发明名称 TECHNOLOGIES FOR MANAGING SECURITY THREATS TO A COMPUTING SYSTEM UTILIZING USER INTERACTIONS
摘要 Technologies for managing security threats on a computing system include detecting a security threat to the computing system, determining a plurality of mitigation scenarios to employ on the computing system to mitigate the security threat, and implementing the plurality of mitigation scenarios. Each mitigation scenario includes one or more threat mitigation actions to be taken by the computing system, one or more response systems of the computing system to perform the threat mitigation actions, and a temporal sequence in which the threat mitigation actions are to be taken. The results of each mitigation scenario is evaluated and a validated mitigation scenario is determined based on the results. A user of the computing device may be subsequently trained or habituated to mitigate the security threat by requesting interaction from the user during the implementation of the validated mitigation scenario in response to a threat scenario designed to replicate the security threat.
申请公布号 US2016188875(A1) 申请公布日期 2016.06.30
申请号 US201414583692 申请日期 2014.12.27
申请人 Weast John C.;Johnson Brian D.;Kohlenberg Tobias M. 发明人 Weast John C.;Johnson Brian D.;Kohlenberg Tobias M.
分类号 G06F21/55;G06F21/57;H04L29/06;G06F21/56 主分类号 G06F21/55
代理机构 代理人
主权项
地址 Portland OR US