| CPC G06F 21/565 (2013.01) [G06F 21/554 (2013.01); G06F 21/6209 (2013.01)] | 20 Claims |

|
1. A computer implemented cyber security method for preventing and removing undesired modifications of a protected file, the method comprising the following steps:
generating a virtual file object via an authorized handler that is associated with the protected file, wherein when a write request to the protected file is received from an accessing program, the write request describing a change to data of the protected file, the write request is redirected to the virtual file object causing the write request to store the change to the data of the protected file as data in the virtual file object instead of in the protected file;
receiving a read request of the protected file;
determining if there is data on the virtual file object associated with the protected file; and
determining if the data on the virtual file object comprises a change to the data of the protected file; and
wherein, based on the determination, the authorized handler returns one of: (i) the data of the protected file changed by the write request and (ii) the data of the protected file unchanged by the write request.
|