首页>
外国专利>
UTILIZATION OF DECEPTIVE DECOY ELEMENTS TO IDENTIFY DATA LEAKAGE PROCESSES INVOKED BY SUSPICIOUS ENTITIES
UTILIZATION OF DECEPTIVE DECOY ELEMENTS TO IDENTIFY DATA LEAKAGE PROCESSES INVOKED BY SUSPICIOUS ENTITIES
展开▼
机译:利用欺骗性诱饵元素来识别可疑实体调用的数据泄漏过程
展开▼
页面导航
摘要
著录项
相似文献
摘要
A method and system for a deployment of deceptive decoy elements in a computerized environment to identify data leakage processes invoked by suspicious entities are presented. The method includes generating at least one deceptive decoy element; and deploying the generated at least one deceptive decoy element in a folder in a file system of the computerized environment, wherein the deployment is based on a sensitivity level of the folder, wherein the at least one deceptive decoy element is configured to provide an indication of unauthorized access upon an attempt by an unauthorized entity to access the folder.
展开▼