摘要 |
Modifications to security information associated with accessing an object are evaluated. Evaluations are performed to determine if excessive access rights or permissions have been granted on the object, which could lead to compromised security. A security verifier intercepts the security information and determines if an identified owner constitutes an untrusted security entity. If so, a notification to that effect is issued. The security verifier also determines whether access rights granted to other entities create a security threat. If so, a notification to that effect is issued. Multiple levels of potential threat may be employed, and notifications of varying severity may be used to illustrate the disparity between the multiple levels of threat.
|