摘要 |
A data leak protection method for managing user interaction with a computing device, the computing device comprising a kernel mode of operation and a user mode of operation, the method comprising: monitoring the kernel mode of the computing device in order to detect user-initiated events; determining whether a given user-initiated event has a forbidden status or an allowed status; performing an action in dependence on the status of the given user-initiated event.
|