DETECTION OF BULK OPERATIONS ASSOCIATED WITH REMOTELY STORED CONTENT BY CLIENT DEVICE

    公开(公告)号:US20180039654A1

    公开(公告)日:2018-02-08

    申请号:US15238934

    申请日:2016-08-17

    Abstract: Cloud-based storage services are provided for storing and/or sharing content across multiple devices, where the content is periodically synchronized between the devices and the storage service. Embodiments are directed to detection of bulk operations associated with content stored at a storage service to protect users both proactively and remedially from accidental and/or nefarious content alterations propagating to the storage service and/or other devices. A model based on a usage pattern monitored and provided by a client device may be received at the client device from the storage service. An attempted operation performed on the content may be detected, and the attempted operation may be compared to the model to determine whether the operation deviates from the usage pattern. If the attempted operation deviates from the usage pattern, execution of the attempted operation and synchronization of the content with the storage service may be prevented until the attempted operation is approved.

    SYSTEM AND METHOD FOR IDENTIFYING NETWORK SECURITY THREATS AND ASSESSING NETWORK SECURITY

    公开(公告)号:US20180018465A1

    公开(公告)日:2018-01-18

    申请号:US15653293

    申请日:2017-07-18

    Applicant: vThreat, Inc.

    Abstract: A system and method of security assessment of a network is described. The system may include one or more security assessment computers controlled by a security assessor, and connected to a network, and first executable program code for acting as an agent on a first end device on the network. The first executable program code is configured to be executed by a browser application of the first end device, and is configured to collect software information, hardware information, and/or vulnerability information of the first end device and transmit the same to a first security assessment computer of the one or more security assessment computers. The information may be transmitted as part of a domain name server (DNS) request. The DNS request may include information identifying the first end device to thus allow modification of the first end device in response to analysis of the collected information.

    SYSTEMS AND METHODS FOR DETERMINING SECURITY RISK PROFILES

    公开(公告)号:US20170331840A1

    公开(公告)日:2017-11-16

    申请号:US15151734

    申请日:2016-05-11

    Inventor: Gyan Ranjan

    CPC classification number: H04L63/1416 G06F21/50 H04L63/1433 H04L63/1441

    Abstract: A computer-implemented method for determining security risk profiles may include (1) detecting a security breach of an entity within a set of entities, (2) constructing a peer-similarity graph that identifies an incentive to attack the entity in comparison to other entities within the set of entities, (3) creating, using the peer-similarity graph, a security risk profile for each entity in the set of entities, (4) automatically adjusting at least one security risk profile based on the detected security breach, and (5) updating a security database with the adjusted security risk profile. Various other methods, systems, and computer-readable media are also disclosed.

Patent Agency Ranking