Information security system for identifying security threats in deployed software package
A system for detecting security threats in deployed software packages receives a request from a user to access software packages to perform a particular task. The system selects particular software packages based on an experience level of the user in performing the particular task. The system deploy...
Gespeichert in:
Hauptverfasser: | , , , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | A system for detecting security threats in deployed software packages receives a request from a user to access software packages to perform a particular task. The system selects particular software packages based on an experience level of the user in performing the particular task. The system deploys the particular software packages to a computing device associated with the user. The system monitors the deployed software packages to determine whether a security vulnerability is introduced to the computing device by the deployed software packages. In response to determining that the security vulnerability is introduced to the computing device by the deployed software packages, the system recalls the deployed software packages by remotely uninstalling the deployed software packages from the computing device. |
---|