| CPC H04L 63/20 (2013.01) [G06F 21/6218 (2013.01)] | 15 Claims |

|
1. A computer-implemented method comprising:
determining characteristics of a set of objects having a first sensitivity score, the characteristics including at least one of memory size, total number of words in an object, access frequency, and storage time;
associating, from the determined characteristics, a set of characteristics of the set of objects with the first sensitivity score;
creating a rules database establishing links between object characteristics and security requirements, the rules database:
linking the set of characteristics with the first sensitivity score; and
linking the first sensitivity score with a set of security requirements;
monitoring use of a computing system for an object modification, the object modification includes adding content to the object;
responsive to detecting the object modification, identifying an object being modified by the object modification and a storage location of the object, the object having a pre-defined sensitivity score, the storage location having a pre-defined security score, and the storage location being secured according to a first security protocol based on the pre-defined security score of the storage location being below a threshold value for maintaining the first security protocol;
computing a revised sensitivity score for the object during modification of characteristics of the object;
revising the pre-defined security score of the identified storage location based on the revised sensitivity score of the object stored therein to generate a revised security score of the storage location; and
responsive to the revised security score of the storage location exceeding the threshold value, taking a security action to modify the first security protocol.
|