首页>
外国专利>
Managing security breaches in a networked computing environment
Managing security breaches in a networked computing environment
展开▼
机译:在网络计算环境中管理安全漏洞
展开▼
页面导航
摘要
著录项
相似文献
摘要
Approaches for managing security breaches in a networked computing environment are provided. A method includes detecting, by at least one computer device, a breach of a production system in the networked computing environment, wherein the networked computing environment includes a decoy system interweaved with the production system. The method also includes receiving, by the at least one computer device, a communication after the detecting the breach. The method further includes determining, by the at least one computer device, the communication is associated with one of a valid user and a malicious user. The method additionally includes, based on the determining, routing the valid user to an element of the production system when the communication is associated with the valid user and routing the malicious user to a corresponding element of the decoy system when the communication is associated with the malicious user.
展开▼