Prevention of malicious use of endpoint devices
Methods and systems for preventing malicious use of endpoint devices are described herein. A computing device may receive data indicative of usage of the computing device by a user. The computing device may compare the received data with other data (indicative of how an authorized user for the compu...
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
Zusammenfassung: | Methods and systems for preventing malicious use of endpoint devices are described herein. A computing device may receive data indicative of usage of the computing device by a user. The computing device may compare the received data with other data (indicative of how an authorized user for the computing device uses the computing device) stored on the computing device to identify instances of abnormal usage of the computing device. The computing device may detect unauthorized use of the computing device based on the number of instances of abnormal usage exceeding a threshold. The computing device may prevent access to a computing environment with use of the computing device in response to detection of unauthorized use. |
---|