Risk profiling in order to optimize the deployment of security measures such as behavior-blocking, hardening, or securing techniques is disclosed. Risk profiling includes evaluating a risk to a host service based on communication with a remote system, creating a risk profile for the host service, and deploying a security measure to protect the host service based on the risk profile. Risk profiling enables optimization of deployment of security measures to protect a host service that is either directly or indirectly communicating with a remote system. Using a risk profile enables the optimal deployment of security measures while preventing host system performance degradation and increased system requirements (e.g., increased memory and processor usage).

 
Web www.patentalert.com

< Petunia plant named `Duepotlobs`

> Calibrachoa plant named `Duealtior`

> Content management method, recording and/or reproducing apparatus, and recording medium

~ 00520