments of the invention as described herein.
- Computer system/server 12 may also communicate with one or more external devices 14 such as a keyboard, a pointing device, a display 24 , etc.; one or more devices that enable a user to interact with computer system/server 12 ; and/or any devices (e.g., network card, modem, etc.) that enable computer system/server 12 to communicate with one or more other computing devices. Such communication can occur via Input/Output (I/O) interfaces 22 . Still yet, computer system/server 12 can communicate with one or more networks such as a local area network (LAN), a general wide area network (WAN), and/or a public network (e.g., the Internet) via network adapter 20 .
- LAN local area network
- WAN wide area network
- public network e.g., the Internet
- network adapter 20 communicates with the other components of computer system/server 12 via bus 18 .
- bus 18 It should be understood that although not shown, other hardware and/or software components could be used in conjunction with computer system/server 12 . Examples, include, but are not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data archival storage systems, etc.
- cloud computing environment 50 comprises one or more cloud computing nodes 10 with which local computing devices used by cloud consumers, such as, for example, personal digital assistant (PDA) or cellular telephone 54 A, desktop computer 54 B, laptop computer 54 C, and/or automobile computer system 54 N may communicate.
- Nodes 10 may communicate with one another. They may be grouped (not shown) physically or virtually, in one or more networks, such as Private, Community, Public, or Hybrid clouds as described hereinabove, or a combination thereof.
- This allows cloud computing environment 50 to offer infrastructure, platforms and/or software as services for which a cloud consumer does not need to maintain resources on a local computing device.
- computing devices 54 A-N shown in FIG. 2 are intended to be illustrative only and that computing nodes 10 and cloud computing environment 50 can communicate with any type of computerized device over any type of network and/or network addressable connection (e.g., using a web browser).
- FIG. 3 a set of functional abstraction layers provided by cloud computing environment 50 ( FIG. 2 ) is shown. It should be understood in advance that the components, layers, and functions shown in FIG. 3 are intended to be illustrative only and embodiments of the invention are not limited thereto. As depicted, the following layers and corresponding functions are provided:
- Hardware and software layer 60 includes hardware and software components.
- hardware components include: mainframes 61 ; RISC (Reduced Instruction Set Computer) architecture based servers 62 ; servers 63 ; blade servers 64 ; storage devices 65 ; and networks and networking components 66 .
- software components include network application server software 67 and database software 68 .
- Virtualization layer 70 provides an abstraction layer from which the following examples of virtual entities may be provided: virtual servers 71 ; virtual storage 72 ; virtual networks 73 , including virtual private networks; virtual applications and operating systems 74 ; and virtual clients 75 .
- management layer 80 may provide the functions described below.
- Resource provisioning 81 provides dynamic procurement of computing resources and other resources that are utilized to perform tasks within the cloud computing environment.
- Metering and Pricing 82 provide cost tracking as resources are utilized within the cloud computing environment, and billing or invoicing for consumption of these resources. In one example, these resources may comprise application software licenses.
- Security provides identity verification for cloud consumers and tasks, as well as protection for data and other resources, implementing aspects of the present invention described below that dynamically set enterprise-level security rules for a user as a function of assessing risk factors associated with said user.
- User portal 83 provides access to the cloud computing environment for consumers and system administrators.
- Service level management 84 provides cloud computing resource allocation and management such that required service levels are met.
- Service Level Agreement (SLA) planning and fulfillment 85 provide pre-arrangement for, and procurement of, cloud computing resources for which a future requirement is anticipated in accordance with an SLA.
- SLA Service Level Agreement
- Workloads layer 90 provides examples of functionality for which the cloud computing environment may be utilized. Examples of workloads and functions which may be provided from this layer include: mapping and navigation 91 ; software development and lifecycle management 92 ; virtual classroom education delivery 93 ; data analytics processing 94 ; transaction processing 95 ; and mobile desktop 96 .
- a service provider may perform process steps of the invention on a subscription, advertising, and/or fee basis. That is, a service provider could offer to integrate computer readable program code into the computer system/server 12 to enable the computer system/server 12 to perform process steps of the invention.
- the service provider can create, maintain, and support, etc., a computer infrastructure, such as the computer system 12 , bus 18 , or parts thereof, to perform the process steps of the invention for one or more customers.
- the service provider can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service provider can receive payment from the sale of advertising content to one or more third parties.
- Services may include one or more of: (1) installing program code on a computing device, such as the computer device 12 , from a tangible computer readable medium device 34 ; (2) adding one or more computing devices to the computer infrastructure 10 ; and (3) incorporating and/or modifying one or more existing systems 12 of the computer infrastructure 10 to enable the computer infrastructure 10 to perform process steps of the invention.
- FIG. 4 illustrates a method or process of an aspect of the present invention for dynamically setting enterprise-level off-site security rules for a user as a function of assessing risk factors associated with said user.
- user is used herein generically to refer to anybody (for example, member, employee, student, associate, partner, user, consultant, team member, user, etc.) who possesses or has access to secure or confidential enterprise data off the enterprise via networked devices or user login credentials.
- a server processor for example, a central processing unit (CPU) executes code (for example, code installed on a storage device in communication with the processor) and thereby assigns or determines each of a plurality of individual, different risk values for respective ones of a plurality of different attributes of a user.
- the risk values each represent a likelihood of loss of secure data of an enterprise that are presented to the enterprise as a function of association of the individual attributes with the user.
- the values may be set at 102 as a function of the presence of specified other ones of the attributes of the user, wherein the presence or absence of another of the attributes may cause a change in value of the risk values.
- the determinations at 102 may be in response to a request by the user for access to the secure data, or to another prompt, such as a periodic security audit prompt, change in title or workgroup assignment of the user within the enterprise, a report of a loss of a device by the user that has secure enterprise data or login information, an attack on the user's device or login credentials via a virus or third party, and still others will be apparent to one skilled in the art.
- Illustrative but not limiting or exhaustive examples of the secure data include trade secret, patent and other intellectual property data that is confidential, unpublished or secure and has value to the enterprise via maintaining the secure and non-public nature of the data.
- the process of FIG. 4 selects from a collection of person attributes, the attributes of interest to the organization, and for each person attribute of interest, assigns a risk value at 102 .
- the enterprise-level attributes considered at 102 are relevant to access to the enterprise data as defined from a perspective (or point of view) of the enterprise, and not from (and may be independent of) any particular end point used by the user for the data storage or access. The following are illustrative but not limiting or exhaustive examples of the enterprise-level attributes:
- the processor of the process at 102 may extract or otherwise identify location context data that identifies a current geographic location of a user, or a domain used by the user to access the secure enterprise data, including the GPS (Geographic Positioning Satellite) coordinates of a mobile programmable device used by the user, in some aspects to identify a nation or other specific area, in order to compare the identified nation or area to known data export restrictions or correlation with historic espionage activities.
- location context data that identifies a current geographic location of a user, or a domain used by the user to access the secure enterprise data, including the GPS (Geographic Positioning Satellite) coordinates of a mobile programmable device used by the user, in some aspects to identify a nation or other specific area, in order to compare the identified nation or area to known data export restrictions or correlation with historic espionage activities.
- Attributes of the data storage device (for example, is the data encrypted with a key or other structure known only by an enterprise application, encrypted by a third party application selected by a user and outside the control of the enterprise, or unencrypted).
- Attributes of the user application used for the access request (hosted on-sight by the server, or off-site by another server or device, or security rating of the hosting infrastructure).
- a time of access risk value may be generated for the user in response to determining that a time of a request by the user to access the enterprise secure data is outside of historical time periods encompassing past, authorized accesses to the enterprise secure data.
- payroll data may be typically accessed bi-weekly on Monday mornings after 8:00 AM and no later than 11:00 AM of a time zone of an enterprise workspace, wherein access outside of this range of days and time may be indicative of an improper request.
- security permissions and other settings are set for off-site access, defined generally as home office, mobile device, remote log in, third party site LAN access, or other accesses located outside of an enterprise workspace LAN) to the secure data by the user as a function of aggregating the risk values at 104 into an overall “risk factor” for that user, which signifies an aggregate measure of risk for the user.
- risk values determined at 102 are positive numerical values, they may be added together at 104 to determine the risk factor value at 104 .
- Aggregate risk factors may be set or adjusted or weighted at 104 as a function of the presence or values of specific attribute risk values relative to other ones. This recognizes that attribute risk values considered in combination may indicate skills or competency, or a lack thereof, which makes the user more or less susceptible to security breaches. For example, a history or frequency of past reports of lost or stolen devices (e.g. laptops, phones, tablets) may be correlated to travel or location context in common with locations of reported losses and thefts, triggering an increase in risk values (or an aggregate risk factor determined therefrom) for a current location of the user's remote domain or device location when seeking access to the secure data, relative to the risk value assigned to said location without the context of the prior loss/theft activity.
- lost or stolen devices e.g. laptops, phones, tablets
- Occurrences or frequencies of virus infections in combination with a history of password reset occupancies (indicating lost or forgotten passwords) or authentication breaches recorded (for example, someone guessing a password and accessing a system without the user's knowledge) may also result in increasing risk values determined for home or mobile location attributes, as distinguished from risk values otherwise assigned to said current home or mobile location attributes.
- the process determines if the risk factor (or an individual attribute risk value) meets a threshold condition (value) for enabling the user to access secure data of the enterprise from an “off-site location,” namely outside of an enterprise LAN and the security structures presented thereby. If the threshold condition is met at 106 , then at 109 access is granted to the secure data by the user from the off-site location via current security settings (including procedures) in place for the user (for example, standard password login procedures and reauthorization time periods to prompt password re-entry, etc.).
- a threshold condition value
- the process determines whether additional (thus far unselected) security enhancements are available to modify the security settings applicable for the secure data access for this user (applicable to the user). If none are available at 110 , then access is denied for the off-site access at 114 . However, if additional (unselected) security enhancements are available, then one or more are selected to revise enterprise security settings for granting off-site access at 116 .
- the selected enhancements may revise, replace or augment existing security settings currently applicable to the user while working on-site, as implemented to authorize the respective home or mobile access.
- Each of the security enhancements selected at 116 are associated with a risk abrogation value, and at 120 the risk factor is recalculated in response to subtracting the security abrogation values assigned to the selected enhancements at 116 from a current value of the risk factor.
- the revised risk factor is again compared to the off-site access threshold at 106 in order to determine whether to grant access at 109 as a function of implementing the selected security enhancements.
- the process is iterative, so that where the risk values determined at 102 are positive numerical values that are added together at 104 to determine the risk factor value at 104 , the security abrogation values may be negative numerical values that are added to the risk factor in each iteration at 120 to reduce the (revised) risk factor until it meets the respective, applied one or more security threshold values at a subsequent iteration of step 106 .
- Security enhancements selected and imposed at 116 to enable off-site access may include additional or stronger password requirements, increasing the frequency of locking applications and requiring reentry of passwords to continue data access, and limiting access to certain information or applications that are available to the user on site of the enterprise.
- FIG. 5 illustrates another aspect that considers some off-site locations (in this example, a home office) more secure than another, more public mobile locations (here generically referred to as “mobile”).
- a processor determines if the risk factor determined via the steps/processes 102 and 104 discussed above meets a threshold condition (value) for enabling the user to work from “home” at 206 (signifying access to an enterprise LAN and data thereon off-site from a location determined to be within a home network location of the user), and at 208 if the risk factor (and/or individual attribute risk value) meets a threshold condition (value) for enabling the user to work from a “mobile” location (signifying access to the enterprise LAN and data thereon off-site from another location that is not within the home network location).
- a threshold condition value
- FIG. 5 differentiates home and mobile access for the purposes of selecting appropriate enhancements as needed at steps 210 or 212 , respectively, in order to tailor or target the enhancements to differences in threat exposures or the levels thereof that are presented at these different domains. It will be appreciated by one skilled in the art that other criteria may be used to treat different off-site locations with different security procedures, and the present example is illustrative but not exhaustive of aspects of the present invention.
- the enterprise grants access to the secure data by the user from the applicable home or mobile location at 209 via current security settings in place for the user.
- the process determines whether additional (thus far unselected) security enhancements are available to modify the security settings applicable for the respective home and mobile access. If none are available at 210 or 212 , then access is denied for the respective home or mobile access at 209 .
- additional (unselected) security enhancements are available, then one or more are selected to revise enterprise security settings for granting home access at 216 and/or for granting mobile access at 218 .
- the enhancements may revise, replace or augment existing security settings currently applicable to the user while working on-site, as implemented to authorize the respective home or mobile access.
- Each of the security enhancements selected at 216 or 218 are associated with a risk abrogation value, and at 220 and 222 the risk factor is recalculated in response to the security abrogation values assigned to the selected enhancements at 216 or 218 .
- the revised risk factor is again compared to the home access threshold at 206 or to the mobile access threshold at 208 in order to determine whether to grant access at 209 as a function of implementing the selected security enhancements.
- the security abrogation values may be negative numerical values that are added to the risk factor at 220 and 222 to reduce the (revised) risk factor until it meets the respective, applied one or more security threshold values at 206 and 208 .
- security enhancements selected and imposed at 216 to enable home access include additional or stronger password requirements, increasing the frequency of locking applications and requiring reentry of passwords to continue data access, and limiting access to certain information or applications that are available to the user on site of the enterprise.
- Enhancements selected and imposed at 218 to enable mobile access include higher, more restrictive levels of the security measures imposed for home access at 216 (for example, shorter time periods between requiring password reentry), as well as sending a signal to the user's mobile device to turn off USB ports and BlueToothTM connections, forcing a virus scan to be executed on the device (which may execute in the background and unknown to the user) or decreasing periodicity between scheduled executions, and in some instances shutting down the computer or its access to enterprise data of concern until location data indicates it is relocated to a more secure location, such as on the home network or within a workplace or other enterprise LAN location.
- BLUETOOTH is a trademark of Bluetooth SIG, Inc., in the United States or other countries.
- a distinguished engineer in a micro-chip tech company is working on the next microprocessor.
- Risk values assigned to the person's title, his or her level of social media information activity, pay information, etc. aggregate to a high risk factor value that fails the threshold comparisons at 206 or 208 , pointing both to an importance of his or her role, and indicating too high of a risk to theft exposure, wherein an enhancement selected at 210 entirely prevents access to some types of sensitive data by this person while working from home via access granted at 214 in a subsequent iteration of the threshold comparison at 206 .
- current security methods may be modified so that authentication is more secure.
- this distinguished engineer may have policies on his or her laptop updated to require an inactivity password lockout to occur every 10 minutes while using home access, rather than the standard 30 minutes which would be in effect if he or she were working from the work office. Further, while in the office and using a company provided desktop, the distinguished engineer may be granted access to “n” applications and “y” instances of information, but wherein an enhancement selected at 216 causes an enterprise security system to limit access granted at 209 at home to only a few (subset) of the “n” applications and only a few (subset) of the “y” instances of information.
- Determination of the risk factor at 104 and the imposition of security enhancements at 116 , 216 and 218 in response to the comparison of the applicable thresholds at 106 , 206 and 208 are functions of considerations of quantifiable, measurable characteristics which make individuals more or less prone to corporate espionage, information loss or exposure.
- a first company with lots of trade secrets may assign higher risk value to titles of users that have access to trade secrets than the values assigned to comparable titles within a second that has fewer trade secrets.
- Another company may assign differentiated risk values to different positions within the company.
- a risk value assigned to the position of janitor in combination with a risk value assigned to possession of a physical key to a sensitive location by the janitor and a risk value created by a history of several security incidents on premises occupied by the janitor, may result in a first risk factor determined for the janitor that is higher than a second risk factor determined for a senior vice president as a function of a risk value associated with the senior vice president title and another risk value assigned to a level of access to trade secrets of the enterprise by this title.
- a third risk factor value determined for the janitor where the facility has no history of access incidents may be lower (less risky) than a fourth risk factor determined for the senior vice president, even if the senior vice president has a risk value signifying no access to sensitive information, but wherein the senior vice president works at a location with a history of many incidents, which triggers a high value for workplace location security risk that is used to calculate the senior vice president risk factor, or to determine the aggregated risk factor therefrom.
- the distribution of security risk values to attributes, and their aggregation into total or composite risk factors for any user may be customizable by any given enterprise in response to their unique business context.
- FIG. 6 is an exemplary tabular illustration of one software algorithm useful for setting the risk factor from positive risk values and negative security abrogation values.
- negative security enhancements that are selected at 116 , 216 or 218 and their associated security abrogation values include Decrease login inactivity time-out, ⁇ 4; Use two factor authentication, ⁇ 15; Move to a closed office space, ⁇ 5; Turn encryption on for all email communication, ⁇ 8; Agree to restrict access to USB and DVD devices, ⁇ 4; Restrict or prevent access to a sensitive application, ⁇ 8; Restrict or prevent access to sensitive data, ⁇ 7; Allow access to applications or information only from a device with certain specific security controls, ⁇ 9; Allow access to applications or information only if thru a specific VPN, ⁇ 11; Add an HDD password at power on, ⁇ 10; and if Executive works from home and risk value reaches a set risk threshold, the business automatically provides and pays for home security system if one does not exist, ⁇ 5.
- Determining a risk reduction value for each security action selected may be a function of a specified or determined order of application of security actions for automatic selection. For example, increase password length in a first iteration of 116 , 216 or 218 , restrict granted access to the lowest value information in a second iteration, restrict access to the next lowest value information in a third iteration, and restrict access to application “abc” in a fourth iteration.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Human Resources & Organizations (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- General Health & Medical Sciences (AREA)
- Marketing (AREA)
- Health & Medical Sciences (AREA)
- Tourism & Hospitality (AREA)
- Operations Research (AREA)
- Quality & Reliability (AREA)
- Development Economics (AREA)
- Educational Administration (AREA)
- Game Theory and Decision Science (AREA)
- Primary Health Care (AREA)
- Databases & Information Systems (AREA)
- Bioethics (AREA)
- Software Systems (AREA)
- Mobile Radio Communication Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
- Aspects of the present invention relate to computer and other programmable device security, and more particularly to enterprise level data security software implementations for controlling data access by users via remote-access, converged communications, cloud environment and mobile device and application domains.
- An enterprise may generally refer to a corporation, organization, department or other corporate structure wherein a plurality of different individuals work and function together toward a common purpose. Enterprise workspaces may feature local area network (LAN) security configurations that enable the access and sharing of data between enterprise storage devices and the devices of individual data users (employees, team members, consultants, students, etc.) while providing robust protection to secure data from outside access by requests originating outside of the LAN. However, such users may work from home or other locations away from controlled physical locations defining a controlled workspace within the LAN domain, via a wide variety of remote access and mobile programmable device and application structures. Such home and mobile device environments may be outside the control and scope of enterprise security structures, providing greater risk for targeting for corporate espionage and for inadvertent exposure via unsecure network connections and devices.
- Intentional theft of confidential information from home and remote sites is also aided by social media and other public domain resources, which enable the identification of users within an enterprise who may have or have access to assets, such as confidential data and intellectual property. Thus, the devices and user login accesses of such users may be targeted for theft while in their home office or working via mobile devices off-site. The use of mobile devices to access confidential and high value corporate enterprise information is generally increasing. Such devices may be owned by an employee or other user, or operated off-premises in an insecure manner, resulting in increasing exposures to risk of physical loss relative to those devices and areas that remain under direct control of a given organization.
- In one aspect of the present invention, a method for dynamically setting enterprise-level security rules as a function of assessing risk factors associated with a user includes determining risk values for respective ones of different attributes of a user. The risk values each represent a likelihood of loss of secure data of an enterprise as a function of association of the respective attribute with the user. The risk values are added together to generate a risk factor for the user, which is compared to one or more off-site access threshold values. In response to determining that the risk factor meets the off-site access threshold value(s), security settings associated with the user are applied and access is granted pursuant to the applied security settings to the user to the enterprise secure data from an off-site location of the user that is not within a local network of the enterprise. In response to determining that the risk factor does not meet the off-site access threshold value(s), the method determines whether additional security enhancements applicable to the user and not enabled within the applied security settings are available, and if so iteratively selects ones of the available additional security enhancements, revises the security settings by enabling the selected security enhancements, and revises the risk factor by a risk abrogation value of the selected security enhancement, until either (i) granting access to the user, pursuant to the revised security settings, to the enterprise secure data from the off-site location, in response to determining that the revised risk factor meets the off-site access threshold value(s); or (ii) denying access to the user to the enterprise secure data from the off-site location, in response to determining that there are no additional security enhancements applicable to the user and not enabled within the security settings.
- In another aspect, a method provides a service for dynamically setting enterprise-level security rules as a function of assessing risk factors associated with a user. The method includes integrating computer-readable program code into a computer system including hardware processor in circuit communication with computer readable memory and a computer readable storage medium. The risk values each represent a likelihood of loss of secure data of an enterprise as a function of association of the respective attribute with the user. The computer readable program code includes instructions for execution by the processor that cause the processor to add the risk values together to generate a risk factor for the user, which is compared to one or more off-site access threshold values. In response to determining that the risk factor meets the off-site access threshold value(s), security settings associated with the user are applied and access is granted pursuant to the applied security settings to the user to the enterprise secure data from an off-site location of the user that is not within a local network of the enterprise. In response to determining that the risk factor does not meet the off-site access threshold value(s), the processor determines whether additional security enhancements applicable to the user and not enabled within the applied security settings are available, and if so iteratively selects ones of the available additional security enhancements, revises the security settings by enabling the selected security enhancements, and revises the risk factor by a risk abrogation value of the selected security enhancement, until either (i) granting access to the user, pursuant to the revised security settings, to the enterprise secure data from the off-site location, in response to determining that the revised risk factor meets the off-site access threshold value(s); or (ii) denying access to the user to the enterprise secure data from the off-site location, in response to determining that there are no additional security enhancements applicable to the user and not enabled within the security settings.
- In another aspect, a system has a hardware processor in circuit communication with a computer readable memory and a computer-readable storage medium having program instructions stored thereon. The processor executes the program instructions stored on the computer-readable storage medium via the computer readable memory and thereby determines risk values for respective ones of different attributes of a user. The risk values each represent a likelihood of loss of secure data of an enterprise as a function of association of the respective attribute with the user. The risk values are added together to generate a risk factor for the user, which is compared to one or more off-site access threshold values. In response to determining that the risk factor meets the off-site access threshold value(s), security settings associated with the user are applied and access is granted pursuant to the applied security settings to the user to the enterprise secure data from an off-site location of the user that is not within a local network of the enterprise. In response to determining that the risk factor does not meet the off-site access threshold value(s), the processor determines whether additional security enhancements applicable to the user and not enabled within the applied security settings are available, and if so iteratively selects ones of the available additional security enhancements, revises the security settings by enabling the selected security enhancements, and revises the risk factor by a risk abrogation value of the selected security enhancement, until either (i) granting access to the user, pursuant to the revised security settings, to the enterprise secure data from the off-site location, in response to determining that the revised risk factor meets the off-site access threshold value(s); or (ii) denying access to the user to the enterprise secure data from the off-site location, in response to determining that there are no additional security enhancements applicable to the user and not enabled within the security settings.
- In another aspect, a computer program product for dynamically setting enterprise-level security rules as a function of assessing risk factors associated with a user has a computer-readable storage medium with computer readable program code embodied therewith. The computer readable program code includes instructions for execution which cause the processor to determine risk values for respective ones of different attributes of a user. The risk values each represent a likelihood of loss of secure data of an enterprise as a function of association of the respective attribute with the user. The risk values are added together to generate a risk factor for the user, which is compared to one or more off-site access threshold values. In response to determining that the risk factor meets the off-site access threshold value(s), security settings associated with the user are applied and access is granted pursuant to the applied security settings to the user to the enterprise secure data from an off-site location of the user that is not within a local network of the enterprise. In response to determining that the risk factor does not meet the off-site access threshold value(s), the processor is thereby caused to determine whether additional security enhancements applicable to the user and not enabled within the applied security settings are available, and if so iteratively select ones of the available additional security enhancements, revise the security settings by enabling the selected security enhancements, and revise the risk factor by a risk abrogation value of the selected security enhancement, until either (i) granting access to the user, pursuant to the revised security settings, to the enterprise secure data from the off-site location, in response to determining that the revised risk factor meets the off-site access threshold value(s); or (ii) denying access to the user to the enterprise secure data from the off-site location, in response to determining that there are no additional security enhancements applicable to the user and not enabled within the security settings.
- These and other features of embodiments of the present invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings in which:
-
FIG. 1 depicts a cloud computing node according to an embodiment of the present invention. -
FIG. 2 depicts a cloud computing environment according to an embodiment of the present invention. -
FIG. 3 depicts abstraction model layers according to an embodiment of the present invention. -
FIG. 4 is a flow chart illustration of a method or process layers for dynamically setting enterprise-level off-site security rules for a user as a function of assessing risk factors associated with said user according to an embodiment of the present invention. -
FIG. 5 is a flow chart illustration of another method or process for dynamically setting enterprise-level off-site security rules for a user as a function of assessing risk factors associated with said user according to an embodiment of the present invention. -
FIG. 6 is a graphical, tabular depiction of a software algorithm useful for setting a risk factor from positive risk values and negative security abrogation values according to an embodiment of the present invention. - The present invention may be a system, a method, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
- The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
- Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
- Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
- Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
- These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
- The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
- The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
- It is understood in advance that although this disclosure includes a detailed description on cloud computing, implementation of the teachings recited herein are not limited to a cloud computing environment. Rather, embodiments of the present invention are capable of being implemented in conjunction with any other type of computing environment now known or later developed.
- Cloud computing is a model of service delivery for enabling convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, network bandwidth, servers, processing, memory, storage, applications, virtual machines, and services) that can be rapidly provisioned and released with minimal management effort or interaction with a provider of the service. This cloud model may include at least five characteristics, at least three service models, and at least four deployment models.
- Characteristics are as follows:
- On-demand self-service: a cloud consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with the service's provider.
- Broad network access: capabilities are available over a network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, laptops, and PDAs).
- Resource pooling: the provider's computing resources are pooled to serve multiple consumers using a multi-tenant model, with different physical and virtual resources dynamically assigned and reassigned according to demand. There is a sense of location independence in that the consumer generally has no control or knowledge over the exact location of the provided resources but may be able to specify location at a higher level of abstraction (e.g., country, state, or datacenter).
- Rapid elasticity: capabilities can be rapidly and elastically provisioned, in some cases automatically, to quickly scale out and rapidly released to quickly scale in. To the consumer, the capabilities available for provisioning often appear to be unlimited and can be purchased in any quantity at any time.
- Measured service: cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported providing transparency for both the provider and consumer of the utilized service.
- Service Models are as follows:
- Software as a Service (SaaS): the capability provided to the consumer is to use the provider's applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a web browser (e.g., web-based e-mail). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user-specific application configuration settings.
- Platform as a Service (PaaS): the capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including networks, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations.
- Infrastructure as a Service (IaaS): the capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls).
- Deployment Models are as follows:
- Private cloud: the cloud infrastructure is operated solely for an organization. It may be managed by the organization or a third party and may exist on-premises or off-premises.
- Community cloud: the cloud infrastructure is shared by several organizations and supports a specific community that has shared concerns (e.g., mission, security requirements, policy, and compliance considerations). It may be managed by the organizations or a third party and may exist on-premises or off-premises.
- Public cloud: the cloud infrastructure is made available to the general public or a large industry group and is owned by an organization selling cloud services.
- Hybrid cloud: the cloud infrastructure is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together by standardized or proprietary technology that enables data and application portability (e.g., cloud bursting for load-balancing between clouds).
- A cloud computing environment is service oriented with a focus on statelessness, low coupling, modularity, and semantic interoperability. At the heart of cloud computing is an infrastructure comprising a network of interconnected nodes.
- Referring now to
FIG. 1 , a schematic of an example of a cloud computing node is shown.Cloud computing node 10 is only one example of a suitable cloud computing node and is not intended to suggest any limitation as to the scope of use or functionality of embodiments of the invention described herein. Regardless,cloud computing node 10 is capable of being implemented and/or performing any of the functionality set forth hereinabove. - In
cloud computing node 10 there is a computer system/server 12, which is operational with numerous other general purpose or special purpose computing system environments or configurations. Examples of well-known computing systems, environments, and/or configurations that may be suitable for use with computer system/server 12 include, but are not limited to, personal computer systems, server computer systems, thin clients, thick clients, hand-held or laptop devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputer systems, mainframe computer systems, and distributed cloud computing environments that include any of the above systems or devices, and the like. - Computer system/
server 12 may be described in the general context of computer system-executable instructions, such as program modules, being executed by a computer system. Generally, program modules may include routines, programs, objects, components, logic, data structures, and so on that perform particular tasks or implement particular abstract data types. Computer system/server 12 may be practiced in distributed cloud computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed cloud computing environment, program modules may be located in both local and remote computer system storage media including memory storage devices. - As shown in
FIG. 1 , computer system/server 12 incloud computing node 10 is shown in the form of a general-purpose computing device. The components of computer system/server 12 may include, but are not limited to, one or more processors orprocessing units 16, asystem memory 28, and abus 18 that couples various system components includingsystem memory 28 toprocessor 16. -
Bus 18 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, and not limitation, such architectures include Industry Standard Architecture (ISA) bus, Micro Channel Architecture (MCA) bus, Enhanced ISA (EISA) bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnects (PCI) bus. - Computer system/
server 12 typically includes a variety of computer system readable media. Such media may be any available media that is accessible by computer system/server 12, and it includes both volatile and non-volatile media, removable and non-removable media. -
System memory 28 can include computer system readable media in the form of volatile memory, such as random access memory (RAM) 30 and/orcache memory 32. Computer system/server 12 may further include other removable/non-removable, volatile/non-volatile computer system storage media. By way of example only,storage system 34 can be provided for reading from and writing to a non-removable, non-volatile magnetic media (not shown and typically called a “hard drive”). Although not shown, a magnetic disk drive for reading from and writing to a removable, non-volatile magnetic disk (e.g., a “floppy disk”), and an optical disk drive for reading from or writing to a removable, non-volatile optical disk such as a CD-ROM, DVD-ROM or other optical media can be provided. In such instances, each can be connected tobus 18 by one or more data media interfaces. As will be further depicted and described below,memory 28 may include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention. - Program/
utility 40, having a set (at least one) ofprogram modules 42, may be stored inmemory 28 by way of example, and not limitation, as well as an operating system, one or more application programs, other program modules, and program data. Each of the operating system, one or more application programs, other program modules, and program data or some combination thereof, may include an implementation of a networking environment.Program modules 42 generally carry out the functions and/or methodologies of embodiments of the invention as described herein. - Computer system/
server 12 may also communicate with one or moreexternal devices 14 such as a keyboard, a pointing device, adisplay 24, etc.; one or more devices that enable a user to interact with computer system/server 12; and/or any devices (e.g., network card, modem, etc.) that enable computer system/server 12 to communicate with one or more other computing devices. Such communication can occur via Input/Output (I/O) interfaces 22. Still yet, computer system/server 12 can communicate with one or more networks such as a local area network (LAN), a general wide area network (WAN), and/or a public network (e.g., the Internet) vianetwork adapter 20. As depicted,network adapter 20 communicates with the other components of computer system/server 12 viabus 18. It should be understood that although not shown, other hardware and/or software components could be used in conjunction with computer system/server 12. Examples, include, but are not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data archival storage systems, etc. - Referring now to
FIG. 2 , illustrativecloud computing environment 50 is depicted. As shown,cloud computing environment 50 comprises one or morecloud computing nodes 10 with which local computing devices used by cloud consumers, such as, for example, personal digital assistant (PDA) orcellular telephone 54A,desktop computer 54B,laptop computer 54C, and/orautomobile computer system 54N may communicate.Nodes 10 may communicate with one another. They may be grouped (not shown) physically or virtually, in one or more networks, such as Private, Community, Public, or Hybrid clouds as described hereinabove, or a combination thereof. This allowscloud computing environment 50 to offer infrastructure, platforms and/or software as services for which a cloud consumer does not need to maintain resources on a local computing device. It is understood that the types ofcomputing devices 54A-N shown inFIG. 2 are intended to be illustrative only and thatcomputing nodes 10 andcloud computing environment 50 can communicate with any type of computerized device over any type of network and/or network addressable connection (e.g., using a web browser). - Referring now to
FIG. 3 , a set of functional abstraction layers provided by cloud computing environment 50 (FIG. 2 ) is shown. It should be understood in advance that the components, layers, and functions shown inFIG. 3 are intended to be illustrative only and embodiments of the invention are not limited thereto. As depicted, the following layers and corresponding functions are provided: - Hardware and
software layer 60 includes hardware and software components. Examples of hardware components include:mainframes 61; RISC (Reduced Instruction Set Computer) architecture basedservers 62;servers 63;blade servers 64;storage devices 65; and networks andnetworking components 66. In some embodiments, software components include networkapplication server software 67 anddatabase software 68. -
Virtualization layer 70 provides an abstraction layer from which the following examples of virtual entities may be provided:virtual servers 71;virtual storage 72;virtual networks 73, including virtual private networks; virtual applications andoperating systems 74; andvirtual clients 75. - In one example,
management layer 80 may provide the functions described below.Resource provisioning 81 provides dynamic procurement of computing resources and other resources that are utilized to perform tasks within the cloud computing environment. Metering andPricing 82 provide cost tracking as resources are utilized within the cloud computing environment, and billing or invoicing for consumption of these resources. In one example, these resources may comprise application software licenses. Security provides identity verification for cloud consumers and tasks, as well as protection for data and other resources, implementing aspects of the present invention described below that dynamically set enterprise-level security rules for a user as a function of assessing risk factors associated with said user.User portal 83 provides access to the cloud computing environment for consumers and system administrators.Service level management 84 provides cloud computing resource allocation and management such that required service levels are met. Service Level Agreement (SLA) planning andfulfillment 85 provide pre-arrangement for, and procurement of, cloud computing resources for which a future requirement is anticipated in accordance with an SLA. -
Workloads layer 90 provides examples of functionality for which the cloud computing environment may be utilized. Examples of workloads and functions which may be provided from this layer include: mapping andnavigation 91; software development andlifecycle management 92; virtualclassroom education delivery 93; data analytics processing 94;transaction processing 95; andmobile desktop 96. - In one aspect, a service provider may perform process steps of the invention on a subscription, advertising, and/or fee basis. That is, a service provider could offer to integrate computer readable program code into the computer system/
server 12 to enable the computer system/server 12 to perform process steps of the invention. The service provider can create, maintain, and support, etc., a computer infrastructure, such as thecomputer system 12,bus 18, or parts thereof, to perform the process steps of the invention for one or more customers. In return, the service provider can receive payment from the customer(s) under a subscription and/or fee agreement and/or the service provider can receive payment from the sale of advertising content to one or more third parties. Services may include one or more of: (1) installing program code on a computing device, such as thecomputer device 12, from a tangible computer readablemedium device 34; (2) adding one or more computing devices to thecomputer infrastructure 10; and (3) incorporating and/or modifying one or more existingsystems 12 of thecomputer infrastructure 10 to enable thecomputer infrastructure 10 to perform process steps of the invention. -
FIG. 4 (or “FIG. 4 ”) illustrates a method or process of an aspect of the present invention for dynamically setting enterprise-level off-site security rules for a user as a function of assessing risk factors associated with said user. It will be understood that the term “user” is used herein generically to refer to anybody (for example, member, employee, student, associate, partner, user, consultant, team member, user, etc.) who possesses or has access to secure or confidential enterprise data off the enterprise via networked devices or user login credentials. - At 102 a server processor (for example, a central processing unit (CPU)) executes code (for example, code installed on a storage device in communication with the processor) and thereby assigns or determines each of a plurality of individual, different risk values for respective ones of a plurality of different attributes of a user. The risk values each represent a likelihood of loss of secure data of an enterprise that are presented to the enterprise as a function of association of the individual attributes with the user. As is discussed more fully below, the values may be set at 102 as a function of the presence of specified other ones of the attributes of the user, wherein the presence or absence of another of the attributes may cause a change in value of the risk values.
- The determinations at 102 may be in response to a request by the user for access to the secure data, or to another prompt, such as a periodic security audit prompt, change in title or workgroup assignment of the user within the enterprise, a report of a loss of a device by the user that has secure enterprise data or login information, an attack on the user's device or login credentials via a virus or third party, and still others will be apparent to one skilled in the art. Illustrative but not limiting or exhaustive examples of the secure data include trade secret, patent and other intellectual property data that is confidential, unpublished or secure and has value to the enterprise via maintaining the secure and non-public nature of the data.
- The process of
FIG. 4 selects from a collection of person attributes, the attributes of interest to the organization, and for each person attribute of interest, assigns a risk value at 102. The attribute risk values may be binary, wherein single values are used (for example, “yes” or “no”; one or zero, etc.). Or they represent different degrees of risk by different values, such as “risk value=number_of_lost_devices*5.” Note that degrees of risk value need not be linear. The enterprise-level attributes considered at 102 are relevant to access to the enterprise data as defined from a perspective (or point of view) of the enterprise, and not from (and may be independent of) any particular end point used by the user for the data storage or access. The following are illustrative but not limiting or exhaustive examples of the enterprise-level attributes: - (i) A specific level of sensitivity assigned to the data by the enterprise (for example, top secret=10, secret=5 and unclassified=0, or one of some other grouping of different sensitivity levels).
- (ii) Enterprise identity or role of the user requesting access to data, such as title (for example, ad rep=2, engineer=15 and senior vice president=25), position or department of the user; pre-authorizations via job responsibilities to data including data of a type or category of data sought by an application of the user (for example, human resources applications is assigned one value, finance applications another higher value, software development library applications another even higher value, and collaboration applications are assigned a lowest of the applications values).
- (iii) Relations to others outside (external to) the enterprise. External relation attributes include numbers and frequencies of social network, blog and public media connections, followings and followers, which may include connections or activity relative to others associated with competitors or domains having known security concerns, or relationships with immediate or close family members who have obligations to competitors. Social network sources comprehend social community, forum or networks, and illustrative but not exhaustive examples include LinkedIn® Wikipedia™, Facebook® and Twitter®, and still others will be apparent to one skilled in the art. (LINKEDIN is a trademark of the Linkedin Corporation in the United States or other countries; WIKIPEDIA is a trademark of the Wikimedia Foundation in the United States or other countries; FACEBOOK is a trademark of Facebook, Inc. in the United States or other countries; TWITTER is a trademark of Twitter, Inc. in the United States or other countries.)
- (iv) History of attacks on user computers or other programmable devices, or user accounts, virus infections, previous password reset occupancies (indicating lost or forgotten passwords) or authentication breaches recorded (for example, someone guessing a password and accessing a system without the person's knowledge) that are associated with credentials of the user.
- (v) History of theft or loss of devices holding enterprise data or login information.
- (vi) Identity of an application the user is using to access the data, relative to the enterprise (for example, in-house browser application operating on the enterprise server will have a lower risk value than one assigned to an outside or public browser).
- (vii) Authorized enterprise application or information access levels. For example, doe the user have a high security level clearance? If so, he or she may receive a lower risk value.
- (viii) Physical location of the data store containing the data. Is the data on a storage device physically located within a LAN of the enterprise, or on a hard drive located on a mobile computer or personal digital assistant (PDA) off-site? The processor of the process at 102 may extract or otherwise identify location context data that identifies a current geographic location of a user, or a domain used by the user to access the secure enterprise data, including the GPS (Geographic Positioning Satellite) coordinates of a mobile programmable device used by the user, in some aspects to identify a nation or other specific area, in order to compare the identified nation or area to known data export restrictions or correlation with historic espionage activities.
- (ix) Attributes of the data storage device (for example, is the data encrypted with a key or other structure known only by an enterprise application, encrypted by a third party application selected by a user and outside the control of the enterprise, or unencrypted).
- (x) Attributes of the user application used for the access request (hosted on-sight by the server, or off-site by another server or device, or security rating of the hosting infrastructure).
- (xi) Number of people with access to the application data storage device holding the data to be accessed (is the data limited to members of one or more workgroups of specifically identified persons that are fixed or certain in number, or available to any number of users possessing proper credentials issued or verified by the enterprise).
- (xii) Correlation of the time of day and day of week of the present access to the time or day that the application data storage device is typically used to access this data. For example, a time of access risk value may be generated for the user in response to determining that a time of a request by the user to access the enterprise secure data is outside of historical time periods encompassing past, authorized accesses to the enterprise secure data. Thus, payroll data may be typically accessed bi-weekly on Monday mornings after 8:00 AM and no later than 11:00 AM of a time zone of an enterprise workspace, wherein access outside of this range of days and time may be indicative of an improper request.
- (xiii) Nationality of user: is the country of nationality of the user subject to export restrictions or foreign licensing requirements application to intellectual property created and assigned to the enterprise? And if so, is the current location of the user within the borders of said nation?
- Aspects rate or otherwise determine or assess the risk to the enterprise of loss of the secure data in granting off-site access by the user as a function of determined risk values. In the present aspect, security permissions and other settings are set for off-site access, defined generally as home office, mobile device, remote log in, third party site LAN access, or other accesses located outside of an enterprise workspace LAN) to the secure data by the user as a function of aggregating the risk values at 104 into an overall “risk factor” for that user, which signifies an aggregate measure of risk for the user. Thus where the risk values determined at 102 are positive numerical values, they may be added together at 104 to determine the risk factor value at 104.
- Aggregate risk factors may be set or adjusted or weighted at 104 as a function of the presence or values of specific attribute risk values relative to other ones. This recognizes that attribute risk values considered in combination may indicate skills or competency, or a lack thereof, which makes the user more or less susceptible to security breaches. For example, a history or frequency of past reports of lost or stolen devices (e.g. laptops, phones, tablets) may be correlated to travel or location context in common with locations of reported losses and thefts, triggering an increase in risk values (or an aggregate risk factor determined therefrom) for a current location of the user's remote domain or device location when seeking access to the secure data, relative to the risk value assigned to said location without the context of the prior loss/theft activity. Occurrences or frequencies of virus infections in combination with a history of password reset occupancies (indicating lost or forgotten passwords) or authentication breaches recorded (for example, someone guessing a password and accessing a system without the user's knowledge) may also result in increasing risk values determined for home or mobile location attributes, as distinguished from risk values otherwise assigned to said current home or mobile location attributes.
- At 106 the process (processor) determines if the risk factor (or an individual attribute risk value) meets a threshold condition (value) for enabling the user to access secure data of the enterprise from an “off-site location,” namely outside of an enterprise LAN and the security structures presented thereby. If the threshold condition is met at 106, then at 109 access is granted to the secure data by the user from the off-site location via current security settings (including procedures) in place for the user (for example, standard password login procedures and reauthorization time periods to prompt password re-entry, etc.).
- Else, at 110 the process determines whether additional (thus far unselected) security enhancements are available to modify the security settings applicable for the secure data access for this user (applicable to the user). If none are available at 110, then access is denied for the off-site access at 114. However, if additional (unselected) security enhancements are available, then one or more are selected to revise enterprise security settings for granting off-site access at 116.
- The selected enhancements may revise, replace or augment existing security settings currently applicable to the user while working on-site, as implemented to authorize the respective home or mobile access. Each of the security enhancements selected at 116 are associated with a risk abrogation value, and at 120 the risk factor is recalculated in response to subtracting the security abrogation values assigned to the selected enhancements at 116 from a current value of the risk factor.
- The revised risk factor is again compared to the off-site access threshold at 106 in order to determine whether to grant access at 109 as a function of implementing the selected security enhancements. The process is iterative, so that where the risk values determined at 102 are positive numerical values that are added together at 104 to determine the risk factor value at 104, the security abrogation values may be negative numerical values that are added to the risk factor in each iteration at 120 to reduce the (revised) risk factor until it meets the respective, applied one or more security threshold values at a subsequent iteration of
step 106. - Security enhancements selected and imposed at 116 to enable off-site access may include additional or stronger password requirements, increasing the frequency of locking applications and requiring reentry of passwords to continue data access, and limiting access to certain information or applications that are available to the user on site of the enterprise.
- Aspects may differentiate the setting and selection of security measures applicable to the user based on attributes of a location of the user.
FIG. 5 illustrates another aspect that considers some off-site locations (in this example, a home office) more secure than another, more public mobile locations (here generically referred to as “mobile”). Thus, a processor determines if the risk factor determined via the steps/processes - The example of
FIG. 5 differentiates home and mobile access for the purposes of selecting appropriate enhancements as needed atsteps - If the threshold conditions are met at 206 or 208, then the enterprise grants access to the secure data by the user from the applicable home or mobile location at 209 via current security settings in place for the user. Else, at 210 and 212 the process determines whether additional (thus far unselected) security enhancements are available to modify the security settings applicable for the respective home and mobile access. If none are available at 210 or 212, then access is denied for the respective home or mobile access at 209.
- However, if additional (unselected) security enhancements are available, then one or more are selected to revise enterprise security settings for granting home access at 216 and/or for granting mobile access at 218. The enhancements may revise, replace or augment existing security settings currently applicable to the user while working on-site, as implemented to authorize the respective home or mobile access.
- Each of the security enhancements selected at 216 or 218 are associated with a risk abrogation value, and at 220 and 222 the risk factor is recalculated in response to the security abrogation values assigned to the selected enhancements at 216 or 218. The revised risk factor is again compared to the home access threshold at 206 or to the mobile access threshold at 208 in order to determine whether to grant access at 209 as a function of implementing the selected security enhancements. In aspects where the risk values determined at 102 are positive numerical values that are added together at 104 to determine the risk factor value at 104, the security abrogation values may be negative numerical values that are added to the risk factor at 220 and 222 to reduce the (revised) risk factor until it meets the respective, applied one or more security threshold values at 206 and 208.
- In one example, security enhancements selected and imposed at 216 to enable home access include additional or stronger password requirements, increasing the frequency of locking applications and requiring reentry of passwords to continue data access, and limiting access to certain information or applications that are available to the user on site of the enterprise. Enhancements selected and imposed at 218 to enable mobile access include higher, more restrictive levels of the security measures imposed for home access at 216 (for example, shorter time periods between requiring password reentry), as well as sending a signal to the user's mobile device to turn off USB ports and BlueTooth™ connections, forcing a virus scan to be executed on the device (which may execute in the background and unknown to the user) or decreasing periodicity between scheduled executions, and in some instances shutting down the computer or its access to enterprise data of concern until location data indicates it is relocated to a more secure location, such as on the home network or within a workplace or other enterprise LAN location. (BLUETOOTH is a trademark of Bluetooth SIG, Inc., in the United States or other countries.)
- In one example, a distinguished engineer in a micro-chip tech company is working on the next microprocessor. Risk values assigned to the person's title, his or her level of social media information activity, pay information, etc., aggregate to a high risk factor value that fails the threshold comparisons at 206 or 208, pointing both to an importance of his or her role, and indicating too high of a risk to theft exposure, wherein an enhancement selected at 210 entirely prevents access to some types of sensitive data by this person while working from home via access granted at 214 in a subsequent iteration of the threshold comparison at 206. Further, while he or she is working from home access, current security methods may be modified so that authentication is more secure. For example, this distinguished engineer may have policies on his or her laptop updated to require an inactivity password lockout to occur every 10 minutes while using home access, rather than the standard 30 minutes which would be in effect if he or she were working from the work office. Further, while in the office and using a company provided desktop, the distinguished engineer may be granted access to “n” applications and “y” instances of information, but wherein an enhancement selected at 216 causes an enterprise security system to limit access granted at 209 at home to only a few (subset) of the “n” applications and only a few (subset) of the “y” instances of information.
- Determination of the risk factor at 104 and the imposition of security enhancements at 116, 216 and 218 in response to the comparison of the applicable thresholds at 106, 206 and 208 are functions of considerations of quantifiable, measurable characteristics which make individuals more or less prone to corporate espionage, information loss or exposure. Thus, a first company with lots of trade secrets may assign higher risk value to titles of users that have access to trade secrets than the values assigned to comparable titles within a second that has fewer trade secrets. Another company may assign differentiated risk values to different positions within the company. In one example, a risk value assigned to the position of janitor, in combination with a risk value assigned to possession of a physical key to a sensitive location by the janitor and a risk value created by a history of several security incidents on premises occupied by the janitor, may result in a first risk factor determined for the janitor that is higher than a second risk factor determined for a senior vice president as a function of a risk value associated with the senior vice president title and another risk value assigned to a level of access to trade secrets of the enterprise by this title. Conversely, a third risk factor value determined for the janitor where the facility has no history of access incidents may be lower (less risky) than a fourth risk factor determined for the senior vice president, even if the senior vice president has a risk value signifying no access to sensitive information, but wherein the senior vice president works at a location with a history of many incidents, which triggers a high value for workplace location security risk that is used to calculate the senior vice president risk factor, or to determine the aggregated risk factor therefrom. Thus, the distribution of security risk values to attributes, and their aggregation into total or composite risk factors for any user, may be customizable by any given enterprise in response to their unique business context.
-
FIG. 6 is an exemplary tabular illustration of one software algorithm useful for setting the risk factor from positive risk values and negative security abrogation values. Illustrative but not limiting or exhaustive examples of negative security enhancements that are selected at 116, 216 or 218 and their associated security abrogation values include Decrease login inactivity time-out, −4; Use two factor authentication, −15; Move to a closed office space, −5; Turn encryption on for all email communication, −8; Agree to restrict access to USB and DVD devices, −4; Restrict or prevent access to a sensitive application, −8; Restrict or prevent access to sensitive data, −7; Allow access to applications or information only from a device with certain specific security controls, −9; Allow access to applications or information only if thru a specific VPN, −11; Add an HDD password at power on, −10; and if Executive works from home and risk value reaches a set risk threshold, the business automatically provides and pays for home security system if one does not exist, −5. - Determining a risk reduction value for each security action selected (for example, increase password length, restrict or prevent access to certain information or applications, etc.) may be a function of a specified or determined order of application of security actions for automatic selection. For example, increase password length in a first iteration of 116, 216 or 218, restrict granted access to the lowest value information in a second iteration, restrict access to the next lowest value information in a third iteration, and restrict access to application “abc” in a fourth iteration. They may also be manually chosen (such as by the user or a security system administrator) at each iteration, with the process prompting the user/administrator to select another enhancement at each iteration at 116, 216 or 218 in response to a reconsideration of the revised risk factor still failing to meet a necessary threshold at subsequent iterations at 106, 206 or 208.
- The terminology used herein is for describing particular aspects only and is not intended to be limiting of the invention. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “include” and “including” when used in this specification specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. Certain examples and elements described in the present specification, including in the claims and as illustrated in the figures, may be distinguished or otherwise identified from others by unique adjectives (e.g. a “first” element distinguished from another “second” or “third” of a plurality of elements, a “primary” distinguished from a “secondary” one or “another” item, etc.) Such identifying adjectives are generally used to reduce confusion or uncertainty, and are not to be construed to limit the claims to any specific illustrated element or embodiment, or to imply any precedence, ordering or ranking of any claim elements, limitations or process steps.
- The descriptions of the various embodiments of the present invention have been presented for purposes of illustration, but are not intended to be exhaustive or limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein was chosen to best explain the principles of the embodiments, the practical application or technical improvement over technologies found in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.
Claims (20)
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/613,746 US9413786B1 (en) | 2015-02-04 | 2015-02-04 | Dynamic enterprise security control based on user risk factors |
US15/203,935 US9571506B2 (en) | 2015-02-04 | 2016-07-07 | Dynamic enterprise security control based on user risk factors |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US14/613,746 US9413786B1 (en) | 2015-02-04 | 2015-02-04 | Dynamic enterprise security control based on user risk factors |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/203,935 Continuation US9571506B2 (en) | 2015-02-04 | 2016-07-07 | Dynamic enterprise security control based on user risk factors |
Publications (2)
Publication Number | Publication Date |
---|---|
US20160226911A1 true US20160226911A1 (en) | 2016-08-04 |
US9413786B1 US9413786B1 (en) | 2016-08-09 |
Family
ID=56554979
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US14/613,746 Expired - Fee Related US9413786B1 (en) | 2015-02-04 | 2015-02-04 | Dynamic enterprise security control based on user risk factors |
US15/203,935 Active US9571506B2 (en) | 2015-02-04 | 2016-07-07 | Dynamic enterprise security control based on user risk factors |
Family Applications After (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US15/203,935 Active US9571506B2 (en) | 2015-02-04 | 2016-07-07 | Dynamic enterprise security control based on user risk factors |
Country Status (1)
Country | Link |
---|---|
US (2) | US9413786B1 (en) |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170006019A1 (en) * | 2015-07-02 | 2017-01-05 | International Business Machines Corporation | Managing user authentication in association with application access |
CN107277034A (en) * | 2017-07-04 | 2017-10-20 | 深圳天珑无线科技有限公司 | A kind of student is with method for controlling mobile terminal, device and storage medium |
US9807094B1 (en) * | 2015-06-25 | 2017-10-31 | Symantec Corporation | Systems and methods for dynamic access control over shared resources |
US20180083950A1 (en) * | 2015-02-24 | 2018-03-22 | Avatier Corporation | Aggregator technology without usernames and passwords implemented in unified risk scoring |
US9929863B2 (en) * | 2015-10-30 | 2018-03-27 | Palo Alto Research Center Incorporated | System and method for efficient and semantically secure symmetric encryption over channels with limited bandwidth |
US9998926B1 (en) * | 2016-12-12 | 2018-06-12 | International Business Machines Corporation | Security enabled predictive mobile data caching |
US10200369B1 (en) * | 2016-02-16 | 2019-02-05 | Symantec Corporation | Systems and methods for dynamically validating remote requests within enterprise networks |
US10306465B2 (en) * | 2015-06-23 | 2019-05-28 | International Business Machines Corporation | Protecting sensitive data in a security area |
US20190180039A1 (en) * | 2017-12-12 | 2019-06-13 | Fmr Llc | Systems and Methods for Dynamic Application Management |
US10356618B2 (en) * | 2014-07-17 | 2019-07-16 | Cirrent, Inc. | Securing credential distribution |
US10389752B2 (en) * | 2015-01-14 | 2019-08-20 | Viesoft, Inc. | Price mining prevention systems and related methods |
US20190356683A1 (en) * | 2016-05-10 | 2019-11-21 | Allstate Insurance Company | Cyber-security presence monitoring and assessment |
CN110691084A (en) * | 2019-09-27 | 2020-01-14 | 武汉极意网络科技有限公司 | Adaptation method and device of wind control rule engine |
US20200042723A1 (en) * | 2018-08-03 | 2020-02-06 | Verizon Patent And Licensing Inc. | Identity fraud risk engine platform |
US10623397B2 (en) | 2015-02-24 | 2020-04-14 | Avatier Corporation | Aggregator technology without usernames and passwords |
US10630676B2 (en) * | 2017-11-24 | 2020-04-21 | Microsoft Technology Licensing, Llc | Protecting against malicious discovery of account existence |
US20200137021A1 (en) * | 2018-10-31 | 2020-04-30 | Hewlett Packard Enterprise Development Lp | Using intent to access in discovery protocols in a network for analytics |
US10642997B2 (en) * | 2017-07-26 | 2020-05-05 | Forcepoint Llc | Gracefully handling endpoint feedback when starting to monitor |
US10735404B2 (en) | 2015-02-24 | 2020-08-04 | Avatier Corporation | Aggregator technology without usernames and passwords implemented in a service store |
US10839073B2 (en) | 2018-11-13 | 2020-11-17 | Forcepoint, LLC | System and method for operating a collector at an endpoint device |
US10855699B2 (en) | 2016-05-10 | 2020-12-01 | Allstate Insurance Company | Digital safety and account discovery |
US20210035115A1 (en) * | 2019-07-30 | 2021-02-04 | EMC IP Holding Company LLC | Method and system for provisioning software licenses |
CN112351005A (en) * | 2020-10-23 | 2021-02-09 | 杭州安恒信息技术股份有限公司 | Internet of things communication method and device, readable storage medium and computer equipment |
CN112651027A (en) * | 2020-12-30 | 2021-04-13 | 北京嘀嘀无限科技发展有限公司 | Data risk prediction method, apparatus, device, storage medium and program product |
US10984120B2 (en) * | 2018-05-10 | 2021-04-20 | Paypal, Inc. | Limiting device functionality based on data detection and processing |
US10999324B2 (en) | 2017-08-01 | 2021-05-04 | Forcepoint, LLC | Direct-connect web endpoint |
US11019080B2 (en) | 2016-05-10 | 2021-05-25 | Allstate Insurance Company | Digital safety and account discovery |
US20220070160A1 (en) * | 2015-02-24 | 2022-03-03 | Nelson A. Cicchitto | Mobile device enabled desktop tethered and tetherless authentication |
US11363051B2 (en) * | 2019-04-01 | 2022-06-14 | Armis Security Ltd. | System and method for mitigating cyber security threats by devices using risk factors |
US20220191233A1 (en) * | 2020-12-10 | 2022-06-16 | KnowBe4, Inc. | Systems and methods for improving assessment of security risk based on personal internet account data |
US11489846B2 (en) | 2017-05-15 | 2022-11-01 | Forcepoint Llc | Applying reduction functions to anomalous event risk score |
US11632382B2 (en) * | 2017-05-15 | 2023-04-18 | Forcepoint Llc | Anomaly detection using endpoint counters |
CN116264521A (en) * | 2021-12-14 | 2023-06-16 | 国际商业机器公司 | Active user protection for intelligent environments |
US11838275B2 (en) | 2021-03-12 | 2023-12-05 | Forcepoint Llc | Web endpoint device having automatic switching between proxied and non-proxied communication modes |
US11949700B2 (en) | 2017-05-15 | 2024-04-02 | Forcepoint Llc | Using content stored in an entity behavior catalog in combination with an entity risk score |
US11991166B2 (en) | 2015-02-24 | 2024-05-21 | Nelson A. Cicchitto | Method and apparatus for an identity assurance score with ties to an ID-less and password-less authentication system |
Families Citing this family (38)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10692102B2 (en) | 2013-12-31 | 2020-06-23 | Viesoft, Inc. | Price mining and product re-pricing data processing systems and methods |
US10748175B2 (en) | 2015-01-14 | 2020-08-18 | Viesoft, Inc. | Price mining prevention and dynamic online marketing campaign adjustment data processing systems and methods |
US9413786B1 (en) * | 2015-02-04 | 2016-08-09 | International Business Machines Corporation | Dynamic enterprise security control based on user risk factors |
US12288233B2 (en) | 2016-04-01 | 2025-04-29 | OneTrust, LLC | Data processing systems and methods for integrating privacy information management systems with data loss prevention tools or other tools for privacy design |
US11227247B2 (en) | 2016-06-10 | 2022-01-18 | OneTrust, LLC | Data processing systems and methods for bundled privacy policies |
US12118121B2 (en) | 2016-06-10 | 2024-10-15 | OneTrust, LLC | Data subject access request processing systems and related methods |
US11586700B2 (en) | 2016-06-10 | 2023-02-21 | OneTrust, LLC | Data processing systems and methods for automatically blocking the use of tracking tools |
US12136055B2 (en) | 2016-06-10 | 2024-11-05 | OneTrust, LLC | Data processing systems for identifying, assessing, and remediating data processing risks using data modeling techniques |
US11544667B2 (en) | 2016-06-10 | 2023-01-03 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11392720B2 (en) | 2016-06-10 | 2022-07-19 | OneTrust, LLC | Data processing systems for verification of consent and notice processing and related methods |
US10909265B2 (en) | 2016-06-10 | 2021-02-02 | OneTrust, LLC | Application privacy scanning systems and related methods |
US11727141B2 (en) | 2016-06-10 | 2023-08-15 | OneTrust, LLC | Data processing systems and methods for synching privacy-related user consent across multiple computing devices |
US12299065B2 (en) | 2016-06-10 | 2025-05-13 | OneTrust, LLC | Data processing systems and methods for dynamically determining data processing consent configurations |
US12045266B2 (en) | 2016-06-10 | 2024-07-23 | OneTrust, LLC | Data processing systems for generating and populating a data inventory |
US11520928B2 (en) | 2016-06-10 | 2022-12-06 | OneTrust, LLC | Data processing systems for generating personal data receipts and related methods |
US11636171B2 (en) | 2016-06-10 | 2023-04-25 | OneTrust, LLC | Data processing user interface monitoring systems and related methods |
US11366909B2 (en) | 2016-06-10 | 2022-06-21 | OneTrust, LLC | Data processing and scanning systems for assessing vendor risk |
US11675929B2 (en) | 2016-06-10 | 2023-06-13 | OneTrust, LLC | Data processing consent sharing systems and related methods |
US11188615B2 (en) | 2016-06-10 | 2021-11-30 | OneTrust, LLC | Data processing consent capture systems and related methods |
US11481710B2 (en) | 2016-06-10 | 2022-10-25 | OneTrust, LLC | Privacy management systems and methods |
US11294939B2 (en) | 2016-06-10 | 2022-04-05 | OneTrust, LLC | Data processing systems and methods for automatically detecting and documenting privacy-related aspects of computer software |
US10685140B2 (en) | 2016-06-10 | 2020-06-16 | OneTrust, LLC | Consent receipt management systems and related methods |
US12381915B2 (en) | 2016-06-10 | 2025-08-05 | OneTrust, LLC | Data processing systems and methods for performing assessments and monitoring of new versions of computer code for compliance |
US12052289B2 (en) | 2016-06-10 | 2024-07-30 | OneTrust, LLC | Data processing systems for data-transfer risk identification, cross-border visualization generation, and related methods |
US20180083939A1 (en) | 2016-09-19 | 2018-03-22 | International Business Machines Corporation | Geolocation dependent variable authentication |
US10268474B2 (en) * | 2017-07-18 | 2019-04-23 | Cisco Technology, Inc. | Network slice selection in a mobile network |
JP6640802B2 (en) * | 2017-09-06 | 2020-02-05 | ファナック株式会社 | Edge server and application security management system |
US11544409B2 (en) | 2018-09-07 | 2023-01-03 | OneTrust, LLC | Data processing systems and methods for automatically protecting sensitive data within privacy management systems |
US11444976B2 (en) | 2020-07-28 | 2022-09-13 | OneTrust, LLC | Systems and methods for automatically blocking the use of tracking tools |
US20230334158A1 (en) * | 2020-09-21 | 2023-10-19 | OneTrust, LLC | Data processing systems and methods for automatically detecting target data transfers and target data processing |
US12265896B2 (en) | 2020-10-05 | 2025-04-01 | OneTrust, LLC | Systems and methods for detecting prejudice bias in machine-learning models |
US11397819B2 (en) | 2020-11-06 | 2022-07-26 | OneTrust, LLC | Systems and methods for identifying data processing activities based on data discovery results |
US20240098109A1 (en) | 2021-02-10 | 2024-03-21 | OneTrust, LLC | Systems and methods for mitigating risks of third-party computing system functionality integration into a first-party computing system |
WO2022178219A1 (en) | 2021-02-18 | 2022-08-25 | OneTrust, LLC | Selective redaction of media content |
US20240311497A1 (en) | 2021-03-08 | 2024-09-19 | OneTrust, LLC | Data transfer discovery and analysis systems and related methods |
US11562078B2 (en) | 2021-04-16 | 2023-01-24 | OneTrust, LLC | Assessing and managing computational risk involved with integrating third party computing functionality within a computing system |
US12153704B2 (en) | 2021-08-05 | 2024-11-26 | OneTrust, LLC | Computing platform for facilitating data exchange among computing environments |
US12192243B2 (en) | 2022-11-18 | 2025-01-07 | Kyndryl, Inc. | Security policy selection based on calculated uncertainty and predicted resource consumption |
Family Cites Families (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CA2299824C (en) * | 2000-03-01 | 2012-02-21 | Spicer Corporation | Network resource control system |
US7024686B2 (en) * | 2000-05-15 | 2006-04-04 | Hewlett-Packard Development Company, L.P. | Secure network and method of establishing communication amongst network devices that have restricted network connectivity |
US7558767B2 (en) | 2000-08-03 | 2009-07-07 | Kronos Talent Management Inc. | Development of electronic employee selection systems and methods |
US7415723B2 (en) * | 2002-06-11 | 2008-08-19 | Pandya Ashish A | Distributed network security system and a hardware processor therefor |
US7813947B2 (en) * | 2003-09-23 | 2010-10-12 | Enterra Solutions, Llc | Systems and methods for optimizing business processes, complying with regulations, and identifying threat and vulnerabilty risks for an enterprise |
US7310669B2 (en) * | 2005-01-19 | 2007-12-18 | Lockdown Networks, Inc. | Network appliance for vulnerability assessment auditing over multiple networks |
US8438643B2 (en) * | 2005-09-22 | 2013-05-07 | Alcatel Lucent | Information system service-level security risk analysis |
US8095984B2 (en) * | 2005-09-22 | 2012-01-10 | Alcatel Lucent | Systems and methods of associating security vulnerabilities and assets |
US7900259B2 (en) * | 2007-03-16 | 2011-03-01 | Prevari | Predictive assessment of network risks |
US8205239B1 (en) * | 2007-09-29 | 2012-06-19 | Symantec Corporation | Methods and systems for adaptively setting network security policies |
US8479266B1 (en) * | 2008-11-13 | 2013-07-02 | Sprint Communications Company L.P. | Network assignment appeal architecture and process |
US8375427B2 (en) | 2010-04-21 | 2013-02-12 | International Business Machines Corporation | Holistic risk-based identity establishment for eligibility determinations in context of an application |
US8396485B2 (en) | 2010-11-09 | 2013-03-12 | Apple Inc. | Beacon-based geofencing |
RU2477929C2 (en) | 2011-04-19 | 2013-03-20 | Закрытое акционерное общество "Лаборатория Касперского" | System and method for prevention safety incidents based on user danger rating |
US20130031047A1 (en) | 2011-07-28 | 2013-01-31 | Microsoft Corporation | Efficiency and accuracy of geo-fencing based on user history |
US8700709B2 (en) | 2011-07-29 | 2014-04-15 | Microsoft Corporation | Conditional location-based reminders |
US20130117266A1 (en) | 2011-11-09 | 2013-05-09 | Microsoft Corporation | Geo-fence based on geo-tagged media |
US9071453B2 (en) | 2012-06-11 | 2015-06-30 | Apple Inc. | Location-based device automation |
US9413786B1 (en) * | 2015-02-04 | 2016-08-09 | International Business Machines Corporation | Dynamic enterprise security control based on user risk factors |
-
2015
- 2015-02-04 US US14/613,746 patent/US9413786B1/en not_active Expired - Fee Related
-
2016
- 2016-07-07 US US15/203,935 patent/US9571506B2/en active Active
Cited By (64)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10356618B2 (en) * | 2014-07-17 | 2019-07-16 | Cirrent, Inc. | Securing credential distribution |
US10389752B2 (en) * | 2015-01-14 | 2019-08-20 | Viesoft, Inc. | Price mining prevention systems and related methods |
US20180083950A1 (en) * | 2015-02-24 | 2018-03-22 | Avatier Corporation | Aggregator technology without usernames and passwords implemented in unified risk scoring |
US11811750B2 (en) * | 2015-02-24 | 2023-11-07 | Nelson A. Cicchitto | Mobile device enabled desktop tethered and tetherless authentication |
US12250207B2 (en) | 2015-02-24 | 2025-03-11 | Nelson A. Cicchitto | Mobile device enabled desktop tethered and tetherless authentication |
US10623397B2 (en) | 2015-02-24 | 2020-04-14 | Avatier Corporation | Aggregator technology without usernames and passwords |
US20220070160A1 (en) * | 2015-02-24 | 2022-03-03 | Nelson A. Cicchitto | Mobile device enabled desktop tethered and tetherless authentication |
US10432615B2 (en) * | 2015-02-24 | 2019-10-01 | Avatier Corporation | Aggregator technology without usernames and passwords implemented in unified risk scoring |
US11991166B2 (en) | 2015-02-24 | 2024-05-21 | Nelson A. Cicchitto | Method and apparatus for an identity assurance score with ties to an ID-less and password-less authentication system |
US10735404B2 (en) | 2015-02-24 | 2020-08-04 | Avatier Corporation | Aggregator technology without usernames and passwords implemented in a service store |
US10306465B2 (en) * | 2015-06-23 | 2019-05-28 | International Business Machines Corporation | Protecting sensitive data in a security area |
US9807094B1 (en) * | 2015-06-25 | 2017-10-31 | Symantec Corporation | Systems and methods for dynamic access control over shared resources |
US9736169B2 (en) * | 2015-07-02 | 2017-08-15 | International Business Machines Corporation | Managing user authentication in association with application access |
US20170006019A1 (en) * | 2015-07-02 | 2017-01-05 | International Business Machines Corporation | Managing user authentication in association with application access |
US9929863B2 (en) * | 2015-10-30 | 2018-03-27 | Palo Alto Research Center Incorporated | System and method for efficient and semantically secure symmetric encryption over channels with limited bandwidth |
US10284564B1 (en) | 2016-02-16 | 2019-05-07 | Symantec Corporation | Systems and methods for dynamically validating remote requests within enterprise networks |
US10200369B1 (en) * | 2016-02-16 | 2019-02-05 | Symantec Corporation | Systems and methods for dynamically validating remote requests within enterprise networks |
US12212587B2 (en) | 2016-05-10 | 2025-01-28 | Allstate Insurance Company | Digital safety and account discovery |
US12010123B2 (en) | 2016-05-10 | 2024-06-11 | Allstate Insurance Company | Cyber-security presence monitoring and assessment |
US11019080B2 (en) | 2016-05-10 | 2021-05-25 | Allstate Insurance Company | Digital safety and account discovery |
US11895131B2 (en) | 2016-05-10 | 2024-02-06 | Allstate Insurance Company | Digital safety and account discovery |
US10924501B2 (en) * | 2016-05-10 | 2021-02-16 | Allstate Insurance Company | Cyber-security presence monitoring and assessment |
US20190356683A1 (en) * | 2016-05-10 | 2019-11-21 | Allstate Insurance Company | Cyber-security presence monitoring and assessment |
US11606371B2 (en) | 2016-05-10 | 2023-03-14 | Allstate Insurance Company | Digital safety and account discovery |
US11539723B2 (en) | 2016-05-10 | 2022-12-27 | Allstate Insurance Company | Digital safety and account discovery |
US20250007928A1 (en) * | 2016-05-10 | 2025-01-02 | Allstate Insurance Company | Cyber-security presence monitoring and assessment |
US10855699B2 (en) | 2016-05-10 | 2020-12-01 | Allstate Insurance Company | Digital safety and account discovery |
US12028358B2 (en) | 2016-05-10 | 2024-07-02 | Allstate Insurance Company | Digital safety and account discovery |
US10225741B2 (en) | 2016-12-12 | 2019-03-05 | International Business Machines Corporation | Security enabled predictive mobile data caching |
US9998926B1 (en) * | 2016-12-12 | 2018-06-12 | International Business Machines Corporation | Security enabled predictive mobile data caching |
US11949700B2 (en) | 2017-05-15 | 2024-04-02 | Forcepoint Llc | Using content stored in an entity behavior catalog in combination with an entity risk score |
US11516224B2 (en) | 2017-05-15 | 2022-11-29 | Forcepoint Llc | Using an entity reputation when calculating an entity risk score |
US11632382B2 (en) * | 2017-05-15 | 2023-04-18 | Forcepoint Llc | Anomaly detection using endpoint counters |
US11489846B2 (en) | 2017-05-15 | 2022-11-01 | Forcepoint Llc | Applying reduction functions to anomalous event risk score |
US11496488B2 (en) | 2017-05-15 | 2022-11-08 | Forcepoint Llc | Risk score calculation and distribution |
CN107277034A (en) * | 2017-07-04 | 2017-10-20 | 深圳天珑无线科技有限公司 | A kind of student is with method for controlling mobile terminal, device and storage medium |
US10664614B2 (en) | 2017-07-26 | 2020-05-26 | Forcepoint Llc | Gracefully handling endpoint feedback when starting to monitor |
US10642997B2 (en) * | 2017-07-26 | 2020-05-05 | Forcepoint Llc | Gracefully handling endpoint feedback when starting to monitor |
US11704437B2 (en) | 2017-07-26 | 2023-07-18 | Forcepoint Federal Holdings Llc | Gracefully handling endpoint feedback when starting to monitor |
US11314896B2 (en) | 2017-07-26 | 2022-04-26 | Forcepoint, LLC | Gracefully handling endpoint feedback when starting to monitor |
US10999324B2 (en) | 2017-08-01 | 2021-05-04 | Forcepoint, LLC | Direct-connect web endpoint |
US10630676B2 (en) * | 2017-11-24 | 2020-04-21 | Microsoft Technology Licensing, Llc | Protecting against malicious discovery of account existence |
US10803186B2 (en) * | 2017-12-12 | 2020-10-13 | Fmr Llc | Systems and methods for dynamic application management |
US20190180039A1 (en) * | 2017-12-12 | 2019-06-13 | Fmr Llc | Systems and Methods for Dynamic Application Management |
US11775661B2 (en) | 2018-05-10 | 2023-10-03 | Paypal, Inc. | Limiting device functionality based on data detection and processing |
US10984120B2 (en) * | 2018-05-10 | 2021-04-20 | Paypal, Inc. | Limiting device functionality based on data detection and processing |
US20200042723A1 (en) * | 2018-08-03 | 2020-02-06 | Verizon Patent And Licensing Inc. | Identity fraud risk engine platform |
US11017100B2 (en) * | 2018-08-03 | 2021-05-25 | Verizon Patent And Licensing Inc. | Identity fraud risk engine platform |
US20200137021A1 (en) * | 2018-10-31 | 2020-04-30 | Hewlett Packard Enterprise Development Lp | Using intent to access in discovery protocols in a network for analytics |
US12113768B2 (en) * | 2018-10-31 | 2024-10-08 | Hewlett Packard Enterprise Development Lp | Using intent to access in discovery protocols in a network for analytics |
US11704407B2 (en) | 2018-11-13 | 2023-07-18 | Forcepoint Llc | System and method for operating an endpoint core at an endpoint device |
US10839073B2 (en) | 2018-11-13 | 2020-11-17 | Forcepoint, LLC | System and method for operating a collector at an endpoint device |
US10885186B2 (en) | 2018-11-13 | 2021-01-05 | Forcepoint, LLC | System and method for operating a protected endpoint device |
US11836248B2 (en) | 2018-11-13 | 2023-12-05 | Forcepoint Llc | System and method for operating an endpoint agent at an endpoint device |
US11363051B2 (en) * | 2019-04-01 | 2022-06-14 | Armis Security Ltd. | System and method for mitigating cyber security threats by devices using risk factors |
US12015634B2 (en) | 2019-04-01 | 2024-06-18 | Armis Security Ltd. | System and method for mitigating cyber security threats by devices using risk factors |
US20210035115A1 (en) * | 2019-07-30 | 2021-02-04 | EMC IP Holding Company LLC | Method and system for provisioning software licenses |
CN110691084A (en) * | 2019-09-27 | 2020-01-14 | 武汉极意网络科技有限公司 | Adaptation method and device of wind control rule engine |
CN112351005A (en) * | 2020-10-23 | 2021-02-09 | 杭州安恒信息技术股份有限公司 | Internet of things communication method and device, readable storage medium and computer equipment |
US20220191233A1 (en) * | 2020-12-10 | 2022-06-16 | KnowBe4, Inc. | Systems and methods for improving assessment of security risk based on personal internet account data |
US11552984B2 (en) * | 2020-12-10 | 2023-01-10 | KnowBe4, Inc. | Systems and methods for improving assessment of security risk based on personal internet account data |
CN112651027A (en) * | 2020-12-30 | 2021-04-13 | 北京嘀嘀无限科技发展有限公司 | Data risk prediction method, apparatus, device, storage medium and program product |
US11838275B2 (en) | 2021-03-12 | 2023-12-05 | Forcepoint Llc | Web endpoint device having automatic switching between proxied and non-proxied communication modes |
CN116264521A (en) * | 2021-12-14 | 2023-06-16 | 国际商业机器公司 | Active user protection for intelligent environments |
Also Published As
Publication number | Publication date |
---|---|
US9571506B2 (en) | 2017-02-14 |
US20160315947A1 (en) | 2016-10-27 |
US9413786B1 (en) | 2016-08-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9571506B2 (en) | Dynamic enterprise security control based on user risk factors | |
US10032039B1 (en) | Role access to information assets based on risk model | |
US11102196B2 (en) | Authenticating API service invocations | |
US9998474B2 (en) | Secure assertion attribute for a federated log in | |
US11165776B2 (en) | Methods and systems for managing access to computing system resources | |
US10542048B2 (en) | Security compliance framework usage | |
US20140006094A1 (en) | Context-dependent transactional management for separation of duties | |
US11310280B2 (en) | Implementation of selected enterprise policies | |
US9882911B2 (en) | Autonomous trust evaluation engine to grant access to user private data | |
US9860280B1 (en) | Cognitive authentication with employee onboarding | |
Albeshri et al. | Mutual protection in a cloud computing environment | |
US11558390B2 (en) | System to control access to web resources based on an internet of things authorization mechanism | |
Pramod et al. | Limitations and challenges in cloud-based applications development | |
US11238134B2 (en) | Adaptable access to digital assets | |
US11373185B2 (en) | Transaction with security integrity and permission management | |
US10277607B2 (en) | Login performance | |
US12174899B2 (en) | Geofencing queries based on query intent and result semantics | |
US20230222240A1 (en) | Governed database connectivity (gdbc) through and around data catalog to registered data sources | |
Sachdeva | Cloud computing: security risk analysis and recommendations |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BOSS, GREGORY J.;JONES, ANDREW R.;LINGAFELT, CHARLES S.;AND OTHERS;SIGNING DATES FROM 20150130 TO 20150203;REEL/FRAME:034886/0248 |
|
STCF | Information on status: patent grant |
Free format text: PATENTED CASE |
|
FEPP | Fee payment procedure |
Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
LAPS | Lapse for failure to pay maintenance fees |
Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20200809 |
|
AS | Assignment |
Owner name: KYNDRYL, INC., NEW YORK Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:INTERNATIONAL BUSINESS MACHINES CORPORATION;REEL/FRAME:057885/0644 Effective date: 20210930 |