CPC G06F 21/577 (2013.01) [H04L 63/0227 (2013.01); H04L 63/1425 (2013.01)] | 30 Claims |
1. A computer-implemented method for a first device to govern operation of a second device based on a network security risk posed by the second device, the second device disposed locally to the first device and in local network communication with the first device, the first device being in network communication with a cloud-based computational service, the method comprising:
collecting, over a local network, first information about the second device using the first device;
communicating second information based on the collected first information about the second device to and from the cloud-based computational service, wherein the cloud-based computational service performs at least a portion of a risk assessment analysis of the second device based on packets sent or received from the second device, at least two weighted risk assessment factors, and contents of an event log management system, wherein weights are assigned to the risk assessment factors with varying granularity, including for a type of the second device, and wherein the local network includes a third device having a different type from the second device that is assigned different weighted risk assessment factors based at least in part on its having the different type; and
deciding permissions of the second device based on the risk assessment analysis, said permissions governing permissible destinations for packets sent from the second device.
|