| CPC G06F 21/53 (2013.01) [G06F 21/45 (2013.01); G06F 2221/034 (2013.01)] | 20 Claims | 

| 
               1. A system for identifying and redirecting incoming unauthorized data access requests, the system comprising: 
            at least one network communication interface; 
                at least one non-transitory storage device; and 
                at least one processing device coupled to the at least one non-transitory storage device and the at least one network communication interface, wherein the at least one processing device is configured to: 
              continuously monitor one or more incoming data access requests from one or more sources; 
                  identify that a data access request of the one or more incoming data access requests is an unauthorized request, wherein the data access request is associated with accessing data in a real-time environment; 
                  in response to identifying that the data access request is unauthorized, instantaneously generate a controlled environment that has same operational functionalities and visual functionalities as that of the real-time environment; 
                  redirect the data access request to the controlled environment; 
                  perform one or more actions in the controlled environment to capture one or more interactions associated with the data access request within the controlled environment; and 
                  automatically generate one or more controls to secure the real-time environment based on the one or more interactions captured within the controlled environment. 
                 |