摘要 |
Embodiments of the present disclosure disclose methods, non-transitory computer readable media, and a security breach detection computing devices for detecting a breach of security in an organization. The method comprises receiving input data in real-time from one or more security systems. The method further comprises analyzing the input data to generate at least one of security information in a predefined format, trajectory information on movement of one or more persons, and facial features of the one or more persons. The method further comprises correlating the security information, the trajectory information and the facial features. The method further comprises detecting the security breach in the organization based on the correlation. |
主权项 |
1. A method for detecting organizational security breaches, the method comprising:
receiving, by a security breach detection computing device, input data in real-time from one or more security systems; analyzing, by the security breach detection computing device, the input data to generate at least one of security data in a predefined format, trajectory data identifying movement of one or more persons, or facial feature data identifying one or more facial features of the one or more persons; correlating, by the security breach detection computing device, the security data, the trajectory data, or the facial features data; and detecting, by the security breach detection computing device, a security breach in an organization based on the correlation. |