Using Indicators of Behavior When Performing a Security Operation

ABSTRACT

A system, method, and computer-readable medium are disclosed for performing a security operation. The security operation includes: monitoring an entity to identify a behavior enacted by the entity, the monitoring observing at least one electronically-observable data source; deriving an observable based upon the behavior enacted by the entity; identifying an event of analytic utility, the event of analytic utility being derived from the observable from the electronic data source, the event of analytic utility comprising a behavior enacted by the entity; identifying an indicator of behavior related to the event of analytic utility, the indicator of behavior providing an abstracted description of an inferred intent associated with the behavior enacted by the entity; analyzing the event of analytic utility, the analyzing the event of analytic utility being based upon the indicator of behavior related to the event of analytic utility; and, performing a security operation based upon the inferred intent associated with the behavior enacted by the entity.

BACKGROUND OF THE INVENTION Field of the Invention

The present invention relates in general to the field of computers andsimilar technologies, and in particular to software utilized in thisfield. Still more particularly, it relates to a method, system andcomputer-usable medium for performing a human factors risk operation.

Description of the Related Art

Users interact with physical, system, data, and services resources ofall kinds, as well as each other, on a daily basis. Each of theseinteractions, whether accidental or intended, poses some degree ofsecurity risk. However, not all behavior poses the same risk.Furthermore, determining the extent of risk corresponding to individualevents can be difficult. In particular, ensuring that an entity is whothey claim to be can be challenging.

As an example, a first user may attempt to pose as a second user to gainaccess to certain confidential information. In this example, the firstuser may be prevented from accessing the confidential information if itcan be determined that they are illegitimately posing as the seconduser. More particularly, access to the confidential information may beprevented if the identity of the first user is resolved prior to theconfidential information actually being accessed. Likewise, the firstuser's access to the confidential information may be prevented if theiridentity cannot be resolved to the identity of the second user.

SUMMARY OF THE INVENTION

In one embodiment the invention relates to a computer-implementablemethod for performing a security operation, comprising: monitoring anentity to identify a behavior enacted by the entity, the monitoringobserving at least one electronically-observable data source; derivingan observable based upon the behavior enacted by the entity; identifyingan event of analytic utility, the event of analytic utility beingderived from the observable from the electronic data source, the eventof analytic utility comprising a behavior enacted by the entity;identifying an indicator of behavior related to the event of analyticutility, the indicator of behavior providing an abstracted descriptionof an inferred intent associated with the behavior enacted by theentity; analyzing the event of analytic utility, the analyzing the eventof analytic utility being based upon the indicator of behavior relatedto the event of analytic utility; and, performing the security operationbased upon the inferred intent associated with the behavior enacted bythe entity.

In another embodiment the invention relates to a system comprising: aprocessor; a data bus coupled to the processor; and a non-transitory,computer-readable storage medium embodying computer program code, thenon-transitory, computer-readable storage medium being coupled to thedata bus, the computer program code interacting with a plurality ofcomputer operations and comprising instructions executable by theprocessor and configured for: monitoring an entity to identify abehavior enacted by the entity, the monitoring observing at least oneelectronically-observable data source; deriving an observable based uponthe behavior enacted by the entity; identifying an event of analyticutility, the event of analytic utility being derived from the observablefrom the electronic data source, the event of analytic utilitycomprising a behavior enacted by the entity; identifying an indicator ofbehavior related to the event of analytic utility, the indicator ofbehavior providing an abstracted description of an inferred intentassociated with the behavior enacted by the entity; analyzing the eventof analytic utility, the analyzing the event of analytic utility beingbased upon the indicator of behavior related to the event of analyticutility; and, performing a security operation based upon the inferredintent associated with the behavior enacted by the entity.

In another embodiment the invention relates to a computer-readablestorage medium embodying computer program code, the computer programcode comprising computer executable instructions configured for:monitoring an entity to identify a behavior enacted by the entity, themonitoring observing at least one electronically-observable data source;deriving an observable based upon the behavior enacted by the entity;identifying an event of analytic utility, the event of analytic utilitybeing derived from the observable from the electronic data source, theevent of analytic utility comprising a behavior enacted by the entity;identifying an indicator of behavior related to the event of analyticutility, the indicator of behavior providing an abstracted descriptionof an inferred intent associated with the behavior enacted by theentity; analyzing the event of analytic utility, the analyzing the eventof analytic utility being based upon the indicator of behavior relatedto the event of analytic utility; and, performing a security operationbased upon the inferred intent associated with the behavior enacted bythe entity.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention may be better understood, and its numerousobjects, features and advantages made apparent to those skilled in theart by referencing the accompanying drawings. The use of the samereference number throughout the several figures designates a like orsimilar element.

FIG. 1 depicts an exemplary client computer in which the presentinvention may be implemented;

FIG. 2 is a simplified block diagram of an endpoint agent;

FIG. 3 is a simplified block diagram showing reference architecturecomponents of a security analytics environment;

FIG. 4 is a simplified block diagram of the operation of a securityanalytics system used to process information stored in an entitybehavior profile (EBP).

FIG. 5 is a simplified block diagram showing certain components of asecurity analytics system;

FIG. 6 shows a simplified block diagram of an entity behavior profile(EBP);

FIG. 7 is a simplified Venn diagram showing entity interactions betweena user entity, a non-user entity, and a data entity;

FIG. 8 shows the enactment of entity interactions between user entities,non-user entities, and data entities;

FIGS. 9a and 9b are a simplified block diagram of a security analyticsenvironment;

FIG. 10 is a simplified block diagram showing the mapping of an event toa security vulnerability scenario;

FIG. 11 is simplified block diagram of process flows associated with theoperation of an entity behavior catalog (EBC) system;

FIGS. 12a and 12b are a simplified block diagram showing referencearchitecture components of an EBC system;

FIG. 13 is a simplified block diagram showing the mapping of entitybehaviors to a risk use case scenario;

FIG. 14 is a simplified block diagram of the performance of a humanfactors risk operation;

FIG. 15 is a simplified block diagram of the performance of an entitybehavior meaning derivation operation;

FIG. 16 is a simplified block diagram of the performance of operationsto identify an enduring behavioral pattern corresponding to a particularuser entity;

FIG. 17 is a graphical representation of an ontology showing exampleemotional stressors used as a human factor;

FIG. 18 shows a mapping of data sources to emotional stressors used as ahuman factor;

FIG. 19 is a graphical representation of an ontology showing exampleorganizational dynamics used as a human factor;

FIG. 20 shows a human-centric risk modeling framework;

FIG. 21 shows security risk persona transitions associated with acorresponding outcome-oriented kill chain;

FIGS. 22a and 22b show indicators of behavior corresponding to asecurity risk persona;

FIG. 23 shows a functional block diagram of process flows associatedwith the operation of a security analytics system;

FIGS. 24a and 24b show a simplified block diagram of a distributedsecurity analytics system environment;

FIGS. 25a and 25b show tables containing human factors-centric riskmodel data used to generate a user entity risk score associated with asecurity vulnerability scenario; and

FIG. 26 shows a user interface (UI) window implemented to graphicallydisplay a user entity risk score as it changes over time.

DETAILED DESCRIPTION

A method, system and computer-usable medium are disclosed for performinga human factors risk operation. Certain aspects of the invention reflectan appreciation that the existence of any entity, whether it is anindividual user, a group of users, an organization, a device, a system,a network, an account, a domain, an operation, a process, a softwareapplication, a service, or a collection of data, represents some degreeof security risk. Certain aspects of the invention likewise reflect anappreciation that observation of human behavior can often provide anindication of possible anomalous, abnormal, unexpected, or suspiciousbehavior, any or all of which may represent a security risk.

Likewise, various aspects of the invention reflect an appreciation thatcertain human behaviors can be characterized as concerning, and as such,their occurrence may likewise provide an indication of potentialsecurity risk. Various aspects of the invention likewise reflect anappreciation that certain human factors, such as cardinal traits,emotional stressors, and organizational dynamics, all of which aredescribed in greater detail herein, often have an associated effect onhuman behavior. Certain aspects of the invention reflect an appreciationthat the quantification of such factors can likewise be advantageouslyimplemented as modifiers to a security risk score value, resulting in amore accurate assessment of security risk.

Likewise, various aspects of the invention reflect an appreciation thatknown approaches to human-centric risk modeling have certain limitationsthat often pose challenges for security-related implementation. Forexample, the Critical Pathway Model (CPM), which has evolved over twentyyears of research into insider threat, is based upon retrospectiveexamination and qualitative scoring of case studies that highlighthigh-profile insider threat cases. However, since CPM depends almostentirely on retrospective qualitative coding of case studies, there isan increased risk of hindsight and confirmation bias informing theoutcomes and creation of its categories.

Accordingly, certain aspects of the invention reflect an appreciationthat a particular entity can be assigned a measure of risk according toits respective attributes, behaviors, associated behavioral models, andresultant inferences contained in an associated profile. As an example,a first profile may have an attribute that its corresponding entityworks in the human resource department, while a second profile may havean attribute that its corresponding entity is an email server. Tocontinue the example, the first profile may have an associated behaviorthat indicates its corresponding entity is not acting as they did theday before, while the second profile may have an associated behaviorthat indicates its corresponding entity is connecting to a suspicious IPaddress.

To further continue the example, the first profile may have a resultantinference that its corresponding entity is likely to be leaving thecompany, while the second profile may have a resultant inference thatthere is a high probability its corresponding entity is compromised.Accordingly, various aspects of the invention reflect an appreciationthat a catalog of such behaviors, and associated profiles, can assist inidentifying certain entity indicators of behavior, described in greaterdetail herein. Likewise, certain aspects of the invention reflect anappreciation that such entity indicators of behavior may be determinedto be anomalous, abnormal, unexpected, or suspicious, or somecombination thereof, as likewise described in greater detail herein.

For the purposes of this disclosure, computer-readable media may includeany instrumentality or aggregation of instrumentalities that may retaindata and/or instructions for a period of time. Computer-readable mediamay include, without limitation, storage media such as a direct accessstorage device (e.g., a hard disk drive or solid state drive), asequential access storage device (e.g., a tape disk drive), opticalstorage device, random access memory (RAM), read-only memory (ROM),electrically erasable programmable read-only memory (EEPROM), and/orflash memory; as well as communications media such as wires, opticalfibers, microwaves, radio waves, and other electromagnetic and/oroptical carriers; and/or any combination of the foregoing.

FIG. 1 is a generalized illustration of an information handling system100 that can be used to implement the system and method of the presentinvention. The information handling system 100 includes a processor(e.g., central processor unit or “CPU”) 102, input/output (I/O) devices104, such as a display, a keyboard, a mouse, and associated controllers,a storage system 106, and various other subsystems 108. In variousembodiments, the information handling system 100 also includes networkport 110 operable to connect to a network 140, which is likewiseaccessible by a service provider server 142. The information handlingsystem 100 likewise includes system memory 112, which is interconnectedto the foregoing via one or more buses 114. System memory 112 furtherincludes operating system (OS) 116 and in various embodiments may alsoinclude a security analytics system 118. In one embodiment, theinformation handling system 100 is able to download the securityanalytics system 118 from the service provider server 142. In anotherembodiment, the security analytics system 118 is provided as a servicefrom the service provider server 142.

In various embodiments, the security analytics system 118 may beimplemented to perform a security analytics operation, described ingreater detail herein. In certain embodiments, the security analyticsoperation improves processor efficiency, and thus the efficiency of theinformation handling system 100, by facilitating security analyticsfunctions. As will be appreciated, once the information handling system100 is configured to perform the security analytics operation, theinformation handling system 100 becomes a specialized computing devicespecifically configured to perform the security analytics operation andis not a general purpose computing device. Moreover, the implementationof the security analytics system 118 on the information handling system100 improves the functionality of the information handling system 100and provides a useful and concrete result of performing securityanalytics functions to mitigate security risk.

In certain embodiments, the security analytics system 118 may beimplemented to include an entity behavior catalog (EBC) system 120, ahuman factors framework 122, and a risk scoring system 124, or acombination thereof. In certain embodiments, the EBC system 120 may beimplemented to catalog entity behavior, as described in greater detailherein. In certain embodiments, the human factors framework 122 may beimplemented to perform a human factors risk operation, as likewisedescribed in greater detail herein. Likewise, as described in greaterdetail herein, the security risk scoring system 124 may be implementedin various embodiments to perform certain security risk scoringoperations.

FIG. 2 is a simplified block diagram of an endpoint agent implemented inaccordance with an embodiment of the invention. As used herein, anendpoint agent 206 broadly refers to a software agent used incombination with an endpoint device 204 to establish a protectedendpoint 202. Skilled practitioners of the art will be familiar withsoftware agents, which are computer programs that perform actions onbehalf of an entity. As likewise used herein, an entity broadly refersto something that exists as itself, whether physically or abstractly.

In certain embodiments, the identity of a particular entity may be knownor unknown. In certain embodiments, an entity may be a user entity, anon-user entity, a data entity, or a combination thereof. As usedherein, a user entity broadly refers to an animate entity whose identitycan be described by certain attributes and is capable of exhibiting orenacting certain user entity behaviors, as described in greater detailherein, but is incapable of exhibiting or enacting a non-user entity ordata entity behavior. Examples of a user entity include an individualperson, a group of people, an organization, or a government.

As likewise used herein, a non-user entity broadly refers to aninanimate entity whose identity can be described by certain attributesand is capable of exhibiting or enacting certain non-user entitybehaviors, as described in greater detail herein, but is incapable ofexhibiting or enacting a user entity or data entity behavior. In certainembodiments, a non-user entity may embody a physical form. Examples of anon-user entity include an item, a device, such as endpoint 204 and edgedevices, a network, a system, an operation, and a process. Otherexamples of a non-user entity include a resource, such as a geographicallocation or formation, a physical facility, a venue, a softwareapplication, and a service, such as a service operating in a cloudenvironment.

A data entity, as used herein, broadly refers to an inanimate entitythat is a collection of information that can be described by certainattributes and is capable of exhibiting or enacting certain data entitybehaviors, as described in greater detail herein, but is incapable ofenacting a user entity or non-user entity behavior. In certainembodiments, a data entity may include some form of a digitalinstantiation of information. Examples of a data entity include anaccount, a user identifier (ID), a cryptographic key, a computer file, atext or email message, an audio or video recording, a network address,and a domain.

An entity behavior, as used herein, broadly refers to any behaviorexhibited or enacted by an entity that can be electronically observedduring the occurrence of an entity interaction. Accordingly, a userentity behavior, as used herein, broadly refers to the enactment of anentity behavior by an associated user entity. Likewise, as used herein,a non-user entity behavior broadly refers to the enactment of an entitybehavior by an associated non-user entity. As likewise used herein, adata entity behavior broadly refers to the enactment of an entitybehavior by an associated data entity.

As used herein, an entity interaction broadly refers to the occurrenceof an action associated with a first entity being influenced by anotheraction associated with a second entity. In certain embodiments, anentity interaction may include the occurrence of at least one eventenacted by one entity when interacting with another. In certainembodiments, an event associated with an entity interaction may includeat least one entity attribute, described in greater detail herein, andat least one entity behavior, likewise described in greater detailherein. As an example, a user entity may perform an action, such assending a text message to some other user entity who in turn replieswith a response. In this example, the other user entity's action ofresponding is influenced by the user entity's action of sending the textmessage.

As another example, a user may attempt to use an electronic access cardto enter a secured building at a certain time. In this example, the useof the access card to enter the building is the action and the readingof the access card makes the user's physical behaviorelectronically-observable. As another example, a first user mayphysically transfer a document to a second user, which is captured by avideo surveillance system. In this example, the physical transferal ofthe document from the first user to the second user is the action.Likewise, the video record of the transferal makes the first and seconduser's physical behavior electronically-observable.

In various approaches, a software agent may be autonomous or work inconcert with another agent, or an entity, or a combination of the two,as described in greater detail herein. In certain of these approaches,the software agent may be implemented to autonomously decide if aparticular action is appropriate for a particular event, or an observedentity behavior, or a combination of the two, as likewise described ingreater detail herein. As used herein, an event broadly refers to theoccurrence of at least one action performed by an entity. In certainembodiments, the action may be directly, or indirectly, associated withan entity behavior, described in greater detail herein. In certainembodiments, the entity behavior may include an entity's physicalbehavior, cyber behavior, or a combination thereof, as likewisedescribed in greater detail herein.

As an example, a first user may attach a binary file infected with avirus to an email that is subsequently sent to a second user. In thisexample, the act of attaching the binary file to the email is directlyassociated with an entity behavior enacted by the first user. In certainembodiments, the action may be indirectly associated with an entitybehavior. To continue the example, the recipient of the email may openthe infected binary file, and as a result, infect their computer withmalware. To further continue the example, the act of opening theinfected binary file is directly associated with an entity behaviorenacted by the second user. However, the infection of the emailrecipient's computer by the infected binary file is indirectlyassociated with the described entity behavior enacted by the seconduser.

An endpoint device 204, as likewise used herein, refers to aninformation processing system such as a personal computer, a laptopcomputer, a tablet computer, a personal digital assistant (PDA), a smartphone, a mobile telephone, a digital camera, a video camera, or otherdevice that is capable of storing, processing and communicating data. Incertain embodiments, such an endpoint device 204 may be implemented as anon-user entity. In certain embodiments, the communication of the datamay take place in real-time or near-real-time. As used herein, real-timebroadly refers to processing and providing information within a timeinterval brief enough to not be discernable by a user entity, describedin greater detail herein. As an example, a cellular phone conversationmay be used to communicate information in real-time, while an instantmessage (IM) exchange may be used to communicate information in nearreal-time.

In certain embodiments, the communication of the information may takeplace asynchronously. For example, an email message may be stored on anendpoint device 204 when it is offline. In this example, the informationmay be communicated to its intended recipient once the endpoint device204 gains access to a network 140. In certain embodiments, the network140 may be a private network (e.g., an enterprise network), asemi-public network (e.g., a service provider core network), or a publicnetwork (e.g., the Internet).

A protected endpoint 202, as likewise used herein, broadly refers to apolicy-based approach to network security that typically requires anendpoint device 204 to comply with particular criteria before it isgranted access to network resources. As an example, an endpoint device204 may be required to have a particular operating system (OS), orversion thereof, a Virtual Private Network (VPN) client, anti-virussoftware with current updates, and so forth. In certain embodiments, theprotected endpoint 202 may be implemented to perform operationsassociated with providing real-time resolution of the identity of anentity at a particular point in time, as described in greater detailherein. In certain embodiments, the protected endpoint 202 may beimplemented to provide temporal information associated with suchoperations.

As used herein, temporal information broadly refers to a measure of time(e.g., a date, timestamp, etc.), a measure of an interval of time (e.g.,a minute, hour, day, etc.), or a measure of an interval of time (e.g.,two consecutive weekdays days, or between Jun. 3, 2017 and Mar. 4, 2018,etc.). In certain embodiments, the temporal information may beassociated with an event associated with a particular point in time. Asused herein, such a temporal event broadly refers to an occurrence of anaction enacted by, or associated with, an entity at a particular pointin time.

Examples of such temporal events include making a phone call, sending atext or an email, using a device, such as an endpoint device 204,accessing a system, and entering a physical facility. Other examples oftemporal events include uploading, transferring, downloading, modifying,or deleting data, such as data stored in a datastore, or accessing aservice. Yet other examples of temporal events include entityinteractions between two or more users, entity interactions between auser and a device, entity interactions between a user and a network, andentity interactions between a user and a resource, whether physical orotherwise. Yet still other examples of temporal events include a changein name, address, physical location, occupation, position, role, maritalstatus, gender, association, affiliation, or assignment.

As likewise used herein, temporal event information broadly refers totemporal information associated with a particular event. In variousembodiments, the temporal event information may include certain types ofcontent. In certain embodiments, such types of content may include text,unstructured data, structured data, graphical images, photographs, audiorecordings, video recordings, and so forth. In certain embodiments, thetemporal event information may include metadata. In various embodiments,the metadata may include temporal event attributes, which in turn mayinclude certain entity identifier types or classifications, described ingreater detail herein.

In certain embodiments, the real-time resolution of the identity of anentity at a particular point in time may be based upon contextualinformation associated with a particular entity behavior. As usedherein, contextual information broadly refers to any information,directly or indirectly, individually or in combination, related to aparticular entity behavior. In certain embodiments, entity behavior mayinclude an entity's physical behavior, cyber behavior, or a combinationthereof. As likewise used herein, physical behavior broadly refers toany entity behavior occurring within a physical realm. Moreparticularly, physical behavior may include any action enacted by anentity that can be objectively observed, or indirectly inferred, withina physical realm.

Cyber behavior, as used herein, broadly refers to any behavior occurringin cyberspace, whether enacted by an individual entity, a group ofentities, or a system acting at the behest of an individual entity, agroup of entities, or other entity described in greater detail herein.More particularly, cyber behavior may include physical, social, ormental actions enacted by a user entity that can be objectivelyobserved, or indirectly inferred, within cyberspace. As an example, auser may use an endpoint device 204 to access and browse a particularwebsite on the Internet. In this example, the individual actionsperformed by the user to access and browse the website constitute acyber behavior.

As another example, a user may use an endpoint device 204 to download adata file from a particular system at a particular point in time. Inthis example, the individual actions performed by the user to downloadthe data file, and associated temporal information, such as a time-stampassociated with the download, constitute a cyber behavior. In theseexamples, the actions are enacted within cyberspace, in combination withassociated temporal information, makes them electronically-observable.

As likewise used herein, cyberspace broadly refers to a network 140environment capable of supporting communication between two or moreentities. In certain embodiments, the entity may be a user, an endpointdevice 204, or various resources, described in greater detail herein. Incertain embodiments, the entities may include various endpoint devices204 or resources operating at the behest of an entity, such as a user.In certain embodiments, the communication between the entities mayinclude audio, image, video, text, or binary data.

As described in greater detail herein, the contextual information mayinclude an entity's authentication factors. Contextual information maylikewise include various temporal identity resolution factors, such asidentification factors associated with the entity, thedate/time/frequency of various entity behaviors, the entity's location,a user entity's role or position in an organization, their associatedaccess rights, and certain user gestures employed by a user in theenactment of a user entity behavior. Other contextual information maylikewise include various user entity interactions, whether theinteractions are with a non-user entity, a data entity, or another userentity. In certain embodiments, user entity behaviors, and their relatedcontextual information, may be collected at particular points ofobservation, and at particular points in time, described in greaterdetail herein. In certain embodiments, a protected endpoint 202 may beimplemented as a point of observation for the collection of entitybehavior and contextual information.

In certain embodiments, the endpoint agent 206 may be implemented touniversally support a variety of operating systems, such as APPLEMACINTOSH®, MICROSOFT WINDOWS®, LINUX®, ANDROID® and so forth. Incertain embodiments, the endpoint agent 206 may be implemented tointeract with the endpoint device 204 through the use of low-level hooks212 at the operating system level. It will be appreciated that the useof low-level hooks 212 allows the endpoint agent 206 to subscribe tomultiple events through a single hook. Consequently, multiplefunctionalities provided by the endpoint agent 206 can share a singledata stream, using only those portions of the data stream they mayindividually need. Accordingly, system efficiency can be improved andoperational overhead reduced.

In certain embodiments, the endpoint agent 206 may be implemented toprovide a common infrastructure for pluggable feature packs 208. Invarious embodiments, the pluggable feature packs 208 may provide certainsecurity management functionalities. Examples of such functionalitiesmay include various anti-virus and malware detection, data lossprotection (DLP), insider threat detection, and so forth. In certainembodiments, the security management functionalities may include one ormore functionalities associated with providing real-time resolution ofthe identity of an entity at a particular point in time, as described ingreater detail herein.

In certain embodiments, a particular pluggable feature pack 208 may beinvoked as needed by the endpoint agent 206 to provide a givenfunctionality. In certain embodiments, individual features of aparticular pluggable feature pack 208 are invoked as needed. In certainembodiments, the individual features of a pluggable feature pack 208 maybe invoked by the endpoint agent 206 according to the occurrence of aparticular entity behavior. In certain embodiments, the individualfeatures of a pluggable feature pack 208 may be invoked by the endpointagent 206 according to the occurrence of a particular temporal event,described in greater detail herein. In certain embodiments, theindividual features of a pluggable feature pack 208 may be invoked bythe endpoint agent 206 at a particular point in time. In theseembodiments, the method by which a particular entity behavior, temporalevent, or point in time is selected is a matter of design choice.

In certain embodiments, the individual features of a pluggable featurepack 208 may be invoked by the endpoint agent 206 according to thecontext of a particular entity behavior. As an example, the context maybe a user enacting a particular user entity behavior, their associatedrisk classification, which resource they may be requesting, the point intime the user entity behavior is enacted, and so forth. In certainembodiments, the pluggable feature packs 208 may be sourced from variouscloud services 216. In certain embodiments, the pluggable feature packs208 may be dynamically sourced from various cloud services 216 by theendpoint agent 206 on an as-needed basis.

In certain embodiments, the endpoint agent 206 may be implemented withadditional functionalities, such as event analytics 210. In variousembodiments, the event analytics 210 functionality may include analysisof certain entity behaviors, described in greater detail herein. Thoseof skill in the art will recognize that many such embodiments andexamples are possible. Accordingly, the foregoing is not intended tolimit the spirit, scope or intent of the invention.

FIG. 3 is a simplified block diagram showing reference architecturecomponents of a security analytics environment. In certain embodiments,the security analytics environment 300 may be implemented to include asecurity analytics system 118, a network 140, one or more endpointdevices 204, and one or more edge devices 304. In various embodiments,the security analytics system 118 may be implemented to perform certainsecurity analytics operations. As used herein, a security analyticsoperation broadly refers to any operation performed to determine asecurity risk corresponding to a particular event, or an entity behaviorenacted by an associated entity, or a combination thereof.

In certain embodiments, the security analytics system 118 may beimplemented as both a source and a sink of entity behavior information302. As used herein, entity behavior information 302 broadly refers toany information related to the enactment of a behavior by an associatedentity. In various embodiments, the security analytics system 118 may beimplemented to serve requests for certain entity behavior information302. In certain embodiments, the edge device 304 and the endpoint agent206, individually or in combination, may provide certain entity behaviorinformation 302 to the security analytics system 118, respectively usingpush or pull approaches familiar to skilled practitioners of the art.

As used herein, an edge device 304 broadly refers to a device providingan entry point into a network, such as the network 140 shown in FIG. 3.Examples of such edge devices 304 include routers, routing switches,integrated access devices (IADs), multiplexers, wide-area network (WAN)access devices, network security appliances, and so forth. In certainembodiments, the edge device 304 may be implemented in a bridge, afirewall, or a passive monitoring configuration. In certain embodiments,the edge device 304 may be implemented as software running on aninformation processing system.

In certain embodiments, the edge device 304 may be implemented toprovide access to the security analytics system 118 via the network 140.In certain embodiments, the edge device 304 may be implemented toprovide access to and from the network 140, a third party network 310,and a security analytics service 308, or a combination thereof. Incertain embodiments, the network 140 and third party networks 310 mayrespectively be a private network (e.g., an enterprise network), asemi-public network (e.g., a service provider core network), or a publicnetwork (e.g., the Internet). In certain embodiments, the edge device304 may be implemented to provide access to a third party system 312 viathe third party network 310.

In certain embodiments, the edge device 304 may be implemented toprovide support for a variety of generic services, such as directoryintegration, logging interfaces, update services, and bidirectionalrisk/context flows associated with various security analyticsoperations, described in greater detail herein. In certain embodiments,the edge device 304 may be implemented to provide temporal information,likewise described in greater detail herein, associated with theprovision of such services. In certain embodiments, the edge device 304may be implemented as a generic device configured to host variousnetwork communications, data processing, and security managementcapabilities. In certain embodiments, such capabilities may include theperformance of operations associated with providing real-time resolutionof the identity of an entity at a particular point in time. In certainembodiments, such operations may likewise include the provision ofassociated temporal information (e.g., time stamps).

In certain embodiments, the edge device 304 may be implemented toreceive network requests and context-sensitive entity behaviorinformation 302, described in greater detail herein, from an endpointagent 206. The edge device 304 may be implemented in certain embodimentsto receive enriched entity behavior information 302 from the endpointagent 206. In various embodiments, certain entity behavior information302 may be enriched by an associated endpoint agent 206 attachingcontextual information to a request.

In various embodiments, the contextual information may be embeddedwithin a network request, which is then provided as enriched entitybehavior information 302. In various embodiments, the contextualinformation may be concatenated, or appended, to a request, which inturn is provided as enriched entity behavior information 302. In certainof these embodiments, the enriched entity behavior information 302 maybe unpacked upon receipt by the edge device 304 and parsed to separatethe request and its associated contextual information. Those of skill inthe art will recognize that one possible disadvantage of such anapproach is that it may perturb certain Intrusion Detection Systemand/or Intrusion Detection Prevention (IDS/IDP) systems implemented onthe network 140 or third party network 310.

In various embodiments, new flow requests may be accompanied by acontextual information packet sent to the edge device 304. In certain ofthese embodiments, the new flow requests may be provided as enrichedentity behavior information 302. In certain embodiments, the endpointagent 206 may also send updated contextual information to the edgedevice 304 once it becomes available. As an example, an endpoint agent206 may share a list of files that have been read by a current processat any point in time once the information has been collected. Tocontinue the example, such a list of files may be used to determinewhich data the endpoint agent 206 may be attempting to exfiltrate.

In certain embodiments, such service requests may be associated withtemporal event information, described in greater detail herein.Consequently, such requests can be enriched by the addition ofcontextual entity information (e.g., UserAccount, interactive/automated,data-touched, etc.). Accordingly, the edge device 304 can then use thisinformation to manage the appropriate response to submitted requests. Incertain embodiments, such requests may be associated with providingreal-time resolution of the identity of an entity at a particular pointin time.

In certain embodiments, point analytics processes executing on the edgedevice 304 may request a particular service. As an example, risk scoreson a per-entity basis may be requested. In certain embodiments, theservice may be requested from the security analytics system 118. Incertain embodiments, the service may be requested from a securityanalytics service 308. In certain embodiments, the security analyticssystem 118 may be implemented to provide the security analytics service308. In certain embodiments, hosting of the security analytics service308 may be provided by a cloud infrastructure familiar to those of skillin the art.

In certain embodiments, the endpoint agent 206 may be implemented toupdate the security analytics system 118 with entity behaviorinformation 302 and associated contextual information, thereby allowingan offload of certain analytics processing overhead. In variousembodiments, this approach may be implemented to provide longitudinalrisk scoring, which assesses security risk associated with certainentity behavior during a particular interval of time. In certainembodiments, the security analytics system 118 may be implemented toperform risk-adaptive operations to access risk scores associated withthe same user entity, but accrued on different endpoint devices 204.Certain embodiments of the invention reflect an appreciation that suchan approach may prove advantageous when an adversary is “movingsideways” through a network environment, using different endpointdevices 204 to collect information.

Certain embodiments of the invention reflect an appreciation thatenriched entity behavior information 302 will likely not be availablefor provision to the edge device 304 if an endpoint agent 206 is notimplemented for a corresponding endpoint device 204. However, the lackof such enriched entity behavior information 302 may be accommodated invarious embodiments, albeit with reduced functionality associated withcertain security analytics operations.

In certain embodiments, the edge device 304 may be implemented as ageneric device configured to host various network communications, dataprocessing, and security management capabilities. In certainembodiments, such capabilities may include the performance of operationsassociated with providing real-time resolution of the identity of anentity at a particular point in time. In certain embodiments, suchoperations may likewise include the provision of associated temporalinformation (e.g., time stamps).

In certain embodiments, the security analytics system 118 may beimplemented in different operational configurations. In variousembodiments, the security analytics system 118 may be implemented foruse by the endpoint agent 206. In various embodiments, the securityanalytics system 118 may be implemented for use by the endpoint agent206 and the edge device 304 in combination. In various embodiments, thesecurity analytics service 308 may likewise be implemented for use bythe endpoint agent 206, the edge device 304, and the security analyticssystem 118, individually or in combination. In certain of theseembodiments, the security analytics system 118 may be primarily orientedto performing security risk assessment operations related to one or moreentity's associated entity behaviors.

In certain embodiments, the security analytics system 118 may beprimarily oriented to applying risk mitigations in a way that maximizessecurity effort return-on-investment (ROI). In certain embodiments, suchapproaches may be accomplished by providing additional contextual andentity behavior information associated with entity requests. As anexample, a web gateway may not concern itself with why a particular fileis being requested by a certain entity at a particular point in time.Accordingly, if the file cannot be identified as malicious or harmless,there is no context available to determine how, or if, to proceed.

To extend the example, the edge device 304 and security analytics system118 may be coupled such that requests can be contextualized and fittedinto a framework that evaluates their associated risk. Certainembodiments of the invention reflect an appreciation that such anapproach works well with web-based data loss protection (DLP)approaches, as each transfer is no longer examined in isolation, but inthe broader context of an identified user entity's actions, at aparticular time.

In certain embodiments, the security analytics system 118 may beprimarily oriented to maximally leverage contextual informationassociated with various entity behaviors within the system. In certainembodiments, data flow tracking is performed by one or more endpointagents 206, which allows the quantity and type of information associatedwith particular entities to be measured. In turn, this information maybe used to determine how a particular edge device 304 handles requests.Skilled practitioners of the art will recognize that many suchembodiments and examples are possible. Accordingly, the foregoing is notintended to limit the spirit, scope or intent of the invention.

FIG. 4 is a simplified block diagram of the operation of a securityanalytics system implemented in accordance with an embodiment of theinvention to process information stored in an entity behavior profile(EBP). In various embodiments, a security analytics system 118 may beimplemented to use certain information stored in an EBP 420 to perform asecurity analytics operation, described in greater detail herein. Asused herein, an entity behavior profile 420 broadly refers to acollection of information that uniquely describes a particular entity'sidentity and their associated behavior, whether the behavior occurswithin a physical realm or cyberspace. In certain embodiments, thesecurity analytics system 118 may be implemented to use certain event402 and human factor 406 information in the performance of a particularsecurity analytics operation.

In certain embodiments, the security analytics system 118 may beimplemented with an entity behavior catalog (EBC) system 120, a humanfactors framework 122, and a risk scoring system 124, or a combinationthereof. In various embodiments, the human factors framework 122 may beimplemented to receive and process certain human factor 406 informationto generate one or more human factors 430. In certain embodiments, theEBC system 120 may be implemented to store the resulting human factors430 in a user entity profile 422, described in greater detail herein.

As used herein, human factors 430 broadly refer to certain cardinaltraits, emotional stressors, and organizational dynamics thatindividually, or in combination, may influence, one way or another, theentity behavior of an associated user entity. As an example, an employeeexperiencing financial stress may attempt to exfiltrate proprietary datain exchange for compensation from a competitor. As used herein, cardinaltraits broadly refers to a user entity's consistent and enduringobserved entity behavioral patterns. As likewise used herein, anemotional stressor broadly refers to any event involving an end userentity such that it may have an emotional influence upon, or otherwiseaffect, a user entity's behavior. An organizational dynamic, as likewiseused herein, broadly refers to any event that occurs within anorganization, or large group, that may have an operational influenceupon, or otherwise affect, a user entity's behavior.

In various embodiments, the human factors framework 122 may beimplemented with a human factors analytics 408 module, a contextualsecurity risk persona management 410 module, and certain user entitybehavioral rules 412, or a combination thereof. In certain embodiments,the human factors analytics 408 module may be implemented to perform ahuman factors analytics operation. As used herein, a human factorsanalytics operation broadly refers to any operation performed to analyzethe effect that certain human factors, individually or in combination,may have on the security risk corresponding to an entity behaviorenacted by an associated user entity. In certain embodiments, thesecurity risk persona management 410 module may be implemented tocreate, revise, update, or otherwise manage a particular security riskpersona, described in greater detail herein, associated with aparticular user entity.

In various embodiments, the human factors framework 122 may beimplemented to create, revise, update, or otherwise manage certain userbehavioral rules 412 associated with a particular user entity. Incertain embodiments, the user behavioral rules 412 may be implemented todetermine whether a particular user entity behavior is anomalous,abnormal, unexpected, suspicious, or some combination thereof. Incertain embodiments, the human factors framework 122 may be implementedto use the user behavioral rules 412 to determine whether certain userentity behaviors that are determined to be anomalous, abnormal,unexpected, suspicious, or some combination thereof, may likewise beconsidered to be a concerning behavior within a particular context.

In various embodiments, the EBC system 120 may be implemented to processa stream 404 of event 402 information to generate, revise, and otherwisemanage certain information contained in an EBP 420. In certainembodiments, the EBP 420 may be implemented to include a user entityprofile 422, a non-user entity profile 440, a data entity profile 450,one or more entity risk scores 460, one or more entity states 462, andone or more entity models, or a combination thereof. As used herein, auser entity profile 422 broadly refers to a collection of informationthat uniquely identifies and describes a particular user entity identityand their associated entity behavior, whether the behavior occurs withina physical realm or cyberspace. As likewise used herein, a non-userentity profile 440 broadly refers to a collection of information thatuniquely identifies and describes a particular non-user entity identityand its associated entity behavior, whether the behavior occurs within aphysical realm or cyberspace. A data entity profile 450, as likewiseused herein, broadly refers to a collection of information that uniquelyidentifies and describes a particular data entity, described in greaterdetail herein, and its associated entity behavior, whether the behavioroccurs within a physical realm or cyberspace.

In various embodiments, the user entity profile 422 may be implementedto contain certain attribute 424, behavior 426, and inference 430 datarelated to a particular user entity. In certain embodiments, theattribute 424 data may include information associated with a particularuser entity's inherent and learned 426 attributes. In certainembodiments, the attribute 424 data may be used by the human factorsframework 122 to gain knowledge or insights about a particular userentity and their associated user entity behavior.

In certain embodiments, a user entity's inherent and learned attributes426 may include known facts, such as their location and contactinformation, their job title and responsibilities, their peers andmanager, and so forth. In certain embodiments, a user entity's inherentand learned attributes 426 may be derived through observation, asdescribed in greater detail herein. Examples of such derived inherentand learned attributes 426 include which devices a user entity maytypically use, their usual work hours and habits, their interactionswith other entities, and so forth.

In certain embodiments, the behavior 428 data may include informationassociated with a particular user entity's human factors 430, describedin greater detail herein. In certain embodiments, the behavior 428 datamay include information associated with a particular user entity'sinteractions with other entities, likewise described in greater detailherein. In certain embodiments, the inference 432 data may includeinformation associated with certain security risk use cases, securityrisk personas, and security vulnerability scenarios 434, or acombination thereof, related to a particular user entity.

As used herein, a security risk use case broadly refers to a set ofindicators of behavior that create a security risk narrative that can beused to adaptively draw inferences, described in greater detail herein,from entity behavior enacted by a particular entity. As used herein, anindicator of behavior (IOB) broadly refers to an abstracted descriptionof the inferred intent of the enactment of one or more entity behaviors,described in greater detail herein, by an associated entity. In certainembodiments, information related to the enactment of a particular entitybehavior may be stored in the form of an observable. As used herein, anobservable broadly refers to certain event information corresponding toan electronically-observable behavior enacted by an entity. In certainembodiments, an IOB is derived from a group of associated observablescorresponding to the enactment of a particular entity behavior.

As an example, a user entity may enact certain entity behavior thatresults in the occurrence of one or more operating system (OS) events, acloud access security broker (CASB) event, a firewall access event, anda data file download event. In this example, the events are observables.To continue the example, an IOB of “user downloaded document” can beinferred from the observables.

Skilled practitioners of the art will be familiar with the concept of anindicator of compromise (IOC), which is an artifact on a system ornetwork that indicate a malicious activity has occurred. Known examplesof IOCs include file hashes, network addresses, domain names, and soforth. As such, IOCs are useful in identifying and preventing adversaryattacks based upon unique signatures of malware or other tools used byan attacker. However, IOCs are less effective against insider threats,such as data exfiltration. Accordingly, certain embodiments of theinvention reflect an appreciation that IOBs can provide a description ofthe approach an attack is taking as it is occurring, unlike an IOC,which provides evidence of an attack after it has taken place.

As likewise used herein, a security risk persona broadly refers to adescriptor characterizing an entity behavioral pattern exhibited by auser entity during the enactment of certain user entity behaviors. Incertain embodiments, the security risk persona may directly orindirectly characterize, or otherwise reference, one or more user entitybehaviors. As an example, a user entity may exhibit user entitybehaviors typically associated with data stockpiling. In this example,the security risk persona for the user entity might be “DataStockpiler,” or “Stockpiler.” Likewise, as used herein, a securityvulnerability scenario broadly refers to a grouping of one or moresecurity risk use cases that represent a particular class of securityvulnerability.

In various embodiments, the human factors framework 122 may beimplemented in combination with the EBC system 122 to store certainhuman factors information in the EBP 420 and retrieve it therefrom. Incertain embodiments, the attribute 424, behavior 428, and inference 432data stored in the user entity profile 422 may be used individually, orin combination, by the human factors framework 122 to perform a humanfactors risk operation. As used herein, a human factors risk operationbroadly refers to any operation performed to identify a human factor430, classify it into a corresponding human factor class, or determinethe effect it may have on the security risk represented by an associatedJOB, or a combination thereof.

In various embodiments, the security analytics system 118 may beimplemented to use certain information stored in the EBP 420 to drawinferences 432 regarding the trustworthiness of a particular entity. Incertain embodiments, as described in greater detail herein, the drawingof the inferences may involve comparing a new entity behavior to knownpast behaviors enacted by the entity. In certain embodiments, new entitybehavior that is different from known past behaviors may represententity behavior signifying an associated security risk.

In certain embodiments, the risk scoring system 124 may be implementedto use such inferences 432, and other information stored in the EBP 420to generate one or more entity risk scores 460. In certain embodiments,the resulting entity risk scores 460 may be quantitative, qualitative,or combination of the two. In certain embodiments, the EBC system 120may be implemented to manage information associated with such riskscores 460 in the EBP 420.

As used herein, entity state 462 broadly refers to the context of aparticular event as it relates to an associated entity behavior. Incertain embodiments, the entity state 462 may be a long-term entitystate or a short-term entity state. As used herein, a long-term entitystate 462 broadly relates to an entity state 462 that persists for anextended interval of time, such as six months or a year. As likewiseused herein, a short-term entity state 462 broadly relates to an entitystate 462 that occurs for a brief interval of time, such as a fewminutes or a day. In various embodiments, the method by which an entitystate's 462 associated interval of time is considered to be long-term orshort-term is a matter of design choice.

As an example, a particular user may have a primary work location, suchas a branch office, and a secondary work location, such as theircompany's corporate office. In this example, the user's primary andsecondary offices respectively correspond to the user's location,whereas the presence of the user at either office corresponds to anentity state 462. To continue the example, the user may consistentlywork at their primary office Monday through Thursday, but at theircompany's corporate office on Fridays. To further continue the example,the user's presence at their primary work location may be a long-termentity state 462, while their presence at their secondary work locationmay be a short-term entity state 462. Consequently, the long-term userentity state 462 on Monday through Thursday will typically be “workingat the branch office” and the short-term entity state 462 on Friday willlikely be “working at the corporate office.”

As used herein, an entity behavior model 464 broadly refers to acollection of information related to an entity's historical entitybehavior over a particular period of time. In certain embodiments, anentity behaviour model 464 may be used by the security analytics system118 to gain insight into how unexpected a set of events may be. As anexample, an entity behavior model 464 may include information related towhere a particular user entity works, which devices they may use andlocations they may login from, who they may communicate with, and soforth. Certain embodiments of the invention reflect an appreciation thatsuch entity behavior models 454 can be useful when comparing currentlyobserved entity behaviors to past observations in order to determine howunusual a particular entity behavior may be.

For example, a user may have multiple entity behavior models 454, eachassociated with a particular channel, which as used herein broadlyrefers to a medium capable of supporting the electronic observation ofentity behavior, such as a keyboard, a network, a video stream, and soforth. To continue the example, the user may have a particular set ofpeople he sends emails to from his desktop computer, and does so in anorderly and methodical manner, carefully choosing his words, and writinglonger than average messages compared to his peers. Consequently,analysis of such an email message will likely indicate it was authoredby the user and not someone else.

In various embodiments, the security analytics system 118 may beimplemented to perform a security operation 470. As used herein, asecurity operation 470 broadly refers to any action performed tomitigate an identified security risk. In certain embodiments, thesecurity analytics system 118 may be implemented to identify thesecurity risk. In various embodiments, the security analytics system 118may be implemented to use certain information contained in the EBP 420to either identify the security risk, or perform the security operation470, or a combination of the two. In certain embodiments, the securitysystem 118 may be implemented to perform the security operation 470automatically or semi-automatically. Those of skill in the art willrecognize that many such embodiments are possible. Accordingly, theforegoing is not intended to limit the spirit, scope, or intent of theinvention.

FIG. 5 is a simplified block diagram showing certain components of asecurity analytics system implemented in accordance with an embodimentof the invention. In certain embodiments, the security analytics system118 shown in FIG. 5 may include an event queue analytics 504 sub-system.In certain embodiments, the event queue analytics 504 sub-system may beimplemented to include an enrichment 506 module and a streaminganalytics 508 module. In certain embodiments, the security analyticssystem 118 may be implemented to provide log storage, reporting, andanalytics capable of performing streaming 508 and on-demand 410analytics operations.

In certain embodiments, such operations may be associated with definingand managing an entity behavior profile (EBP), described in greaterdetail herein. In certain embodiments, an EBP may be implemented as anadaptive trust profile (ATP). In certain embodiments, as likewisedescribed in greater detail herein, an EBP may be implemented to detectentity behavior that may be anomalous, abnormal, unexpected, orsuspicious, or a combination thereof.

In certain embodiments, the security analytics system 118 may beimplemented to provide a uniform platform for storing events andcontextual information associated with various entity behaviors andperforming longitudinal analytics. As used herein, longitudinalanalytics broadly refers to performing analytics of entity behaviorsoccurring over a particular period of time. As an example, an entity mayiteratively attempt to access certain proprietary information stored invarious locations. In addition, the attempts may occur over a briefperiod of time. To continue the example, the fact that the informationthe user is attempting to access is proprietary, that it is stored invarious locations, and the attempts are occurring in a brief period oftime, in combination, may indicate the user entity behavior enacted bythe user is suspicious. As another example, certain entity identifierinformation (e.g., a user name) associated with an entity may changeover time. In this example, a change in the entity's user name, during aparticular time period or at a particular point in time, may representsuspicious entity behavior.

In certain embodiments, the security analytics system 118 may beimplemented to be scalable. In certain embodiments, the securityanalytics system 118 may be implemented in a centralized location, suchas a corporate data center. In these embodiments, additional resourcesmay be added to the security analytics system 118 as needs grow. Incertain embodiments, the security analytics system 118 may beimplemented as a distributed system. In these embodiments, the securityanalytics system 118 may span multiple information handling systems. Incertain embodiments, the security analytics system 118 may beimplemented in a cloud environment. In certain embodiments, the securityanalytics system 118 may be implemented in a virtual machine (VM)environment. In such embodiments, the VM environment may be configuredto dynamically and seamlessly scale the security analytics system 118 asneeded. Skilled practitioners of the art will recognize that many suchembodiments are possible. Accordingly, the foregoing is not intended tolimit the spirit, scope or intent of the invention.

In certain embodiments, an event stream collector 502 may be implementedto collect event and related contextual information, described ingreater detail herein, associated with various entity behaviors. Inthese embodiments, the method by which the event and contextualinformation is selected to be collected by the event stream collector502 is a matter of design choice. In certain embodiments, the event andcontextual information collected by the event stream collector 502 maybe processed by an enrichment module 506 to generate enriched entitybehavior information. In certain embodiments, the enrichment may includecertain contextual information related to a particular entity behavioror event. In various embodiments, the enrichment may include certaintemporal information, such as timestamp information, related to aparticular entity behavior or event.

In certain embodiments, enriched entity behavior information may beprovided by the enrichment module 506 to a streaming 508 analyticsmodule. In turn, the streaming 508 analytics module may provide some orall of the enriched entity behavior information to an on-demand 510analytics module. As used herein, streaming 408 analytics broadly refersto analytics performed in near real-time on enriched entity behaviorinformation as it is received. Likewise, on-demand 510 analytics broadlyrefers herein to analytics performed, as they are requested, on enrichedentity behavior information after it has been received. In certainembodiments, the enriched entity behavior information may be associatedwith a particular event. In certain embodiments, the enrichment 506 andstreaming analytics 508 modules may be implemented to perform eventqueue analytics 504 operations, as described in greater detail herein.

In certain embodiments, the on-demand 510 analytics may be performed onenriched entity behavior associated with a particular interval of, orpoint in, time. In certain embodiments, the streaming 508 or on-demand510 analytics may be performed on enriched entity behavior associatedwith a particular user, group of users, one or more non-user entities,or a combination thereof. In certain embodiments, the streaming 408 oron-demand 510 analytics may be performed on enriched entity behaviorassociated with a particular resource, such as a facility, system,datastore, or service. Those of skill in the art will recognize thatmany such embodiments are possible. Accordingly, the foregoing is notintended to limit the spirit, scope or intent of the invention.

In certain embodiments, the results of various analytics operationsperformed by the streaming 508 or on-demand 510 analytics modules may beprovided to a storage Application Program Interface (API) 514. In turn,the storage API 512 may be implemented to provide access to certain datasources 520, such as datastores ‘1’ 516 through ‘n’ 518. In certainembodiments, the datastores ‘1’ 516 through ‘n’ 518 may variouslyinclude a datastore of entity identifiers, temporal events, or acombination thereof. In certain embodiments, the storage API 512 may beimplemented to provide access to repositories of event 512, entitybehavior catalog (EBC) 540, security analytics 550, and security riskscoring 560 data, or a combination thereof. In various embodiments, thedata stores ‘1’ 516 through ‘n’ 518 may be implemented to store theresults of certain security analytics operations.

In certain embodiments, the security analytics system 118 may beimplemented with a logging and reporting front-end 512, which is used toreceive the results of analytics operations performed by the streaming508 analytics module. In certain embodiments, the security analyticssystem 118 may be implemented to include and entity behavior catalogsystem 120, or a human factors framework 122, or both. In certainembodiments, the human factors framework 122 may be implemented toreceive human factors information, described in greater detail herein,from a human factors data collector 522. In various embodiments, theentity behavior catalog system 120 and the human factors framework 122may respectively be implemented to use the storage API 514 to accesscertain data stored in the data sources 520, the repositories of event530, entity behavior catalog (EBC) 540, security analytics 550, andsecurity risk scoring 560 data, or a combination thereof.

In certain embodiments, the security analytics system 118 may include arisk scoring system 124 implemented to perform risk scoring operations,described in greater detail herein. In certain embodiments,functionalities of the risk scoring system 124 may be provided in theform of a risk management service 524. In various embodiments, the riskmanagement service 524 may be implemented to perform certain operationsassociated with defining and managing an entity behavior profile (EBP),as described in greater detail herein. In certain embodiments, the riskmanagement service 524 may be implemented to perform operationsassociated with detecting entity behavior that may be of analyticutility and adaptively responding to mitigate risk, as described ingreater detail herein.

In certain embodiments, the risk management service 524 may beimplemented to provide the results of various analytics operationsperformed by the streaming 506 or on-demand 508 analytics modules. Incertain embodiments, the risk management service 524 may be implementedto use the storage API 514 to access various enhanced cyber behavior andanalytics information stored on the data sources 520, the repositoriesof event 530, EBC 540, security analytics 550, and security risk scoring560 data, or a combination thereof. Skilled practitioners of the artwill recognize that many such embodiments are possible. Accordingly, theforegoing is not intended to limit the spirit, scope or intent of theinvention.

FIG. 6 shows a simplified block diagram of an entity behavior profile(EBP) implemented in accordance with an embodiment of the invention. Incertain embodiments, a security analytics system 118, described ingreater detail herein, may be implemented to include an entity behaviorcatalog (EBC) system 120, a human factors framework 122, and a securityrisk scoring system 124, or a combination thereof. In certainembodiments, the security analytics system 118 may be implemented toaccess a repository of event 530, EBC 540, security analytics 550, andsecurity risk scoring 560 data, or a combination thereof. In variousembodiments, the security analytics system 118 may be implemented to usecertain information stored in the repository of event 530, EBC 540,security analytics 550, and security risk scoring 560 data, or acombination thereof, to perform a security analytics operation,described in greater detail herein. In certain embodiments, the resultsof a particular security analytics operation may be stored in therepository of security analytics 550 data.

In certain embodiments, the EBC system 120 may be implemented togenerate, manage, store, or some combination thereof, informationrelated to the behavior of an associated entity. In certain embodiments,the information related to the behavior of a particular entity may bestored in the form of an entity behavior profile (EBP) 420. In certainembodiments, the EBC system 120 may be implemented to store theinformation related to the behavior of a particular entity in therepository of EBC 540 data. In various embodiments, the EBC system 120may be implemented to generate certain information related to thebehavior of a particular entity from event information associated withthe entity, as described in greater detail herein. In certainembodiments, event information associated with a particular entity maybe stored in the repository of event 530 data.

In various embodiments, the EBC system 120 may be implemented as a cyberbehavior catalog. In certain of these embodiments, the cyber behaviorcatalog may be implemented to generate, manage, store, or somecombination thereof, information related to cyber behavior, described ingreater detail herein, enacted by an associated entity. In variousembodiments, as likewise described in greater detail herein, theinformation generated, managed, stored, or some combination thereof, bysuch a cyber behavior catalog may be related to cyber behavior enactedby a user entity, a non-user entity, or a data entity, or a combinationthereof.

In various embodiments, the EBC system 120 may be implemented to performEBP 420 management operations to process certain entity behaviorinformation, described in greater detail herein, and entity attributeinformation associated, with defining and managing an EBP 420. As usedherein, entity attribute information broadly refers to informationassociated with a particular entity that can be used to uniquelyidentify the entity, and describe certain associated properties, or acombination thereof. In various embodiments, the entity attributeinformation may include certain types of content. In certainembodiments, such content may include text, unstructured data,structured data, graphical images, photographs, audio recordings, videorecordings, biometric information, and so forth. In certain embodiments,the entity attribute information may include metadata. In certainembodiments, the metadata may include entity attributes, which in turnmay include certain entity identifier types or classifications.

In certain embodiments, the entity attribute information may includeentity identifier information. In various embodiments, the EBC system120 may be implemented to use certain entity identifier information toascertain the identity of an associated entity at a particular point intime. As used herein, entity identifier information broadly refers to aninformation element associated with an entity that can be used toascertain or corroborate the identity of its corresponding entity at aparticular point in time. In various embodiments, the entity identifierinformation may include certain user entity 422, non-user entity 440,and data 450 entity profile attributes, or a combination thereof.

In certain embodiments, the entity identifier information may includetemporal information, described in greater detail herein. In variousembodiments, the security analytics system 118 may be implemented to usecertain aspects of the EBC system 120 and such temporal information toassess the risk associated with a particular entity, at a particularpoint in time, and respond with a corresponding security operation,likewise described in greater detail herein. In certain embodiments, thesecurity analytics system 118 may be implemented to respond to suchassessments in order to reduce operational overhead and improve systemefficiency while maintaining associated security and integrity. Incertain embodiments, the response to such assessments may be performedby a security administrator. Accordingly, certain embodiments of theinvention may be directed towards assessing the risk associated with theaffirmative resolution of the identity of an entity at a particularpoint in time in combination with its behavior and associated contextualinformation, such as human factors 430 information, described in greaterdetail herein. Consequently, the EBC system 120 may be more oriented invarious embodiments to risk adaptation than to security administration.

In certain embodiments, an EBP 420 may be implemented to include a userentity profile 422, a non-user entity profile 440, a data entity profile450, one or more entity risk scores 460, one or more entity states 462,and one or more entity behavior models 464, or a combination thereof. Invarious embodiments, the user entity profile 422 may include userprofile attributes 604, user behavior factors 610, user mindset factors622, certain human factors 430, and a user entity mindset profile 632,or a combination thereof. In various embodiments, the user profileattributes 604 may include certain user authentication factors 606,described in greater detail herein, and personal information 608.

As used herein, a user profile attribute 604 broadly refers to data ormetadata that can be used, individually or in combination with otheruser profile attributes 604, user behavior factors 610, or user mindsetfactors 622, to ascertain the identity of a user entity. In variousembodiments, certain user profile attributes 604 may be uniquelyassociated with a particular user entity. In certain embodiments, thepersonal information 608 may include non-sensitive personal informationassociated with a user entity, such as their name, title, position,role, and responsibilities.

In certain embodiments, the personal information 608 may likewiseinclude technical skill level information, peer information, expenseaccount information, paid time off (PTO) information, data analysisinformation, insider information, misconfiguration information, thirdparty information, or a combination thereof. In certain embodiments, thepersonal information 608 may contain sensitive personal informationassociated with a user entity. As used herein, sensitive personalinformation (SPI), also commonly referred to as personally identifiableinformation (PII), broadly refers to any information usable to ascertainthe identity of a user entity, either by itself, or in combination withother information, such as contextual information described in greaterdetail herein.

Examples of SPI may include the full or legal name of a user entity,initials or nicknames, place and date of birth, home and businessaddresses, personal and business telephone numbers, their gender, andother genetic information. Additional examples of SPI may includegovernment-issued identifiers, such as a Social Security Number (SSN) ora passport number, vehicle registration plate and serial numbers, anddriver's license numbers. Other examples of SPI may include certainemail addresses and social media identifiers, credit and debit cardnumbers, and other digital identity information. Yet other examples ofSPI may include employer-issued identifiers, financial transactioninformation, credit scores, electronic medical records (EMRs), insuranceclaim information, personal correspondence, and so forth. Furtherexamples of SPI may include user authentication factors 606, such asbiometrics, user identifiers and passwords, and personal identificationnumbers (PINs). In certain embodiments, the SPI may include informationconsidered by an individual user, a group of users, or an organization(e.g., a company, a government or non-government organization, etc.), tobe confidential or proprietary.

As used herein, a user behavior factor 610 broadly refers to informationassociated with a user entity's behavior, whether the behavior occurswithin a physical realm or cyberspace. In certain embodiments, userbehavior factors 610 may include the user entity's access rights 612,the user entity's interactions 614, and the date/time/frequency 616 ofwhen the interactions 614 are enacted. In certain embodiments, the userbehavior factors 610 may likewise include the user entity's location618, and the gestures 620 used by the user entity to enact theinteractions 614.

In certain embodiments, the user entity gestures 620 may include keystrokes on a keypad, a cursor movement, a mouse movement or click, afinger swipe, tap, or other hand gesture, an eye movement, or somecombination thereof. In certain embodiments, the user entity gestures620 may likewise include the cadence of the user's keystrokes, themotion, force and duration of a hand or finger gesture, the rapidity anddirection of various eye movements, or some combination thereof. Incertain embodiments, the user entity gestures 620 may include variousaudio or verbal commands performed by the user.

As used herein, user mindset factors 622 broadly refer to informationused to make inferences regarding the mental state of a user entity at aparticular point in time, during the occurrence of an event or anenactment of a user behavior, or a combination thereof. As likewise usedherein, mental state broadly refers to a hypothetical statecorresponding to the way a user entity may be thinking or feeling. Incertain embodiments, the user entity mindset factors 622 may include apersonality type 624. Examples of known approaches for determining apersonality type 624 include Jungian types, Myers-Briggs typeindicators, Keirsey Temperament Sorter, Socionics, Enneagram ofPersonality, and Eyseneck's three-factor model.

In certain embodiments, the user mindset factors 622 may include variousbehavioral biometrics 626. As used herein, a behavioral biometric 628broadly refers to a physiological indication of a user entity's mentalstate. Examples of behavioral biometrics 626 may include a user entity'sblood pressure, heart rate, respiratory rate, eye movements and irisdilation, facial expressions, body language, tone and pitch of voice,speech patterns, and so forth.

Certain embodiments of the invention reflect an appreciation thatcertain user behavior factors 610, such as user entity gestures 620, mayprovide additional information related to inferring a user entity'smental state. As an example, a user entering text at a quick pace with arhythmic cadence may indicate intense focus. Likewise, an individualuser intermittently entering text with forceful keystrokes may indicatethe user is in an agitated state. As another example, the user mayintermittently enter text somewhat languorously, which may indicatebeing in a thoughtful or reflective state of mind. As yet anotherexample, the user may enter text with a light touch with an unevencadence, which may indicate the user is hesitant or unsure of what isbeing entered.

Certain embodiments of the invention likewise reflect an appreciationthat while the user entity gestures 620 may provide certain indicationsof the mental state of a particular user entity, they may not providethe reason for the user entity to be in a particular mental state.Likewise, certain embodiments of the invention include an appreciationthat certain user entity gestures 620 and behavioral biometrics 626 arereflective of an individual user's personality type 624. As an example,aggressive, forceful keystrokes combined with an increased heart ratemay indicate normal behavior for a particular user when composingend-of-month performance reviews. In various embodiments, certain userentity behavior factors 610, such as user gestures 620, may becorrelated with certain contextual information, as described in greaterdetail herein.

In various embodiments, the EBC system 120 may be implemented to usecertain human factors 430, described in greater detail herein, incombination with other information contained in the user entity profile422, and a particular entity state 462, described in greater detailherein, to generate an associated user entity mindset profile 632. Asused herein, a user entity mindset profile 632 broadly refers to acollection of information that reflects an inferred mental state of auser entity at a particular time during the occurrence of an event, anenactment of an associated user entity behavior, or a combination of thetwo. As an example, certain information may be known about a userentity, such as their name, their title and position, and so forth, allof which are user profile attributes 604. Likewise, it may be possibleto observe a user entity's associated user behavior factors 610, such astheir interactions with various systems, when they login and log-out,when they are active at the keyboard, the rhythm of their keystrokes,and which files they typically use.

Certain embodiments of the invention reflect an appreciation these userbehavior factors 610 may change, a little or a lot, from day to day.These changes may be benign, such as when a user entity begins a newproject and accesses new data, or they may indicate something moreconcerning, such as a user entity who is actively preparing to stealdata from their employer. In certain embodiments, the user behaviorfactors 610 may be implemented to ascertain the identity of a userentity. In certain embodiments, the user behavior factors 610 may beuniquely associated with a particular user entity.

In certain embodiments, observed user entity behaviors may be used tobuild a user entity profile 422 for a particular user entity. Inaddition to creating a model of a user entity's various attributes andobserved behaviors, these observations can likewise be used to inferthings that are not necessarily explicit. Accordingly, in certainembodiments, observed user entity behaviors may be used in combinationwith an EBP 420 to generate an inference regarding an associated userentity. As an example, a particular user may be observed eating a meal,which may or may not indicate the user is hungry. However, if it is alsoknown that the user worked at their desk throughout lunchtime and is noweating a snack during a mid-afternoon break, then it can be inferredthey are indeed hungry that afternoon.

In various embodiments, the non-user entity profile 440 may beimplemented to include certain non-user entity profile attributes 642.As used herein, a non-user profile attribute 642 broadly refers to dataor metadata that can be used, individually or in combination with othernon-user entity profile attributes 642, to ascertain the identity of anon-user entity. In various embodiments, certain non-user entity profileattributes 642 may be uniquely associated with a particular non-userentity, described in greater detail herein.

In certain embodiments, the non-user profile attributes 642 may beimplemented to include certain identity information, such as a non-userentity's associated network, Media Access Control (MAC), physicaladdress, serial number, associated configuration information, and soforth. In various embodiments, the non-user profile attributes 642 maybe implemented to include non-user entity behavior informationassociated with interactions between certain user entities, non-userentities, and data entities, the type of those interactions, the dataexchanged during the interactions, the date/time/frequency of suchinteractions, and certain services accessed or provided.

In various embodiments, the data entity profile 450 may be implementedto include certain data profile attributes 652. As used herein, a dataprofile attribute broadly refers to data or metadata that can be used,individually or in combination with other data profile attributes 652,to ascertain the identity of a data entity. In various embodiments,certain data profile attributes 652 may be uniquely associated with aparticular data entity, described in greater detail herein.

In certain embodiments, the data profile attributes 652 may beimplemented to include certain identity information, such as a filename, a hash value, time and date stamps, size and type of the data(e.g., structured, binary, etc.), a digital watermark familiar to thoseof skill in the art, and so forth. In various embodiments, the dataentity profile attributes 652 may be implemented to include databehavior information associated with entity interactions between thedata entity and certain user and non-user entities, the type of thoseinteractions, modifications to data during a particular interaction, andthe date/time/frequency of such interactions.

In various embodiments, the EBC system 120 may be implemented to usecertain data associated with an EBP 420 to provide a probabilisticmeasure of whether a particular electronically-observable event is ofanalytic utility. As used herein, an event of analytic utility broadlyrefers to any information associated with a particular event deemed tobe relevant in the performance of a security analytics operation,described in greater detail herein. In certain embodiments, anelectronically-observable event that is of analytic utility may bedetermined to be anomalous, abnormal, unexpected, or suspicious. Incertain embodiments, an electronically-observable event determined to beanomalous, abnormal, unexpected, or suspicious may be associated with anoperation performed by a particular entity that is likewise consideredto be concerning, as described in greater detail herein.

To continue the prior example, a user may typically work out of theircompany's corporate office on Fridays. Furthermore, various user mindsetfactors 622 within their associated user entity profile 422 may indicatethat the user is typically relaxed and methodical when working withcustomer data. Moreover, the user's associated user entity profile 422indicates that such user interactions 614 with customer data typicallyoccur on Monday mornings and the user rarely, if ever, copies ordownloads customer data. However, the user may decide to interact withcertain customer data late at night, on a Friday, while in theircompany's corporate office. As they do so, they exhibit an increasedheart rate, rapid breathing, and furtive keystrokes while downloading asubset of customer data to a flash drive.

Consequently, their user entity mindset profile 632 may reflect anervous, fearful, or guilty mindset, which is inconsistent with theentity state 462 of dealing with customer data in general. Moreparticularly, downloading customer data late at night on a day the useris generally not in their primary office results in an entity state 462that is likewise inconsistent with the user's typical user behavior. Asa result, the EBC system 120 may infer that the user's behavior mayrepresent a security threat. Those of skill in the art will recognizethat many such embodiments and examples are possible. Accordingly, theforegoing is not intended to limit the spirit, scope or intent of theinvention.

Certain embodiments of the invention reflect an appreciation that thequantity, and relevancy, of information contained in a particular EBP420 may have a direct bearing on its analytic utility when attempting todetermine the trustworthiness of an associated entity and whether or notthey represent a security risk. As used herein, the quantity ofinformation contained in a particular EBP 420 broadly refers to thevariety and volume of EBP elements it may contain, and the frequency oftheir respective instances, or occurrences, related to certain aspectsof an associated entity's identity and behavior. As likewise usedherein, information of analytic utility contained in an EBP 420 broadlyrefers to any information deemed to be relevant in the performance of asecurity analytics operation, described in greater detail herein.Likewise, as used herein, an EBP element broadly refers to any dataelement stored in an EBP 420, as described in greater detail herein. Invarious embodiments, an EBP element may be used to describe a particularaspect of an EBP, such as certain user profile attributes 604, userbehavior factors 610, user mindset factors 622, user entity mindsetprofile 632, non-user entity profile attributes 642, data entity profileattributes 652, an entity risk score 460, an entity state 462, and anentity behavior model 464.

In certain embodiments, statistical analysis may be performed on theinformation contained in a particular EBP 420 to determine thetrustworthiness of its associated entity and whether or not theyrepresent a security risk. For example, a particular authenticationfactor 606, such as a biometric, may be consistently used by a userentity for authenticating their identity to their endpoint device. Tocontinue the example, a user ID and password may be used by the same, ora different user entity, in an attempt to access the endpoint device. Asa result, the use of a user ID and password may indicate a security riskdue to its statistical infrequency. As another example, a user entitymay consistently access three different systems on a daily basis intheir role as a procurement agent. In this example, the three systemsmay include a financial accounting system, a procurement system, and aninventory control system. To continue the example, an attempt by theprocurement agent to access a sales forecast system may appearsuspicious if never attempted before, even if the purpose for accessingthe system is legitimate.

As likewise used herein, the relevancy of information contained in aparticular EBP 420 broadly refers to the pertinence of the EBP elementsit may contain to certain aspects of an associated entity's identity andbehavior. To continue the prior example, an EBP 420 associated with theprocurement agent may contain certain user profile attributes 604related to their title, position, role, and responsibilities, all orwhich may be pertinent to whether or not they have a legitimate need toaccess the sales forecast system. In certain embodiments, the userprofile attributes 604 may be implemented to include certain jobdescription information. To further continue the example, such jobdescription information may have relevance when attempting to determinewhether or not the associated entity's behavior is suspicious. Infurther continuance of the example, job description information relatedto the procurement agent may include their responsibility to check salesforecast data, as needed, to ascertain whether or not to procure certainitems. In these embodiments, the method by which it is determinedwhether the information contained in a particular EBP 420 is ofsufficient quantity and relevancy is a matter of design choice.

Various embodiments of the invention likewise reflect an appreciationthat accumulating sufficient information in an EBP 420 to make such adetermination may take a certain amount of time. Likewise, variousembodiments of the invention reflect an appreciation that theeffectiveness or accuracy of such a determination may rely upon certainentity behaviors occurring with sufficient frequency, or in identifiablepatterns, or a combination thereof, during a particular period of time.As an example, there may not be sufficient occurrences of a particulartype of entity behavior to determine if a new entity behavior isinconsistent with known past occurrences of the same type of entitybehavior. Accordingly, various embodiments of the invention reflect anappreciation that a sparsely-populated EBP 420 may result in exposure tocertain security vulnerabilities.

In certain embodiments, the human factors framework 122 may beimplemented to perform a human factors risk operation, likewisedescribed in greater detail herein. In various embodiments, as likewisedescribed in greater detail herein, the human factors framework 122 maybe implemented to use certain event information stored in therepositories of event 530, EBC 540, security analytics 550, and securityrisk scoring 560 data, or a combination thereof, to perform the humanfactors risk operation. In certain embodiments, the human factors riskoperation may be performed to assess the risk of an event associatedwith a particular user entity.

FIG. 7 is a simplified Venn diagram showing entity interactionsimplemented in accordance with an embodiment of the invention between auser entity, a non-user entity, and a data entity. As shown in FIG. 7,entity interactions 702, described in greater detail herein, may occurin certain embodiments between a user entity 704, a non-user entity 706,or a data entity 708. Likewise, entity interactions 702 may respectivelyoccur in certain embodiments between a user entity 704, a non-userentity 706, or a data entity 708 and other user entities 714, othernon-user entities 716, or other data entities 718. Skilled practitionersof the art will recognize that many such examples of entity interactions702 are possible. Accordingly, the foregoing is not intended to limitthe spirit, scope, or intent of the invention.

FIG. 8 shows the enactment of entity interactions implemented inaccordance with embodiment of the invention between user entities,non-user entities, and data entities. In various embodiments, a userentity-to-user entity 820 interaction may occur between a first userentity, such as user entity ‘A’ 810, and a second user entity, such asuser entity ‘B’ 812. In various embodiments, a user entity-to-non-userentity 830 interaction may occur between a user entity, such as userentity ‘A’ 810 and certain non-user entities 804, described in greaterdetail herein. In various embodiments, a user entity-to-data entity 840interaction may occur between a user entity, such as user entity ‘A’810, and certain data entities 806. In various embodiments, a non-userentity-to-data entity 850 interaction may occur between certain non-userentities 804 and certain data entities 806.

In various embodiments, certain information associated with userentity-to-user entity 820, user entity-to-non-user entity 830, and userentity-to-data entity 840 interactions may be stored within a userentity profile 420, described in greater detail herein. In variousembodiments, such information stored in the user entity profile 422 mayinclude certain attribute 422, behavior 426, and inference 430, or acombination thereof, as likewise described in greater detail herein.Those of skill in the art will recognize that many such embodiments arepossible. Accordingly, the foregoing is not intended to limit thespirit, scope, or intent of the invention.

FIGS. 9a and 9b show a block diagram of a security analytics environmentimplemented in accordance with an embodiment of the invention. Incertain embodiments, a security analytics system 118 may be implementedwith an entity behavior catalog (EBC) system 120, a human factorsframework 122, and a security risk scoring system 124, or a combinationthereof. In certain embodiments, analyses performed by the securityanalytics system 118 may be used to identify behavior associated with aparticular entity that may be of analytic utility.

In certain embodiments, as likewise described in greater detail herein,the EBC system 120, the human factors framework 122, and the securityrisk scoring system 124, or a combination thereof, may be used incombination with the security analytics system 118 to perform suchanalyses. In various embodiments, certain data stored in repositories ofevent 530, EBC catalog 540, security analytics 550, and security riskscoring 560 data, or a combination thereof, may be used by the securityanalytics system 118 to perform the analyses. As likewise described ingreater detail herein, the security analytics system 118, the EBC system120, the human factors framework 122, and the security risk scoringsystem 124, or a combination thereof, may be used in combination withone another in certain embodiments to perform a human factors riskoperation. Likewise, certain data stored in the repositories of event530, EBC catalog 540, security analytics 550, and security risk scoring560 data, or a combination thereof, may be used in various embodimentsto perform the human factors risk operation.

In certain embodiments, a user entity may be an individual user, such asuser ‘A’ 710 or ‘B’ 712, a group, an organization, or a government. Incertain embodiments, a non-user entity may likewise be an item, or adevice, such as endpoint 204 and edge 304 devices, or a network, such asa network 140 or third party network 310. In certain embodiments, anon-user entity may be a resource 950, such as a geographical locationor formation, a physical facility 952, such as a venue, various physicalsecurity devices 954, a system 956, shared devices 958, such as printer,scanner, or copier, a data store 960, or a service 962, such as aservice 962 operating in a cloud environment. In various embodiments,the data entity may be certain data 934 stored on an endpoint device204, such as a data element, a data file, or a data store known to thoseof skill in the art.

In various embodiments, certain user authentication factors 606 may beused to authenticate the identity of a user entity. In certainembodiments, the user authentication factors 606 may be used to ensurethat a particular user entity, such as user ‘A’ 710 or ‘B’ 712, isassociated with their corresponding user entity profile 422, rather thana user entity profile 422 associated with another user. In certainembodiments, the user authentication factors 606 may include a user'sbiometrics 906 (e.g., a fingerprint or retinal scan), tokens 908 (e.g.,a dongle containing cryptographic keys), user identifiers and passwords(ID/PW) 910, and personal identification numbers (PINs).

In certain embodiments, information associated with such user entitybehavior may be stored in a user entity profile 422, described ingreater detail herein. In certain embodiments, the user entity profile422 may be stored in a repository of entity behavior catalog (EBC) data440. In various embodiments, as likewise described in greater detailherein, the user entity profile 422 may include user profile attributes604, user behavior factors 610, user mindset factors 622, certain humanfactors 430, and a user mindset profile 632, or a combination thereof.As used herein, a user profile attribute 604 broadly refers to data ormetadata that can be used, individually or in combination with otheruser profile attributes 604, user behavior factors 610, or user mindsetfactors 622, to ascertain the identity of a user entity. In variousembodiments, certain user profile attributes 604 may be uniquelyassociated with a particular user entity.

As likewise used herein, a user behavior factor 610 broadly refers toinformation associated with a user's behavior, whether the behavioroccurs within a physical realm or cyberspace. In certain embodiments,the user behavior factors 610 may include the user's access rights 612,the user's interactions 614, and the date/time/frequency 616 of thoseinteractions 614. In certain embodiments, the user behavior factors 610may likewise include the user's location 618 when the interactions 614are enacted, and the user gestures 620 used to enact the interactions614.

In various embodiments, certain date/time/frequency 616 user behaviorfactors 610 may be implemented as ontological or societal time, or acombination thereof. As used herein, ontological time broadly refers tohow one instant in time relates to another in a chronological sense. Asan example, a first user behavior enacted at 12:00 noon on May 17, 2017may occur prior to a second user behavior enacted at 6:39 PM on May 18,2018. Skilled practitioners of the art will recognize one value ofontological time is to determine the order in which various entitybehaviors have been enacted.

As likewise used herein, societal time broadly refers to the correlationof certain user profile attributes 604, user behavior factors 610, usermindset factors 622, or a combination thereof, to one or more instantsin time. As an example, user ‘A’ 710 may access a particular system 956to download a customer list at 3:47 PM on Nov. 3, 2017. Analysis oftheir entity behavior profile indicates that it is not unusual for user‘A’ 710 to download the customer list on a weekly basis. However,examination of their user behavior profile also indicates that user ‘A’710 forwarded the downloaded customer list in an email message to user‘B’ 712 at 3:49 PM that same day. Furthermore, there is no record intheir associated entity behavior profile that user ‘A’ 710 has evercommunicated with user ‘B’ 712 in the past. Moreover, it may bedetermined that user ‘B’ 712 is employed by a competitor. Accordingly,the correlation of user ‘A’ 710 downloading the customer list at onepoint in time, and then forwarding the customer list to user ‘B’ 712 ata second point in time shortly thereafter, is an example of societaltime.

In a variation of the prior example, user ‘A’ 710 may download thecustomer list at 3:47 PM on Nov. 3, 2017. However, instead ofimmediately forwarding the customer list to user ‘B’ 712, user ‘A’ 710leaves for a two week vacation. Upon their return, they forward thepreviously-downloaded customer list to user ‘B’ 712 at 9:14 AM on Nov.20, 2017. From an ontological time perspective, it has been two weekssince user ‘A’ 710 accessed the system 956 to download the customerlist. However, from a societal time perspective, they have stillforwarded the customer list to user ‘B’ 712, despite two weeks havingelapsed since the customer list was originally downloaded.

Accordingly, the correlation of user ‘A’ 710 downloading the customerlist at one point in time, and then forwarding the customer list to user‘B’ 712 at a much later point in time, is another example of societaltime. More particularly, it may be inferred that the intent of user ‘A’710 did not change during the two weeks they were on vacation.Furthermore, user ‘A’ 710 may have attempted to mask an intendedmalicious act by letting some period of time elapse between the timethey originally downloaded the customer list and when they eventuallyforwarded it to user ‘B’ 712. From the foregoing, those of skill in theart will recognize that the use of societal time may be advantageous indetermining whether a particular entity behavior is of analytic utility.As used herein, mindset factors 622 broadly refer to information used toinfer the mental state of a user entity at a particular point in time,during the occurrence of an event, an enactment of a user entitybehavior, or combination thereof.

In certain embodiments, the security analytics system 118 may beimplemented to process certain entity attribute information, describedin greater detail herein, associated with providing resolution of theidentity of an entity at a particular point in time. In variousembodiments, the security analytics system 118 may be implemented to usecertain entity identifier information, likewise described in greaterdetail herein, to ascertain the identity of an associated entity at aparticular point in time. In various embodiments, the entity identifierinformation may include certain temporal information, described ingreater detail herein. In certain embodiments, the temporal informationmay be associated with an event associated with a particular point intime.

In certain embodiments, the security analytics system 118 may beimplemented to use information associated with certain entity behaviorelements to resolve the identity of an entity at a particular point intime. An entity behavior element, as used herein, broadly refers to adiscrete element of an entity's behavior during the performance of aparticular action, or operation, in a physical realm, cyberspace, or acombination thereof. In certain embodiments, such entity behaviorelements may be associated with a user/device 930, a user/network 942, auser/resource 948, a user/user 920 interaction, or a combinationthereof. In certain embodiments, a user/device 930, user/network 942,and user/resource 948 interactions are all examples of a userentity-to-non-user entity interaction, described in greater detailherein. In certain embodiments, a user/user 920 interaction is oneexample of a user entity-to-user entity interaction, likewise describedin greater detail herein.

As an example, user ‘A’ 710 may use an endpoint device 204 to browse aparticular web page on a news site on an external system 976. In thisexample, the individual actions performed by user ‘A’ 710 to access theweb page are entity behavior elements that constitute an entitybehavior, described in greater detail herein. As another example, user‘A’ 710 may use an endpoint device 204 to download a data file from aparticular system 956. In this example, the individual actions performedby user ‘A’ 710 to download the data file, including the use of one ormore user authentication factors 606 for user authentication, are entitybehavior elements that constitute an entity behavior. In certainembodiments, the user/device 930 interactions may include an interactionbetween a user, such as user ‘A’ 710 or ‘B’ 712, and an endpoint device204.

In certain embodiments, the user/device 930 interaction may includeinteraction with an endpoint device 204 that is not connected to anetwork at the time the interaction occurs. As an example, user ‘A’ 710or ‘B’ 712 may interact with an endpoint device 204 that is offline,using applications 932, accessing data 934, or a combination thereof, itmay contain. Those user/device 930 interactions, or their result, may bestored on the endpoint device 204 and then be accessed or retrieved at alater time once the endpoint device 204 is connected to the network 140or third party networks 310. In certain embodiments, an endpoint agent206 may be implemented to store the user/device 930 interactions whenthe user device 204 is offline.

In certain embodiments, an endpoint device 24 may be implemented with adevice camera 928. In certain embodiments, the device camera 928 may beintegrated into the endpoint device 204. In certain embodiments, thedevice camera 928 may be implemented as a separate device configured tointeroperate with the endpoint device 204. As an example, a webcamfamiliar to those of skill in the art may be implemented receive andcommunicate various image and audio signals to an endpoint device 204via a Universal Serial Bus (USB) interface.

In certain embodiments, the device camera 928 may be implemented tocapture and provide user/device 930 interaction information to anendpoint agent 206. In various embodiments, the device camera 928 may beimplemented to provide surveillance information related to certainuser/device 930 or user/user 920 interactions. In certain embodiments,the surveillance information may be used by the security analyticssystem 118 to detect entity behavior associated with a user entity, suchas user ‘A’ 710 or user ‘B’ 712, that may be of analytic utility.

In certain embodiments, the endpoint device 204 may be used tocommunicate data through the use of a network 140, a third party network310, or a combination thereof. In certain embodiments, the network 140and the third party networks 310 may respectively include a publicnetwork, such as the Internet, a physical private network, a virtualprivate network (VPN), or any combination thereof. In certainembodiments, the network 140 and third party networks 310 may likewiseinclude a wireless network, including a personal area network (PAN),based upon technologies such as Bluetooth. In various embodiments, thewireless network may include a wireless local area network (WLAN), basedon variations of the IEEE 802.11 specification, commonly referred to asWiFi. In certain embodiments, the wireless network may include awireless wide area network (WWAN) based on an industry standardincluding various 3G, 4G, and 5G technologies.

In certain embodiments, the user/user 920 interactions may includeinteractions between two or more user entities, such as user ‘A’ 710 and‘B’ 712. In certain embodiments, the user/user interactions 920 may bephysical, such as a face-to-face meeting, via a user/device 930interaction, a user/network 942 interaction, a user/resource 948interaction, or some combination thereof. In certain embodiments, theuser/user 920 interaction may include a face-to-face verbal exchange. Incertain embodiments, the user/user 920 interaction may include a writtenexchange, such as text written on a sheet of paper. In certainembodiments, the user/user 920 interaction may include a face-to-faceexchange of gestures, such as a sign language exchange.

In certain embodiments, temporal event information associated withvarious user/device 930, user/network 942, user/resource 948, oruser/user 920 interactions may be collected and used to providereal-time resolution of the identity of an entity at a particular pointin time. Those of skill in the art will recognize that many suchexamples of user/device 930, user/network 942, user/resource 948, anduser/user 920 interactions are possible. Accordingly, the foregoing isnot intended to limit the spirit, scope or intent of the invention.

In various embodiments, the security analytics system 118 may beimplemented to process certain contextual information in the performanceof a particular security analytic operation. As used herein, contextualinformation broadly refers to any information, directly or indirectly,individually or in combination, related to a particular entity behavior.In certain embodiments, entity behavior may include a user entity'sphysical behavior, cyber behavior, or a combination thereof. As likewiseused herein, a user entity's physical behavior broadly refers to anyuser behavior occurring within a physical realm, such as speaking,gesturing, facial patterns or expressions, walking, and so forth. Moreparticularly, such physical behavior may include any action enacted byan entity user that can be objectively observed, or indirectly inferred,within a physical realm. In certain embodiments, the objectiveobservation, or indirect inference, of the physical behavior may beperformed electronically.

As an example, a user may attempt to use an electronic access card toenter a secured building at a certain time. In this example, the use ofthe access card to enter the building is the action and the reading ofthe access card makes the user's physical behaviorelectronically-observable. As another example, a first user mayphysically transfer a document to a second user, which is captured by avideo surveillance system. In this example, the physical transferal ofthe document from the first user to the second user is the action.Likewise, the video record of the transferal makes the first and seconduser's physical behavior electronically-observable. As used herein,electronically-observable user behavior broadly refers to any behaviorexhibited or enacted by a user entity that can be observed through theuse of an electronic device (e.g., an electronic sensor), a computingdevice or system (e.g., an endpoint 204 or edge 304 device, a physicalsecurity device 954, a system 956, a shared device 958, etc.), computerinstructions (e.g., a software application), or a combination thereof.

In certain embodiments, the contextual information may include locationdata 936. In certain embodiments, the endpoint device 204 may beconfigured to receive such location data 936, which is used as a datasource for determining the user's location 618. In certain embodiments,the location data 936 may include Global Positioning System (GPS) dataprovided by a GPS satellite 938. In certain embodiments, the locationdata 936 may include location data 936 provided by a wireless network,such as from a cellular network tower 940. In certain embodiments (notshown), the location data 936 may include various Internet Protocol (IP)or other network address information assigned to the endpoint 204 oredge 304 device. In certain embodiments (also not shown), the locationdata 936 may include recognizable structures or physical addresseswithin a digital image or video recording.

In certain embodiments, the endpoint devices 204 may include an inputdevice (not shown), such as a keypad, magnetic card reader, tokeninterface, biometric sensor, and so forth. In certain embodiments, suchendpoint devices 204 may be directly, or indirectly, connected to aparticular facility 952, physical security device 954, system 956, orshared device 958. As an example, the endpoint device 204 may bedirectly connected to an ingress/egress system, such as an electroniclock on a door or an access gate of a parking garage. As anotherexample, the endpoint device 204 may be indirectly connected to aphysical security device 954 through a dedicated security network (notshown).

In certain embodiments, the security analytics system 118 may beimplemented to perform various risk-adaptive protection operations.Risk-adaptive, as used herein, broadly refers to adaptively respondingto risks associated with an electronically-observable entity behavior.In various embodiments, the security analytics system 118 may beimplemented to perform certain risk-adaptive protection operations bymonitoring individual entity behaviors, assess the corresponding riskthey may represent, individually or in combination, and respond with anassociated response. In certain embodiments, such responses may be basedupon contextual information, described in greater detail herein,associated with a particular entity behavior.

In certain embodiments, certain information associated with a userentity profile 420, likewise described in greater detail herein, may beused to perform the risk-adaptive protection operations. In certainembodiments, the user entity profile 422 may include user profileattributes 604, user behavior factors 610, user mindset factors 622, ora combination thereof. In these embodiments, the information associatedwith a user entity profile 422 used to perform the risk-adaptiveprotection operations is a matter of design choice.

In certain embodiments, the security analytics system 118 may beimplemented as a stand-alone system. In certain embodiments, thesecurity analytics system 118 may be implemented as a distributedsystem. In certain embodiment, the security analytics system 118 may beimplemented as a virtual system, such as an instantiation of one or morevirtual machines (VMs). In certain embodiments, the security analyticssystem 118 may be implemented as a security analytics service 308. Incertain embodiments, the security analytics service 308 may beimplemented in a cloud environment familiar to those of skill in theart. In various embodiments, the security analytics system 118 may usedata stored in a repository of event 430, entity behavior catalog 440,security analytics 450, or security risk 460 data, or a combinationthereof, in the performance of certain security analytics operations,described in greater detail herein. Those of skill in the art willrecognize that many such embodiments are possible. Accordingly, theforegoing is not intended to limit the spirit, scope or intent of theinvention.

FIG. 10 is a simplified block diagram showing the mapping of an event toa security vulnerability scenario implemented in accordance with anembodiment of the invention. In certain embodiments, an entity behaviorcatalog (EBC) system may be implemented to identify an indicator ofbehavior (JOB), described in greater detail herein. In certainembodiments, the IOB may be based upon one or more observables, likewisedescribed in greater detail herein. In certain embodiments, theobservable may include event information corresponding toelectronically-observable behavior enacted by an entity. In certainembodiments, the event information corresponding toelectronically-observable behavior enacted by an entity may be receivedfrom an electronic data source, such as the event data sources 1010shown in FIG. 10.

In certain embodiments, as likewise described in greater detail herein,the EBC system may be implemented to identify a particular event ofanalytic utility by analyzing an associated JOB. In certain embodiments,the EBC system may be implemented to generate entity behavior catalogdata based upon an identified event of analytic utility associated witha particular JOB. In various embodiments, the EBC system may beimplemented to associate certain entity behavior data it may generatewith a predetermined abstraction level, described in greater detailherein.

In various embodiments, the EBC system 120 may be implemented to usecertain EBC data and an associated abstraction level to generate ahierarchical set of entity behaviors 1070, described in greater detailherein. In certain embodiments, the hierarchical set of entity behaviors1070 generated by the EBC system may represent an associated securityrisk, likewise described in greater detail herein. Likewise, asdescribed in greater detail herein, the EBC system may be implemented incertain embodiments to store the hierarchical set of entity behaviors1070 and associated abstraction level information within a repository ofEBC data. In certain embodiments, the repository of EBC data 440 can beimplemented to provide an inventory of entity behaviors for use whenperforming a security operation, likewise described in greater detailherein.

Referring now to FIG. 10, the EBC system may be implemented in variousembodiments to receive certain event information, described in greaterdetail herein, corresponding to an event associated with an entityinteraction, likewise described in greater detail herein. As usedherein, event information broadly refers to any information directly orindirectly related to an event, described in greater detail herein.

In certain embodiments, information associated with an entity attribute,likewise described in greater detail herein, and an entity behavior maybe respectively abstracted to an entity attribute 1072 and an entitybehavior 1074 abstraction level. In certain embodiments, an entityattribute 1072 and an entity behavior 1074 abstraction level may then beassociated with an event 1076 abstraction level. In certain embodiments,the entity attribute 1072, entity behavior 1074, and event 1076abstraction levels may in turn be associated with a corresponding entitybehavior hierarchy 1070, as described in greater detail herein.

In various embodiments, the event information may be received fromcertain event data sources 1010, such as a user 704 entity, an endpoint1004 non-user entity, a network 1006 non-user entity, a system 1008non-user entity, or a data 708 entity. In certain embodiments, one ormore events may be associated with a particular entity interaction. Asan example, as shown in FIG. 10, one or more events i+n 1012 may beassociated with a user/device 930 interaction between a user 704 entityand an endpoint 1004 non-user entity. Likewise, one or more events j+n1014 may be associated with a user/network 942 interaction between auser 704 entity and a network 1006 non-user entity. As likewise shown inFIG. 10, one or more events k+n 1016 may be associated with auser/resource 948 interaction between a user 704 entity and a system1008 non-user entity, or a data 708 entity, or a combination of the two.

In certain embodiments, details of an event, such as events i+n 1012,j+n 1014, and k+n 1016, may be included in their associated eventinformation. In various embodiments, as described in greater detailherein, analytic utility detection operations may be performed on suchevent information to identify events of analytic utility. In variousembodiments, certain event information associated with an eventdetermined to be of analytic utility may be used to derive acorresponding observable.

As an example, the details contained in the event informationrespectively corresponding to events i+n 1012, j+n 1014, and k+n 1016may be used to derive observables i+n 1022, j+n 1024, and k+n 1026. Incertain embodiments, the resulting observables i+n 1022, j+n 1024, andk+n 1026 may then be respectively associated with a correspondingobservable 1078 abstraction level. In certain embodiments, theobservable 1078 abstraction level may in turn be associated with acorresponding entity behavior hierarchy 1070, as described in greaterdetail herein.

In certain embodiments, the resulting observables may in turn beprocessed to generate an associated IOB. For example, observables i+n1022, j+n 1024, and k+n 1026 may in turn be processed to generatecorresponding IOBs i 1032, j 1034, and k 1036. In certain embodiments,the resulting IOBs, i 1032, j 1034, and k 1036 may then be respectivelyassociated with a corresponding IOB 1080 abstraction level. In certainembodiments, the IOB 1080 abstraction level may in turn be associatedwith a corresponding entity behavior hierarchy 1070, as described ingreater detail herein.

In various embodiments, sessionization and fingerprint generationoperations 1020, described in greater detail herein, may be performed toassociate certain events, observables, and security related activities,or a combination thereof, with a corresponding session, likewisedescribed in greater detail herein. As an example, events i+n 1012, j+n1014, k+n 1016, observables i+n 1022, j+n 1024, k+n 1026, and IOBs i1032, j 1034, k 1036 may be associated with corresponding sessions. Incertain embodiments, an IOB may be processed with associated contextualinformation, described in greater detail herein, to generate acorresponding EBP element.

For example, IOBs i 1032, j 1034, and k 1036 may be processed withassociated contextual information to generate corresponding EBP elementsi 1042, j 1044, and k 1046. In various embodiments, the resulting EBPelements i 1042, j 1044, and k 1046 may then be associated with acorresponding EBP element 1082 abstraction level. In certainembodiments, the EBP element 1082 abstraction level may in turn beassociated with a corresponding entity behavior hierarchy 1070, asdescribed in greater detail herein.

In certain embodiments, EBP generation and management 1040 operationsmay be performed to associate one or more EBP elements with a particularEBP 540. As an example, EBP elements i 1042, j 1044, and k 1046 may beassociated with a particular EBP 420, which may likewise be respectivelyassociated with the various entities involved in the user/device 930,user/network 942, or user/resource 948 interactions. In theseembodiments, the method by which the resulting EBP elements i 1042, j1044, and k 1046 are associated with a particular EBP 420 is a matter ofdesign choice. In certain embodiments, the EBP 420 may likewiseassociated with an EBP 1084 abstraction level. In certain embodiments,the EBP 1084 abstraction level may in turn be associated with acorresponding entity behavior hierarchy 1070, as described in greaterdetail herein.

In various embodiments, the resulting EBP 420 may be used in theperformance of security risk use case association 1050 operations toidentify one or more security risk use cases that match certain entitybehavior information stored in the EBP 540. In certain of theseembodiments, the entity behavior information may be stored within theEBP 420 in the form of an EBP element. In certain embodiments,identified security risk use cases may then be associated with asecurity risk use case 1086 abstraction level. In certain embodiments,the security risk use case 1086 abstraction level may in turn beassociated with a corresponding entity behavior hierarchy 1070, asdescribed in greater detail herein.

In certain embodiments, the results of the security risk use caseassociation 1050 operations may in turn be used to perform securityvulnerability scenario inference 1060 operations to associate one ormore security risk use cases with one or more security vulnerabilityscenarios, described in greater detail herein. In certain embodiments,the associated security vulnerability scenarios may then be associatedwith a security vulnerability scenario 1088 abstraction level. Incertain embodiments, the security vulnerability scenario 1088abstraction level may in turn be associated with a corresponding entitybehavior hierarchy 1070, as described in greater detail herein.

In various embodiments, certain event information associated with eventsi+n 1012, j+n 1014, and k+n 1016 and certain observable informationassociated with observables i+n 1022, j+n 1024, and k+n 1026 may bestored in a repository of EBC data. In various embodiments, certain IOBinformation associated with security related activities i 1032, j 1034,and k 1036 and EBP elements i 1042, j 1044, and k 1046 may likewise bestored in the repository of EBC data. Likewise, in various embodiments,certain security risk use case association and security vulnerabilityscenario association information respectively associated with theperformance of security risk use case association 1050 and securityvulnerability scenario inference 1060 operations may be stored in therepository of EBC data.

FIG. 11 is a simplified block diagram of the generation of a session anda corresponding session-based fingerprint implemented in accordance withan embodiment of the invention. In certain embodiments, an observable1106 may be derived from an associated event, as described in greaterdetail herein. In certain embodiments, one or more observables 11026 maybe processed to generate a corresponding indicator of behavior (IOB)1108, as likewise described in greater detail herein.

In certain embodiments, one or more IOBs 1108 may then be respectivelyprocessed to generate a corresponding activity session 1110. In turn,the session 1110 may be processed in certain embodiments to generate acorresponding session fingerprint 1112. In certain embodiments, theresulting activity session 910 and its corresponding session fingerprint1112, individually or in combination, may then be associated with aparticular entity behavior profile (EBP) element 1180. In certainembodiments the EBP element 1180 may in turn be associated with an EBP420.

In certain embodiments, intervals in time 1104 respectively associatedwith various IOBs 1108 may be contiguous. For example, as shown in FIG.11, the intervals in time 1104 associated with observables 1106 ‘1’ 1114and ‘2’ 1116 may be contiguous. Accordingly, the intervals in time 1104associated with IOBs 1108 ‘1’ 1118 and ‘2’ 1120 respectively generatedfrom observables 1106 ‘1’ 1114 and ‘2’ 1116 would likewise becontiguous.

As likewise shown in FIG. 11, the resulting IOBs 1108 ‘1’ 1118 and ‘2’1120 may be processed to generate an associated activity session ‘A’1122, which then may be processed to generate a corresponding sessionfingerprint ‘A’ 1124. In certain embodiments, activity session ‘A’ 1122and its corresponding session fingerprint ‘A’ 1124 may be used togenerate a new entity behavior profile (EBP) element 1180 ‘A’ 1126. Incertain embodiments, EBP element 1180 ‘A’ 1126 generated from activitysession 1110 ‘A’ 1122 and its corresponding session fingerprint 1112 ‘A’1125 may be associated with an existing EBP 420.

To provide an example, a user may enact various observables 1106 ‘1’1114 to update sales forecast files, followed by the enactment ofvarious observables 1106 ‘2’ 1116 to attach the updated sales forecastfiles to an email, which is then sent to various co-workers. In thisexample, the enactment of observables 1106 ‘1’ 1114 and ‘2’ 1116 resultin the generation of IOBs 1108 ‘1’ 1118 and ‘2’ 1120, which in turn areused to generate activity session 1110 ‘A’ 1122. In turn, the resultingactivity session 1110 ‘A’ 1122 is then used to generate itscorresponding session-based fingerprint 1112 ‘A’ 1124. To continue theexample, activity session 1110 ‘A’ 1122 is associated with securityrelated activities 1108 ‘1’ 1118 and ‘2’ 1120, whose associatedintervals in time 1104 are contiguous, as they are oriented to theupdating and distribution of sales forecast files via email.

Various aspects of the invention reflect an appreciation that a user mayenact certain entity behaviors on a recurring basis. To continue thepreceding example, a user may typically update sales forecast files anddistribute them to various co-workers every morning between 8:00 AM and10:00 AM. Accordingly, the activity session 1110 associated with such arecurring activity may result in a substantively similar sessionfingerprint 1112 week-by-week. However, a session fingerprint 1112 forthe same session 1110 may be substantively different should the userhappen to send an email with an attached sales forecast file to arecipient outside of their organization. Consequently, a sessionfingerprint 1112 that is inconsistent with session fingerprints 1112associated with past activity sessions 1110 may indicate anomalous,abnormal, unexpected or suspicious behavior.

In certain embodiments, two or more activity sessions 1110 may benoncontiguous, but associated. In certain embodiments, an activitysession 1110 may be associated with two or more sessions 1110. Incertain embodiments, an activity session 1110 may be a subset of anotheractivity session 1110. As an example, as shown in FIG. 11, the intervalsin time 1104 respectively associated with observables 1106 ‘3’ 1114 and‘6’ 1132 may be contiguous. Likewise, the intervals in time 1104associated with observables 1106 ‘4’ 1136 and ‘5’ 1138 may becontiguous.

Accordingly, the intervals in time 904 associated with the IOBs 1108 ‘4’1136 and ‘5’ 1138 respectively generated from observables 1106 ‘4’ 1128and ‘5’ 1130 would likewise be contiguous. However, the intervals intime 1104 associated with IOBs 1108 ‘4’ 1136 and ‘5’ 1138 would not becontiguous with the intervals in time respectively associated with IOBs1108 ‘3’ 1134 and ‘6’ 1140.

As likewise shown in FIG. 11, the resulting IOBs 1108 ‘3’ 1134 and ‘6’1140 may be respectively processed to generate corresponding sessions‘B’ 1142 and ‘D’ 1146, while IOBs 1108 ‘4’ 1136 and ‘5’ 1138 may beprocessed to generate activity session 1110 ‘C’ 1144. In turn, activitysessions 1110 ‘B’ 1142, ‘C’ 144, and ‘D’ 1146 are then respectivelyprocessed to generate corresponding session-based fingerprints 1112 ‘B’1148, ‘C’ 1150 and ‘D’ 1152.

Accordingly, the intervals of time 1104 respectively associated withactivity sessions 1110 ‘B’ 1142, ‘C’ 1144, and ‘D’ 1146, and theircorresponding session fingerprints 1112 ‘B’ 1148, ‘C’ 1150 and ‘D’ 1152,are not contiguous. Furthermore, in this example activity sessions 1110‘B’ 1142, ‘C’ 1144, and ‘D’ 1146, and their corresponding sessionfingerprints 1112 ‘B’ 1148, ‘C’ 1150 and ‘D’ 1152, are not associatedwith the EBP 420. Instead, as shown in FIG. 11, activity sessions 1110‘B’ 1142, ‘C’ 1144, and ‘D’ 1146 are processed to generate activitysession 1110 ‘E’ 1154 and session fingerprints 1112 ‘B’ 1148, ‘C’ 1150and ‘D’ 1152 are processed to generate session fingerprint 1112 ‘E’1156. In certain embodiments, activity session ‘E’ 1154 and itscorresponding session fingerprint ‘E’ 1156 may be used to generate a newEBP element 1180 ‘E’ 1158. In certain embodiments, EBP element 1180 ‘E’1158 generated from activity session 1110 ‘E’ 1154 and its correspondingsession fingerprint 1112 ‘E’ 1156 may be associated with an existing EBP420.

Accordingly, activity session 1110 ‘E’ 1154 is associated with activitysessions 1110 ‘B’ 1142, ‘C’ 1144, and ‘D’ 1146. Likewise, activitysessions 1110 ‘B’ 1142, ‘C’ 1144, and ‘D’ 1146 are subsets of activitysession 1110 ‘E’ 1154. Consequently, while the intervals of timerespectively associated with activity sessions 1110 ‘B’ 1142, ‘C’ 1144,and ‘D’ 1146, and their corresponding session fingerprints 1112 ‘B’1148, ‘C’ 1150 and ‘D’ 1152 may not be contiguous, they are associatedas they are respectively used to generate activity session 1110 ‘E’ 1154and its corresponding session fingerprint 1112 ‘E’ 1156.

To provide an example, a user plans to attend a meeting scheduled for10:00 AM at a secure facility owned by their organization to review aproject plan with associates. However, the user wishes to arrive earlyto prepare for the meeting. Accordingly, they arrive at 9:00 AM and usetheir security badge to authenticate themselves and enter the facility.In this example, the enactment of observables 1106 ‘3’ 1126 maycorrespond to authenticating themselves with their security badge andgaining access to the facility. As before, observables 1106 ‘3’ 1126 maybe used to generate a corresponding IOB 1108 ‘3’ 1134. In turn, the IOB1108 ‘3’ 1134 may then be used to generate session 1110 ‘B’ 1142, whichis likewise used in turn to generate a corresponding session fingerprint1112 ‘B’ 1148.

The user then proceeds to a conference room reserved for the meetingscheduled for 10:00 AM and uses their time alone to prepare for theupcoming meeting. Then, at 10:00 AM, the scheduled meeting begins,followed by the user downloading the current version of the projectplan, which is then discussed by the user and their associate for a halfhour. At the end of the discussion, the user remains in the conferenceroom and spends the next half hour making revisions to the project plan,after which it is uploaded to a datastore for access by others.

In this example, observables 1106 ‘4’ 1128 may be associated with theuser downloading and reviewing the project plan and observables 1106 ‘5’1130 may be associated with the user making revisions to the projectplan and then uploading the revised project plan to a datastore.Accordingly, observables 1106 ‘4’ 1128 and ‘5’ 1130 may be respectivelyused to generate IOBs 1108 ‘4’ 1136 and ‘5’ 1138. In turn, IOBs 1108 ‘4’1136 and ‘5’ 1138 may then be used to generate activity session 1110 ‘C’1144, which may likewise be used in turn to generate its correspondingsession fingerprint 1112 ‘C’ 1150.

To continue the example, the user may spend the next half hourdiscussing the revisions to the project plan with a co-worker.Thereafter, the user uses their security badge to exit the facility. Incontinuance of this example, observable 1106 ‘6’ 1132 may be associatedwith the user using their security badge to leave the secure facility.Accordingly, observable 1106 ‘6’ 1132 may be used to generate acorresponding IOB 1108 ‘6’ 1140, which in turn may be used to generate acorresponding activity session 1110 ‘D’ 1146, which likewise may be usedin turn to generate a corresponding session fingerprint 1112 ‘D’ 1152.

In this example, the intervals of time 1104 respectively associated withactivity sessions 1110 ‘B’ 1142, ‘C’ 1144, and ‘D’ 1146, and theircorresponding session fingerprints 1112 ‘B’ 1148, ‘C’ 1150, and ‘D’1152, are not contiguous. However they may be considered to beassociated as their corresponding observables 1106 ‘3’ 1126, ‘4’ 1128,‘5’ 1130, and ‘6’ 1132 all have the common attribute of having beenenacted within the secure facility. Furthermore, security relatedactivities 1108 ‘4’ 1136 and ‘5’ 1138 may be considered to be associatedas their corresponding observables 1106 have the common attribute ofbeing associated with the project plan.

Accordingly, while the intervals of time 1104 respectively associatedwith activity sessions 1110 ‘B’ 1142, ‘C’ 1144, and ‘D’ 1146, and theircorresponding session fingerprints 1112 ‘B’ 1148, ‘C’ 1150, and ‘D’1152, may not be contiguous, they may be considered to be associated.Consequently, activity sessions 1110 ‘B’ 1142, ‘C’ 1144, and ‘D’ 1146may be considered to be a subset of activity session 1110 ‘E’ 1154 andsession fingerprints 1112 ‘B’ 1148, ‘C’ 1150, and ‘D’ 1152 may beconsidered to be a subset of session fingerprint 1112 ‘E’ 1156.

In certain embodiments, the interval of time 1104 corresponding to afirst activity session 1110 may overlap an interval of time 1104corresponding to a second activity session 1110. For example,observables 1106 ‘7’ 1158 and ‘8’ 1160 may be respectively processed togenerate IOBs 1108 ‘7’ 1162 and ‘8’ 1164. In turn, the resulting IOBs1108 ‘7’ 1162 and ‘8’ 1164 are respectively processed to generatecorresponding activity sessions 1110 ‘F’ 1166 and ‘G’ 1168. Theresulting activity sessions 1110 ‘F’ 1166 and ‘G’ 1168 are thenrespectively processed to generate corresponding session fingerprints1112 ‘F’ 1170 and ‘G’ 1172.

However, in this example activity sessions 1110 ‘F’ 1166 and ‘G’ 1168,and their corresponding session fingerprints 1112 ‘F’ 11170 and ‘G’1172, are not associated with the EBP 420. Instead, as shown in FIG. 11,activity sessions 1110 ‘F’ 1166 and ‘G’ 1168 are processed to generateactivity session 1110 ‘E’ 1154 and session fingerprints 1112 ‘F’ 1170and ‘G’ 1172 are processed to generate session fingerprint 1112 ‘H’1176. In certain embodiments, activity session ‘H’ 1174 and itscorresponding session fingerprint ‘H’ 1176 may be used to generate a newEBP element 1180 ‘H’ 1178. In certain embodiments, EBP element 1180 ‘H’1178 generated from activity session 1110 ‘E’ 1174 and its correspondingsession fingerprint 1112 ‘E’ 1176 may be associated with an existing EBP420.

Accordingly, the time 1104 interval associated with activity session1110 ‘F’ 1166 and its corresponding session fingerprint 1112 ‘F’ 1170overlaps with the time interval 1104 associated with activity session1110 ‘G’ 1168 and its corresponding session fingerprint 1112 ‘G’ 1172.As a result, activity sessions 1110 ‘F’ 1166 and ‘G’ 1168 are subsets ofactivity session 1110 ‘H’ 1174. Consequently, while the intervals oftime respectively associated with activity sessions 1110 ‘F’ 1166 and‘G’ 1168, and their corresponding session fingerprints 1112 ‘F’ 1170 and‘G’ 1172 may overlap, they are associated as they are respectively usedto generate activity session 1110 ‘H’ 1174 and its corresponding sessionfingerprint 1112 ‘H’ 1176.

To provide an example, a user may decide to download various images forplacement in an online publication. In this example, observables 1106‘7’ 1158 may be associated with the user iteratively searching for, anddownloading, the images they wish to use in the online publication.However, the user may not begin placing the images into the onlinepublication until they have selected and downloaded the first few imagesthey wish to use.

To continue the example, observables 1106 ‘8’ 1164 may be associatedwith the user placing the downloaded images in the online publication.Furthermore, the placement of the downloaded images into the onlinepublication may begin a point in time 1104 subsequent to when the userbegan to download the images. Moreover, the downloading of the imagesmay end at a point in time 1104 sooner than when the user completes theplacement of the images in the online publication.

In continuance of the example, observables 1106 ‘7’ 1158 and ‘8’ 1160may be respectively processed to generate IOBs 1108 ‘7’ 1162 and ‘8’1164, whose associated intervals of time 1104 overlap one another.Accordingly, the intervals in time 1104 associated with activitysessions 1110 ‘F’ 1166 and ‘G’ 1168 will likewise overlap one another asthey are respectively generated from IOBs 1108 ‘7’ 1162 and ‘8’ 1164.

Consequently, while the intervals of time 1104 respectively associatedwith activity sessions 1110 ‘F’ 1166 and ‘G’ 1168, and theircorresponding session fingerprints 1112 ‘F’ 1170 and ‘G’ 1172, mayoverlap, they may be considered to be associated as they both relate tothe use of images for the online publication. Accordingly, activitysessions 1110 ‘F’ 1166 and ‘G’ 1168 may be considered to be a subset ofactivity session 1110 ‘H’ 1174 and session fingerprints 1112 ‘F’ 1170and ‘G’ 1172 may be considered to be a subset of session fingerprint1112 ‘H’ 1176.

FIGS. 12a and 12b are a simplified block diagram showing referencearchitecture components of an entity behavior catalog (EBC) systemimplemented in accordance with an embodiment of the invention forperforming certain EBC operations. In various embodiments, the EBCsystem 120 may be implemented to generate, manage, store, or somecombination thereof, information related to the behavior of anassociated entity. In certain embodiments, the EBC system 120 may beimplemented to provide an inventory of entity behaviors for use whenperforming a security operation, described in greater detail herein.

In certain embodiments, an EBC system 120 may be implemented to identifyan indicator of behavior (JOB), described in greater detail herein. Incertain embodiments, the IOB may be based upon an observable, likewisedescribed in greater detail herein. In certain embodiments, theobservable may include event information corresponding toelectronically-observable behavior enacted by an entity. In certainembodiments, the event information corresponding toelectronically-observable behavior enacted by an entity may be receivedfrom an electronic data source, such as the event data sources 1010shown in FIGS. 10, 12 b, and 13.

In certain embodiments, as likewise described in greater detail herein,the EBC system 120 may be implemented to identify a particular event ofanalytic utility by analyzing an observable 1106 associated with aparticular indicator of behavior (JOB) 1108, described in greater detailherein. In certain embodiments, the EBC system 120 may be implemented togenerate entity behavior catalog data based upon an identified event ofanalytic utility. In certain embodiments, an observable 1106 may bederived, as described in greater detail herein, from an identified eventof analytic utility. In various embodiments, the EBC system 120 may beimplemented to associate certain entity behavior data it may generatewith a predetermined abstraction level, described in greater detailherein.

In various embodiments, the EBC system 120 may be implemented to usecertain entity behavior catalog data, and an associated abstractionlevel, to generate a hierarchical set of entity behaviors, described ingreater detail herein. In certain embodiments, the hierarchical set ofentity behaviors generated by the EBC system 120 may represent anassociated security risk, likewise described in greater detail herein.Likewise, as described in greater detail herein, the EBC system 120 maybe implemented in certain embodiments to store the hierarchical set ofentity behaviors within a repository of EBC data.

In various embodiments, the EBC system 120 may be implemented to receivecertain event information, described in greater detail herein,corresponding to an event associated with an entity interaction,likewise described in greater detail herein. In various embodiments, theevent information may be generated by, received from, or a combinationthereof, certain event data sources 1010. In certain embodiments, suchevent data sources 1010 may include endpoint devices 204, edge devices304, identity and access 1204 systems familiar to those of skill in theart, as well as various software and data security 1206 applications. Invarious embodiments, event data sources 1010 may likewise include outputfrom certain processes 1208, network 1210 access and traffic logs,domain 1212 registrations and associated entities, certain resources950, described in greater detail herein, event logs 1214 of all kinds,and so forth.

In certain embodiments, EBC system 120 operations are begun with thereceipt of information associated with a particular event. In certainembodiments, information associated with the event may include userentity profile attributes, user behavior factors, user entity mindsetfactors, entity state information, and contextual information, describedin greater detail herein, or a combination thereof. In variousembodiments, the event may be associated with certain entityinteractions, likewise described in greater detail herein. In variousembodiments, certain user entity profile data, user entity mindsetprofile data, non-user entity profile data, entity state data,contextual information, and temporal information stored in therepository of EBC data may be retrieved and then used to perform eventenrichment operations to enrich and contextualize the informationassociated with the event.

In various embodiments, an observable 1106, described in greater detailherein, may be derived from the resulting enriched, contextualizedevent. As shown in FIG. 12b , examples of such observables 1106 mayinclude firewall file download 1218, data loss protection (DLP) download1220, and various operating system (OS) events 1222, 1226, and 1234. Aslikewise shown in FIG. 12b , other examples of such observables 1106 mayinclude cloud access security broker (CASB) events 1224 and 1232,endpoint spawn 1228, insider threat process start 1230, DLP share 1236,and so forth. In certain embodiments, the resulting observables 1106 mayin turn be respectively associated with a corresponding observableabstraction level, described in greater detail herein.

In certain embodiments, IOB abstraction operations, described in greaterdetail herein, may be performed on the resulting observables 1106 togenerate a corresponding IOB 1108. In various embodiments, an IOB 1108may be expressed in a Subject Action Object format and associated withobservables 1106 resulting from event information received from certainevent data sources 1010. In certain embodiments, an IOB abstractionoperation may be performed to abstract away event data source-specificknowledge and details when expressing an entity behavior. For example,rather than providing the details associated with a “Windows:4624”non-user entity event, the IOB 1108 may be abstracted to a “User LoginTo Device” OS event 1222, 1226, 1234.

As shown in FIG. 12b , examples of IOBs 1108 may include “userdownloaded document” 1222, “device spawned process” 1244, “user sharedfolder” 1246, and so forth. To provide other examples, the IOB 1108“user downloaded document” 1222 may be associated with observables 1106firewall file download 1218, DLP download 1220, OS event 1222, and CASBevent 1224. Likewise, the IOB 1108 “device spawned process” 1244, may beassociated with observables 1106, OS event 1226, endpoint spawn 1228,and insider threat process start 1230. The IOB 1108 “user shared folder”1246 may likewise be associated with observables 1106 CASB event 1232,OS event 1234, and DLP share 1236.

In certain embodiments, IOBs 1108 may in turn be respectively associatedwith a corresponding IOB abstraction level, described in greater detailherein. In various embodiments, activity sessionization operations,likewise described in greater detail herein, may be performed torespectively associate certain events and IOBs 1108 with correspondingactivity sessions, likewise described in greater detail herein.Likewise, as described in greater detail herein, the resulting sessioninformation may be used in various embodiments to associate certainevents of analytic utility, or their corresponding observables 1106, ortheir corresponding IOBs 1108, or a combination thereof, with aparticular activity session.

In certain embodiments, the resulting IOBs 1108 may be processed togenerate an associated EBP element 1180, as described in greater detailherein. In various embodiments, the EBP element 1180 may include userentity profile attribute 604, non-user entity profile attribute 634,data entity profile attribute 644, entity risk score 540, entity state542, entity model 544, entity behavior 1248 information, and so forth.In certain of these embodiments, the actual information included in aparticular EBP element 1180, the method by which it is selected, and themethod by which it is associated with the EBP element 1180, is a matterof design choice. In certain embodiments, the EBP elements 1180 may inturn be respectively associated with a corresponding EBP elementabstraction level, described in greater detail herein.

In various embodiments, certain EBP elements 1180 may in turn beassociated with a particular EBP 540. In certain embodiments, the EBP540 may be implemented as a class of user entity 1252 EBPs, an userentity-specific 1254 EBP, a class of non-user entity 1256 EBPs, anon-user entity-specific 1258 EBP, a class of data entity EBPs 1260, adata entity-specific 1262 EBP, and so forth. In various embodiments,certain entity data associated with EBP elements 1180 associated withthe classes of user entity 1252, non-user entity 1256, and data entity1260 EBPs may be anonymized. In certain embodiments, the EBP 540 may inturn be associated with an EBP abstraction level, described in greaterdetail herein.

In certain embodiments, security risk use case association operationsmay be performed to associate an EBP 540 with a particular security riskuse case 1270. As shown in FIG. 12a , examples of such security risk usecases 1270 include “data exfiltration” 1272, “data stockpiling” 1274,“compromised insider” 1276, “malicious user” 1278, and so forth. Incertain embodiments, identified security risk use cases may in turn beassociated with a security risk use case abstraction level, described ingreater detail herein.

In certain embodiments, the results of the security risk use caseassociation operations may be used to perform security vulnerabilityscenario association inference operations to associate one or moresecurity risk use cases 1270 to one or more security vulnerabilityscenario inferences 1280, described in greater detail herein. As shownin FIG. 12a , examples of security vulnerability scenario inferences1280 include “accidental disclosure” 1282, “account takeover” 1284,“theft of data” 1286, “sabotage” 1288, “regulatory compliance” 1290,“fraud” 1292, “espionage” 1294, and so forth. To continue the example,the “theft of data” 1286 security vulnerability scenario inference maybe associated with the “data exfiltration” 1272, “data stockpiling”1274, “compromised insider” 1276, “malicious user” 1278 security riskuse cases 1270. Likewise the “sabotage” 1288 and “fraud” 1292 securityvulnerability scenario inferences may be respectively associated withsome other security risk case 1270. In certain embodiments, theassociated security vulnerability scenarios may in turn be associatedwith a security vulnerability scenario abstraction level, described ingreater detail herein.

FIG. 13 is a simplified block diagram showing the mapping of entitybehaviors to a risk use case scenario implemented in accordance with anembodiment of the invention. In certain embodiments, an entity behaviorcatalog (EBC) system 120 may be implemented, as described in greaterdetail herein, to receive event information from a plurality of eventdata sources 1010, which is then processed to determine whether aparticular event is of analytic utility. In certain embodiments, the EBCsystem 120 may be implemented to derive observables 1106 from identifiedevents of analytic utility, as likewise described in greater detailherein. In certain embodiments, the EBC system 120 may be implemented,as described in greater detail herein, to associate related observables1106 with a particular indicator of behavior (IOB) 1108, described ingreater detail herein, which in turn is associated with a correspondingsecurity risk use case 1050. In various embodiments, certain contextualinformation may be used, as described in greater detail herein, todetermine which IOBs 1108 may be associated with which security risk usecases 1050.

In certain embodiments, a single 1360 IOB 1108 may be associated with aparticular security risk use case 1050. For example, as shown in FIG.13, event data may be received from a Unix/Linux® event log 1302 and aWindows® directory 1304. In this example, certain event datarespectively received from the Unix/Linux® event log 1302 and Windows®directory 1304 may be associated with an event of analytic utility,which results in the derivation of observables 1106 “File In LogDeleted” 1322 and “Directory Accessed” 1324. To continue the example,the resulting observables 1106 “File In Log Deleted” 1322 and “DirectoryAccessed” 1324 may then be associated with IOB 1108 “Event Log Cleared”1344. In turn, IOB 1108 “Event Log Cleared” 1344 may be associated withsecurity risk use case 1050 “Administrative Evasion” 1358.

In certain embodiments, two or more 1364 IOBs 1108 may be associatedwith a particular security risk use case 1050. For example, as shown inFIG. 13, event data may be received from an operating system (OS) 1306,an insider threat 1308 detection system, an endpoint 1310 and a firewall1312. In this example, certain event data respectively received from theoperating system (OS) 1306, the insider threat 1308 detection system,the endpoint 1310 and the firewall 1312 may be associated with an eventof analytic utility. Accordingly, observables 1106 “Security Event ID”1326, and “New Connection” 1328, may be respectively derived from theevent data of analytic utility received from the endpoint 1310 and thefirewall 1312 event data sources 1010. Likewise, observables 1106“Connection Established” 1330 and “Network Scan” 1332 may berespectively derived from the event data of analytic utility receivedfrom the OS 1306 and the insider threat 1308 detection system event datasources 1010.

To continue the example, the resulting observables 1106 “Security EventID” 1326, “New Connection” 1328 and “Connection Established” 1330 may beassociated with IOB 1108 “Device Connected To Port” 1346. Likewise,observable 1106 “Network Scan” 1332 may be associated with IOB 1108“Network Scan” 1348. In turn, IOBs 1108 “Device Connected To Port” 1346and “Network Scan” 1332 may be associated with security risk use case1050 “Internal Horizontal Scanning” 1362.

In certain embodiments, a complex set 1368 of IOBs 1108 may beassociated with a particular security risk use case 1050. For example,as shown in FIG. 13, event data may be received from an OS 1314, aninternal cloud access security broker (CASB) 1316, an external CASB1318, and an endpoint 1320. In this example, certain event datarespectively received from the OS 1314, the internal cloud accesssecurity broker (CASB) 1316, the external CASB 1318, and the endpoint1320 may be associated with an event of analytic utility.

Accordingly, observables 1106 “OS Event” 1334, “CASB Event” 1340, and“New Application” 1342 may be respectively derived from the event dataof analytic utility provided by the OS 1314, the external CASB 1318, andthe endpoint 1320 event data sources 1010. Likewise, a first “CASB EventID” 1336 observable 1106 and a second “CASB Event ID” 1338 observable1106 may both be derived from the event data of analytic utilityreceived from the internal CASB 1316 event data source 1010

To continue the example, the “OS Event” 1334, the first “CASB Event ID”1336, and “New Application” 1342 observables 1106 may then berespectively associated with IOBs 1108 “New USB Device” 1350, “PrivateShareable Link” 1352, and “File Transfer Application” 1356. Likewise,second “CASB Event ID” 1338 observable 1106 and the “CASB Event” 1340observable 1106 may then be associated with JOB 1108 “Public ShareableLink” 1354. In turn, the IOBs 1108 “New USB Device” 1350, “PrivateShareable Link” 1352, “Public Shareable Link” 1354, and “File TransferApplication” 1356 may be associated with security risk use case 1050“Data Exfiltration Preparations” 1366.

FIG. 14 is a simplified block diagram of the performance of a humanfactors risk operation implemented in accordance with an embodiment ofthe invention. In various embodiments, information associated withcertain human factors 430, described in greater detail herein, may beprocessed with information associated with certain indicators ofbehavior (IOBs) 1108 to detect a corresponding concerning behavior 1414.As used herein, a concerning behavior 1414 broadly refers to an IOB 1108whose associated enactment of entity behavior may be considered apotential security risk. In certain embodiments, the entity behaviorassociated with an IOB 1108 may be enacted by a user entity, a non-userentity, or a data entity, or a combination thereof.

In certain embodiments, the human factors 430 may include cardinaltraits 1402, emotional stressors 1404, and organizational dynamics 1406,or a combination thereof, likewise described in greater detail herein.In certain embodiments, as likewise described in greater detail herein,one or more entity behaviors associated with an IOB 1108 may bedetermined to be anomalous, abnormal, unexpected, suspicious, or somecombination thereof. In these embodiments, the method by which a userentity behavior associated with an IOB 1108 is determined to beanomalous, abnormal, unexpected, suspicious, or some combinationthereof, is a matter of design choice.

In various embodiments, certain information associated with a detectedconcerning behavior 1414 may be used in the performance of a humanfactors risk 1412 operation, described in greater detail herein, toinfer an associated adverse effect 1416. As used herein, an adverseeffect 1416 broadly refers to an unfavorable consequence resulting fromthe enactment of a concerning behavior 1414 by an entity. In certainembodiments, the enactment of a concerning behavior 1414 by a userentity may be characterized by a security risk persona, described ingreater detail herein. In certain embodiments, an adverse effect 1416may be described by a security risk use case, or a securityvulnerability scenario, or a combination of the two, likewise describedin greater detail herein.

Certain embodiments of the invention reflect an appreciation that theoccurrence of an adverse effect 1416 may result in a correspondingadverse outcome. As an example, an employee may attempt to accesscertain proprietary corporate data from their home computer on aweekend. While the employee may access such data on a regular basis fromtheir place of employment during normal work hours, it is unusual forthem to do so otherwise. In this example, the employee may beexperiencing certain emotional stressors 1404, described in greaterdetail herein.

Those emotional stressors 1404, combined with anomalous entity behaviorassociated with an IOB 1108 related to attempting to access proprietarydata from their home computer during non-work hours, may indicateenactment of a concerning behavior 1414. To continue the example,information associated with the detected concerning behavior 1414 may beused in the performance of a human factor risk operation 1412 to inferwhether the employee's concerning behavior 1414 might result in anadverse effect 1416. To complete the example, it may be inferred thatthe employee's concerning behavior 1414 may correspond to a dataexfiltration security vulnerability scenario, described in greaterdetail herein, which if successfully executed may result in the adverseoutcome of proprietary corporate data being exfiltrated.

FIG. 15 is a simplified block diagram of the performance of an entitybehavior meaning derivation operation implemented in accordance with anembodiment of the invention. In certain embodiments, one or more entitybehavior meaning derivation 1532 operations may be performed to achievea literal, inferential, and evaluative, or a combination thereof,understanding 1502, 1512, 1522, 1530, 1540 of the meaning of aparticular entity's associated entity behavior. In certain embodiments,information associated with the result of the entity behavior meaningderivation 1532 operation may be used to achieve an understanding of therisk corresponding to an associated adverse effect 1544.

In various embodiments, information associated with certain humanfactors, such as cardinal traits 1402, emotional stressors 1404, andorganizational dynamics 1406, described in greater detail herein, or acombination thereof, may be used in an entity behavior meaningderivation 1532 operation to achieve an understanding 1502 of a userentity's behavior. In various embodiments, information associated withcertain non-user entity classes 1514, attributes 1516, and entitybehavior history 1518, or a combination thereof, may likewise be used inan entity behavior meaning derivation 1532 operation to achieve anunderstanding 1512 of a non-user entity's behavior. Likewise, in certainembodiments, information associated with certain data entity classes1524, attributes 1526, and entity behavior history 1528, or acombination thereof, in an entity behavior meaning derivation 1532operation to achieve an understanding 1522 of a data entity's behavior.

FIG. 16 is a simplified block diagram of the performance of operationsimplemented in accordance with an embodiment of the invention toidentify an enduring behavioral pattern corresponding to a particularuser entity. In various embodiments, a user entity may enact certainentity behaviors associated with an indicator of behavior (IOB) 1108over a particular period of time 1640. In certain embodiments, a humanfactors risk association operation, described in greater detail herein,may be performed to identify a particular cardinal trait 1402corresponding to the enactment of one or more such IOBs 1108. In certainembodiments, an identified cardinal trait 1402, such as “boundarypusher” 1628 may be persisted over time 1640 to reflect a particularenduring behavior pattern 1642 corresponding to the user entity.

For example, as shown in FIG. 16, a user entity may enact an“unrecognized” 1604 indicator of behavior (IOB) 1108 at a particularpoint in time 1640, which results in a corresponding “unrecognized” 1624cardinal trait. At some point in time 1640 thereafter, the same userentity may enact a “data loss prevention (DLP) violation” 1606 IOB 1108,which likewise results in a corresponding “unrecognized” 1624 cardinaltrait. At some later point in time 1640 thereafter, the same user entitymay enact an “abuses working from home policy” 1608 IOB 1108. In thisexample, information associated with the enactment of the “unrecognized”1604, “DLP violation” 1606, and “abuses working from home policy” 1608IOBs 1108 may be used in the performance of a human factors riskassociation operation to determine the user entity personifies thecardinal trait of “boundary pusher” 1628.

To continue the example, the user entity may enact IOBs 1108 at laterpoints in time 1640, including “DLP violation” 1610, “unrecognized”1612, “requests access to sensitive files” 1614, and “unrecognized”1616. However, the user entity's identified cardinal trait of “boundarypusher” 1628 is persisted as an enduring behavior pattern 1642. Those ofskill in the art will recognize that many such embodiments and examplesof cardinal traits 1402 being used to establish an enduring behaviorpattern 1642 are possible. Accordingly, the foregoing is not intended tolimit the spirit, scope, or intent of the invention.

FIG. 17 is a graphical representation of an ontology showing exampleemotional stressors implemented in accordance with an embodiment of theinvention as a human factor. As described in greater detail herein, anemotional stressor 1404, in combination with one or more other humanfactors, and one or more indicators of behavior (IOBs), may result inthe occurrence of a concerning behavior. In certain embodiments,emotional stressors 1404 may be used in certain embodiments as acontextual modifier to provide meaningful context for detecting aconcerning behavior, identifying an associated security risk case, orinferring a security risk vulnerability scenario, or a combinationthereof. As used herein, a contextual modifier broadly refers to acircumstance, aspect, dynamic, attribute, or other consideration used toclarify, mitigate, exacerbate, or otherwise affect the perception,meaning, understanding, or assessment of a security risk associated witha particular JOB.

In certain embodiments, classes of emotional stressors 1404 may includepersonal 1704, professional 1706, financial 1708, and legal 1710.Certain embodiments of the invention reflect an appreciation that theeffect of one or more emotional stressors 1404 on an associated userentity may result in the occurrence of a concerning behavior, describedin greater detail herein, that may not represent a security risk.However, certain embodiments of the invention likewise reflect anappreciation that user entities engaging in both intentionally maliciousand accidentally risky behaviors are frequently enduring personal 1704,professional 1706, financial 1708, and legal 1710 emotional stressors1404.

As shown in FIG. 17, examples of personal 1704 emotional stressors 1404may include certain life changes, such as separation or divorce,marriage, the birth, death, or sickness of a family member or friend,health issues or injuries, pregnancy or adoption, and so forth.Likewise, examples of professional 1706 emotional stressors 1404 mayinclude termination or unsatisfactory performance reviews, retirement,business unit reorganization, changes in responsibility or compensation,co-worker friction, changes in work hours or location, and so forth.

Examples of financial 1708 emotional stressors 1404 may likewise includebankruptcy, foreclosure, credit issues, gambling addition, and so forth.Likewise, examples of legal 1710 emotional stressors 1404 contextualmodifiers may include previous arrests, current arrests orincarceration, drug or driving under the influence (DUI) offenses, wagegarnishment, and so forth. Skilled practitioners of the art willrecognize that other 1712 classes of emotional stressors 1404 arepossible. Accordingly, the foregoing is not intended to limit thespirit, scope, or intent of the invention.

FIG. 18 shows a mapping of data sources to emotional stressorsimplemented in accordance with an embodiment of the invention as a humanfactor. In various embodiments, individual emotional stressors 1404 maybe implemented to receive input data from certain data sources. Incertain embodiments, these data sources may include communicationchannels 1812 of various kinds, web activity 1814, automated emails1816, human resources 1818 communications, credit reports 1820, andbackground checks 1822. Skilled practitioners of the art will recognizethat individual emotional stressors 1404 may be implemented to receiveinput data from other data sources as well. Accordingly, the foregoingis not intended to limit the spirit, scope, or intent of the invention.

In certain embodiments, communication channels 1812 may include emails,chat (e.g., SLACK®), phone conversations (e.g., telephone, SKYPE®,etc.), and so forth. In various embodiments, natural language processing(NLP) approaches familiar to those of skill in the art may beimplemented to identify certain emotional stressors 1404 within aparticular communication channel 1812 exchange. In various embodiments,web activity 1814 may be monitored and processed to identify certainemotional stressors 1404. In various embodiments, web activity 1814 maylikewise be monitored and processed to identify certain web-related datafields, such as search terms, time stamps, domain classification, anddomain risk class. In certain embodiments, auto-generated emails,especially from Human Capital Management (HCM) or Human Resource (HR)systems may be implemented to assist an organization identify andunderstand emotional stressors 1404 related to a user entity'sprofessional and life events. Likewise, data received for humanresources 1818, credit reports 1820, and background checks 1822 may beimplemented in certain embodiments to assist in identifying andunderstanding additional emotional stressors related to a particularuser entity 1404.

In certain embodiments, more than one data source may provide input datato a particular emotional stressor 1404. For example, as shown in FIG.18, a professional 1706 emotional stressor may be implemented to receiveinput data from certain communication channels 1812, web activity 1814,automated emails 1816, and human resources 1818 communications. Those ofskill in the art will recognize that many such embodiments and examplesare possible. Accordingly, the foregoing is not intended to limit thespirit, scope or intent of the invention.

FIG. 19 is a graphical representation of an ontology showing exampleorganizational dynamics implemented in accordance with an embodiment ofthe invention as a human factor. As described in greater detail herein,the occurrence of an organizational dynamic 1406 may result in theoccurrence of an associated concerning behavior. As described in greaterdetail herein, an organizational dynamic 1406, in combination with oneor more other human factors, and one or more indicators of behavior(IOBs), may result in the occurrence of a concerning behavior. Incertain embodiments, classes of organizational dynamic 1406 may includesecurity practices 1904, communication issues 1906, management systems1908, and work planning and control 1910.

As shown in FIG. 19, examples of security practices 1904 organizationaldynamics 1406 include hiring practices, security training and controls,policy clarity, monitoring and tracking practices, and so forth.Likewise, examples of communication issues 1906 organizational dynamics1406 include inadequate procedures, poor communications, and so forth.Examples of management systems 1908 organizational dynamics 1406 maylikewise include distractions of various kinds, a non-productiveenvironment, insufficient resources, and lack of career advancement.Other examples of management systems 1908 organizational dynamics 1406may include poor management systems, job instability, poor workconditions, and so forth.

Likewise, examples of work planning and control 1910 organizationaldynamics 1406 include job pressures of different sorts, workload, timefactors, work role, task difficulty, lack of autonomy and power, changein routine, lack of breaks, and so forth. Skilled practitioners of theart will recognize that other 1912 classes of organizational dynamics1406 are possible. Accordingly, the foregoing is not intended to limitthe spirit, scope, or intent of the invention.

FIG. 20 shows a human factors risk modeling framework implemented inaccordance with an embodiment of the invention. As used herein, humanfactors risk broadly refers to any risk associated with the enactment ofa behavior by a user entity affected by one or more human factors, asdescribed in greater detail herein. In certain embodiments, the humanfactors risk modeling framework 2000 shown in FIG. 20 may be used incombination with a human factors framework, described in greater detailherein, to perform a security analytics operation, likewise described ingreater detail herein.

In various embodiments, the security analytics operation may beperformed independently by the human factors framework, or incombination with certain components of a security analytics system,described in greater detail herein. Various embodiments of the inventionreflect an appreciation that known approaches to human factors riskmodeling have certain limitations that often pose challenges forsecurity-related implementation. Likewise, various embodiments of theinvention reflect an appreciation that implementation of the humanfactors risk modeling framework 2000 may assist in addressing certain ofthese limitations.

In certain embodiments, a user entity may enact certain entity behaviorassociated with a corresponding indicator of behavior (IOB) 1108,described in greater detail herein. In certain embodiments, such userentity behaviors associated with a corresponding IOB 1108 may bedetermined to be anomalous, abnormal, unexpected, suspicious, or somecombination thereof, as described in greater detail herein. In variousembodiments, the human factors risk modeling framework 2000 may beimplemented as a reference model for correlating certain human factors430 associated with a particular user entity to certain anomalous,abnormal, unexpected, or suspicious behavior, or some combinationthereof, they may enact.

In various embodiments, such correlation may result in the detection ofan associated concerning behavior 1414, described in greater detailherein. In certain embodiments, such concerning behaviors 1414 may bedetected as a result of the performance of a human factors riskoperation, likewise described in greater detail herein. In certainembodiments, the effect of a particular concerning behavior 1414 may bequalitative, quantitative, or a combination of the two.

Referring now to FIG. 20, an observable 1106, described in greaterdetail herein, may be derived in various embodiments from one or moreevents of analytic utility 2004 associated with certain user entitybehaviors 2002, likewise described in greater detail herein. In certainembodiments, as likewise described in greater detail herein, one or moreassociated observables 1106 may be processed to generate a correspondingactivity session 1110. In various embodiments, certain informationassociated with a particular activity session 1110, may be processed, aslikewise described in greater detail herein, to generate a correspondingsession fingerprint 1112.

In various embodiments, certain human factor risk operations, describedin greater detail herein, may be performed to identify one or more humanfactors 430, likewise described in greater detail herein, associatedwith a particular user entity. In certain embodiments, such humanfactors 430 may include cardinal traits 1402, emotional stressors 1404,and organizational dynamics 1406, or a combination thereof. In variousembodiments, a security analytics operation, described in greater detailherein, may be performed to identify certain IOBs 1108 associated with aparticular user entity. In certain embodiments, one or more human factorrisk operations may be performed to correlate certain human factors 430associated with the user entity to IOBs 1108 they may have enacted. Incertain embodiments, the resulting correlation may result in thedetection of an associated concerning behavior 1414, described ingreater detail herein.

In certain embodiments, information related to certain sessionfingerprints 1112, human factors 430, IOBs 1108, and concerningbehaviors 1414 may then be stored with other information contained in anentity profile (EBP) 420 associated with the user entity. In certainembodiments, the EBP 420 may then be implemented to identify aparticular security risk use case 1270 corresponding to the user entity.In certain embodiments, the identified security risk use case 1270 mayin turn correspond to a particular outcome-oriented kill chain 2024,described in greater detail herein. In certain embodiments, thepreviously identified IOBs may correspond to a particular component 2026of the outcome-oriented kill chain 2024, as described in the descriptivetext associated with FIG. 21.

In certain embodiments, as likewise described in the descriptive textassociated with FIG. 21, each component 2006 of the outcome-orientedkill chain 2024 may be implemented to have a corresponding security riskpersona 2028. As used herein, a security risk persona 2028 broadlyrefers to a group of user entity behaviors 2002, associated with acommon theme, whose enactment is not explicitly related to a maliciousobjective. In various embodiments, certain user entity behaviors 2002associated with a particular security risk use case 1270 may be used todefine, or otherwise describe or characterize, a particular securityrisk persona 2028. In these embodiments, the user entity behaviors 2002selected for use, and the method by which the security risk persona 2008is defined, or otherwise described or characterized, is a matter ofdesign choice. In these embodiments, the descriptor selected tocharacterize a particular behavioral pattern exhibited by a user entityis likewise a matter of design choice.

In various embodiments, as described in greater detail herein, certainsecurity risk personas 2028 may be implemented to track dynamic changesin user entity behaviors 2002. In various embodiments, the ability totrack dynamic changes in user entity behaviors 2002 may facilitate theidentification and management of rapidly developing threats.Accordingly, certain embodiments of the invention reflect anappreciation that such tracking may be indicative of dynamic behavioralchange associated with a particular user entity, such as associated IOBs1108. Likewise, various embodiments of the invention reflect anappreciation that certain security risk personas 2028 may shift, ortransition, from one to another, and in doing so, reflect importantshifts in user entity behaviors 2002 that are relevant to understandinga user entity's traversal of associated outcome-oriented kill chains2024.

In certain embodiments, a security risk persona 2028 may be used, asdescribed in greater detail herein, to identify an associated securityvulnerability scenario 1280, likewise described in greater detailherein. In various embodiments, the identified security vulnerabilityscenario 1280 may be used in combination with certain other componentsof the human factors risk modeling framework 2000 to perform a userentity security risk assessment 2030. In certain embodiments,performance of the user entity security risk assessment 2030 may resultin the generation of a corresponding user entity risk score 2032. Incertain embodiments, the user entity risk score 2032 may be implementedas a numeric value. In certain embodiments, the numeric value of theuser entity risk score 2032 may be implemented to quantitatively reflectthe security risk associated with a particular concerning behavior 1414.

In various embodiments, the user entity risk score 2032 may beimplemented to be within a certain range of numeric values. In certainembodiments, the range of numeric values may be implemented to have alower and upper bound. As an example, the user entity risk score 2032for a particular concerning behavior 1414 may be implemented to have alower bound of ‘0,’ indicating extremely low risk, and an upper bound‘100,’ indicating extremely high risk. To illustrate the example, a userentity may initiate the detection of a concerning behavior 1414 byaccessing a corporate server containing sales data, which in turn mayresult in the generation of an associated user entity risk score 2032 of‘50.’ In this example, the user entity risk score 2032 of ‘50’ mayindicate moderate risk. However, downloading the same sales data to alaptop computer may result in the generation of a concerning behaviorrisk score of ‘75,’ indicating high risk. To further illustrate theexample, downloading the same sales data to a laptop computer, and thenstoring the sales data on a flash drive, may result in the generation ofa concerning behavior risk score of ‘90,’ indicating very high risk.

In certain embodiments, the numeric value of a user entity risk score2032, or the upper and lower bounds of its associated range of numericvalues, or both, may be implemented to be configurable. In certainembodiments, the selection of a numeric value for a particular userentity risk score 2032, or the selection of the upper and lower boundsof its associated range of numeric values, or both, may be performedmanually, automatically, or a combination thereof. In these embodiments,the numeric value selected for a particular user entity risk score 2032,or the upper and lower bounds selected for its associated range ofnumeric values, or both, is a matter of design choice.

As described in greater detail herein, an EBP 420 may be implemented incertain embodiments to collect certain user entity behavior 2002 andother information associated with a particular user entity. Examples ofsuch information may include user entity attributes, such as their name,position, tenure, office location, working hours, and so forth. Incertain embodiments, the EBP 420 may likewise be implemented to collectadditional behavioral information associated with the human factors riskmodel 2000. Examples of such additional information may include certainhistorical information associated with kill chain components 2006,associated security risk personas 2008, security vulnerability scenarios1280, indicators of behavior (IOBs) 1108, and user entity risk scores2032.

As an example, an EBP 420 may contain the following user entityinformation:

-   -   User Entity Name: John Smith    -   User Entity Risk Score: 50%    -   Current Security Risk Persona: Wanderer    -   Security Vulnerability Scenarios: Data Theft (Medium Confidence)        -   Fraud (Low Confidence)    -   Scenario Risk Score 55%

FIG. 21 shows security risk persona transitions associated with acorresponding outcome-oriented kill chain implemented in accordance withan embodiment of the invention. In certain embodiments, a securityanalytics system, a human factors framework, and an entity behaviorcatalog (EBC) system, or a combination thereof, may be implemented tomonitor the behavior of a particular user entity, as described ingreater detail herein. In certain embodiments, such monitoring mayinclude observing an electronically-observable data source, such as theevent data sources 1010 shown in FIGS. 10, 12 b, and 13.

In certain embodiments, an observable, described in greater detailherein, may be derived from an electronically-observable data source. Incertain embodiments, the observable is associated with an event ofanalytic utility, likewise described in greater detail herein. Incertain embodiments, one or more derived observables may then beassociated with an indicator of behavior (IOB), as described in greaterdetail herein. In various embodiments, as likewise described in greaterdetail herein, a particular IOB activity may be associated with acomponent of a cyber kill chain.

Skilled practitioners of the art will be familiar with a kill chain,which was originally used as a military concept related to the structureof an attack. In general, the phases of a military kill chain consistedof target identification, force dispatch to target, decision and orderto attack the target, and destruction of the target. Conversely,breaking or disrupting an opponent's kill chain is a method of defenseor preemptive action. Those of skill in the art will likewise befamiliar with a cyber kill chain, developed by the Lockheed Martincompany of Bethesda, Md., which is an adaptation of the military killchain concept that is commonly used to trace the phases of acyberattack.

In certain embodiments, a cyber kill chain may be implemented torepresent multi-stage, outcome-oriented user entity behaviors. Ingeneral, such outcome-oriented cyber kill chains will have at least twodefined components. In certain embodiments, the components of anoutcome-oriented cyber kill chain may be referred to, or implemented as,steps or phases of a kill chain. In certain embodiments, the componentsof an outcome-oriented cyber kill chain may be adapted, or otherwiseimplemented, for a particular type of cyberattack, such as data theft.For example, as shown in FIG. 21, the components of a data theft killchain 2130 may include data reconnaissance 2132, data access 2134, datacollection 2136, data stockpiling 2138, and data exfiltration 2140.

However, the cyber kill chain concept is not limited to data theft,which relates to theft of an organization's intellectual property. Itcan also be implemented to facilitate the anticipation and recognitionof insider threats, such as insider sabotage, which includes any act byan insider to direct any kind of harm to an organization or its assets.Other insider threats include insider fraud, which relates tomodification, deletion, or theft of an organization's data for personalgain, typically associated with the perpetration of an identity crime(e.g., identity theft, credit card fraud, etc.).

Yet other insider threats include unintentional insider threat, whichincludes any act, or failure to act, by an insider without maliciousintent, that causes harm or substantially increases the probability offuture harm to an organization or its assets. The cyber kill chainconcept can likewise be implemented to address the occurrence, orpossibility thereof, of workplace violence, which relates to any threatof physical violence, harassment, intimidation, or other threateningdisruptive behavior in the workplace. Likewise, the cyber kill chainconcept can be applied to social engineering, advanced ransomware, andinnovative cyberattacks as they evolve.

In certain embodiments, a cyber kill chain may be implemented toanticipate, recognize, and respond to user entity behaviors associatedwith a corresponding indicator of behavior (JOB) that may be determinedto be anomalous, abnormal, unexpected, suspicious, or some combinationthereof, as described in greater detail herein. In certain embodiments,the response to recognition of a kill chain may be to perform anassociated security operation, likewise described in greater detailherein. In certain embodiments, the performance of the securityoperation may result in disrupting or otherwise interfering with theperformance, or execution, of one or more components, steps, or phasesof a cyber kill chain by affecting the performance, or enactment, of theIOB by its associated entity.

In certain embodiments, a cyber kill chain may consist of morecomponents, steps, or phases than those shown in the data theft killchain 2130. For example, in certain embodiments, the cyber kill chainmay likewise include intrusion, exploitation, privilege escalation,lateral movement, obfuscation/anti-forensics, and denial of service(DoS). In such embodiments, the data reconnaissance 2132 component maybe executed as an observation stage to identify targets, as well aspossible tactics for the attack. In certain embodiments, the datareconnaissance 2132 component may not be limited to data exfiltration.For example, it may be related to other anomalous, abnormal, unexpected,malicious activity, such as identity theft.

In certain embodiments, the data access 2134 component may not belimited to gaining access to data. In certain embodiments, the dataaccess 2134 component of a cyber kill chain may be executed as anintrusion phase. In such embodiments, the attacker may use what waslearned in execution of the data reconnaissance 2132 component todetermine how to gain access to certain systems, possibly through theuse of malware or exploitation of various security vulnerabilities. Incertain embodiments, a cyber kill chain may likewise include anexploitation component, which may include various actions and efforts todeliver malicious code and exploit vulnerabilities in order to gain abetter foothold with a system, network, or other environment.

In certain embodiments, a cyber kill chain may likewise include aprivilege escalation component, which may include various actions andefforts to escalate the attacker's privileges in order to gain access tomore data and yet more permissions. In various embodiments, a cyber killchain may likewise include a lateral movement component, which mayinclude moving laterally to other systems and accounts to gain greaterleverage. In certain of these embodiments, the leverage may includegaining access to higher-level permissions, additional data, or broaderaccess to other systems.

In certain embodiments, a cyber kill chain may likewise include anobfuscation/anti-forensics component, which may include various actionsand efforts used by the attacker to hide or disguise their activities.Known obfuscation/anti-forensics approaches include laying false trails,compromising data, and clearing logs to confuse or slow down securityforensics teams. In certain embodiments, the data 2136 collectioncomponent of a cyber kill chain may include the collection of data withthe intent of eventually being able to exfiltrate it. In certainembodiments, collected data may be accumulated during a data stockpiling2138 component of a cyber kill chain.

In certain embodiments, a cyber kill chain may likewise include a denialof service (DoS) component, which may include various actions andefforts on the part of an attacker to disrupt normal access for usersand systems. In certain embodiments, such disruption may be performed tostop a cyberattack from being detected, monitored, tracked, or blocked.In certain embodiments, the data exfiltration 2140 component of a cyberkill chain may include various actions and efforts to get data out of acompromised system.

In certain embodiments, information associated with the execution of aparticular component or phase of a cyber kill chain may be associatedwith a corresponding security vulnerability scenario 1060, described ingreater detail herein. In certain embodiments, one of more components ofa particular cyber kill chain may be associated with one or morecorresponding security related use cases, likewise described in greaterdetail herein. In certain embodiments, performance or execution of acomponent or phase of a cyber kill chain may be disrupted by affectingcompletion of the security related risk use case. Those of skill in theart will recognize that many such embodiments are possible. Accordingly,the foregoing is not intended to limit the spirit, scope, or intent ofthe invention.

In various embodiments, certain user entity behaviors may be observed asthe result of security related activities being enacted during anassociated activity session 1110, described in greater detail herein. Incertain embodiments, a user entity behavior may also be determined to bea concerning behavior, likewise described in greater detail herein. Invarious embodiments, as described in greater detail herein, certain IOBsassociated with each activity session 1110 may be processed to generatea corresponding session fingerprint 1112. As likewise described ingreater detail herein, each resulting session fingerprint 1112 may thenbe associated in certain embodiments with a corresponding securityvulnerability scenario 1060. In certain embodiments, as described ingreater detail herein, individual security vulnerability scenarios 1060may in turn be associated with a particular component or phase of acyber kill chain, such as the data theft kill chain components 2130shown in FIG. 21. Likewise, as described in greater detail herein,individual kill chain components may in turn be associated with aparticular security risk persona, such as the data theft security riskpersona 2150 shown in FIG. 21

As an example, as shown in FIG. 21, security related activities enactedby a user entity during activity session(s) ‘A’ 2110 may be processed togenerate session fingerprint(s) ‘A’ 2120, which may then be associatedwith security vulnerability scenario ‘A’ 2172. In turn, securityvulnerability scenario ‘A’ 2172 may be associated with the datareconnaissance 2132 phase of the data theft kill chain 2130. In thisexample, the security related activities may include external searches,application searching, share searching and mapping, internal searches,and so forth.

As another example, security related activities enacted by a user entityduring activity session(s) ‘B’ 2112 may be processed to generate sessionfingerprint(s) ‘B’ 2122, which may then be associated with securityvulnerability scenario ‘B’ 2174. In turn, security vulnerabilityscenario ‘B’ 2174 may in turn be associated with the data access 2134phase of the data theft kill chain 2130. In this example, the securityrelated activities may include cloud access and internal applicationrequests, data repository access, file sharing attempts, and so forth.

As yet another example, security related activities enacted by a userentity during activity session(s) ‘C’ 2114 may be processed to generatesession fingerprint(s) ‘C’ 2124, which may then be associated withsecurity vulnerability scenario ‘C’ 2176. In turn, securityvulnerability scenario ‘C’ 2176 may in turn be associated with the datacollection 2136 phase of the data theft kill chain 2130. In thisexample, the security related activities may include cloud and webdownloads, email and chat attachments, data downloads from applications,data repositories, and file shares, and so forth.

As yet still another example, security related activities enacted by auser entity during activity session(s) ‘D’ 2116 may be processed togenerate session fingerprint(s) ‘D’ 2126, which may then be associatedwith security vulnerability scenario ‘D’ 2178. In turn, securityvulnerability scenario ‘D’ 2178 may in turn be associated with the datastockpiling 2138 phase of the data theft kill chain 2130. In thisexample, the security related activities may include creation of newfolders or cloud sites, uploads to data repositories, creation of newarchives, endpoints, file shares, or network connections, and so forth.

As an additional example, security related activities enacted by a userentity during activity session(s) ‘E’ 2118 may be processed to generatesession fingerprint(s) ‘E’ 2128, which may then be associated withsecurity vulnerability scenario ‘E’ 2180. In turn, securityvulnerability scenario ‘E’ 2180 may in turn be associated with the dataexfiltration 2140 phase of the data theft kill chain 2130. In thisexample, the security related activities may include flash drive andfile transfers, sharing links in cloud applications, external orweb-based email communication, connection to Internet of Things (IoT)infrastructures, and so forth.

In various embodiments, certain components or phases of a cyber killchain, such as the components of the data theft kill chain 2130 shown inFIG. 21, may be associated with a corresponding security risk persona,such as the data theft security risk personas 2150, likewise shown inFIG. 21. For example, the data reconnaissance 2132, data access 2134,data collection 2136, data stockpiling 2138, and data exfiltration 2140phases of the data theft kill chain 2130 may respectively be associatedwith the wanderer 2152, boundary pusher 2154, hoarder/collector 2156,stockpile 2158, and exfiltrator 2160 data theft security risk personas2150. Accordingly, a security risk persona may be implemented in certainembodiments to align with a corresponding cyber kill chain phase. As anexample, the data theft security risk persona 2150 of wanderer 2152 maybe aligned with the data theft kill chain phase 2130 of datareconnaissance 2132.

In certain embodiments, a security risk persona may be named, stylized,or otherwise implemented, to convey a sense of the general behavioraltheme of an associated user entity. As an example, the data theftsecurity risk persona 2150 of boundary pusher 2154 may convey,characterize, or otherwise represent a concerning behavioral pattern ofa particular user entity attempting to access certain proprietary data.Accordingly, the data theft security risk persona 2150 of boundarypusher 2154 may implemented to align with the data theft kill chain 2130phase of data access 2134.

In certain embodiments, a security risk persona may be implemented todescribe, or otherwise indicate, an associated user entity's behavior ata particular point in time, and by extension, provide an indication oftheir motivation, or intent, or both. Accordingly, a security riskpersona may be implemented in certain embodiments to provide anindication of a user entity's current phase in a particular cyber killchain, or possibly multiple cyber kill chains. In certain embodiments,the alignment of a security risk persona to a corresponding phase of acyber kill chain may be used to accurately map a particular securityrisk persona to user entity behavior in a way that clarifies cyber killchain phases and associated security vulnerability scenarios. In certainembodiments, a user entity may exhibit multiple types, orcategorizations, of user entity behavior, such that they behaviorallyand historically align with multiple security risk personas over thesame interval of time.

In certain embodiments, the ordering of security risk personas mayindicate a progression of the severity of the user entity behaviorsassociated with each phase of a cyber kill chain. In certainembodiments, a user entity's associated security risk persona maytraverse a particular cyber kill chain over time. In certainembodiments, such traversal of a cyber kill chain may be non-linear, orbi-directional, or both. In certain embodiments, tracking the transitionof a user entity's associated security risk persona over time mayprovide an indication of their motivation, or intent, or both.

As an example, as shown in FIG. 21, the data theft security persona 2150of a user entity may initially be that of a hoarder/collector 2156. Inthis example, the user entity's data theft security persona 2150 maytransition to boundary pusher 2154 and wanderer 2152. Alternatively, theuser entity's data theft security persona 2150 may transition directlyto wanderer 2152, and from there, to boundary pusher 2154. As yetanother alternative, the user entity's data theft security persona 2150may transition directly to exfiltrator 2160, and so forth. Skilledpractitioners of the art will recognize that many such possibilities ofa security risk persona traversing a cyber kill chain are possible.Accordingly, the foregoing is not intended to limit the spirit, scope,or intent of the invention.

FIGS. 22a and 22b show indicators of behavior corresponding to asecurity risk persona implemented in accordance with an embodiment ofthe invention. In certain embodiments, a security risk persona 2028 maybe typified by a descriptor characterizing its associated indicators ofbehavior (IOBs) 1108, described in greater detail herein. In variousembodiments, IOBs 1108 associated with a particular security riskpersona 2028 may occur during a certain period of time 2208. In variousembodiments, a security risk persona's 2208 associated IOBs 1108 maycorrespond to the occurrence of certain events 2210 at certain points oftime 2208.

As an example, as shown in FIG. 22a , a user entity may exhibit a groupof IOBs 1108 typically associated with the security risk persona 2028 of“Leaver” 2214. To continue the example, the group of IOBs 1108 mayinclude the creation of multiple resume variations, updating of socialmedia profiles, researching companies via their websites, searching forreal estate in a new location, increased documentation of work product,and so forth. Likewise, associated events 2210 may include preparing fora job search, searching, applying, and interviewing for a new job,following up with a potential employer, negotiating compensation,reviewing an offer, completing a background check, tendering notice, andleaving the organization.

Accordingly, certain embodiments of the invention reflect anappreciation that not all IOBs 1108 are concerning behaviors, describedin greater detail herein. Furthermore, certain embodiments reflect anappreciation that such user entity behaviors may include simple mistakesor inadvertently risky activities, and as such, are not explicitlylinked to a malicious objective. Various embodiments of the inventionlikewise reflect an appreciation that while certain IOBs 1108 may notexplicitly be concerning behaviors, they may represent some degree ofsecurity risk.

In various embodiments, certain human factors 430, described in greaterdetail herein, may be implemented to act as security risk “forcemultipliers,” by encouraging or accelerating the formation of aparticular security risk persona 2028. In various embodiments, theidentification of certain human factors associated with a particularuser entity may be implemented to apply additional weight to a risksecurity score corresponding to the user entity. In certain embodiments,the security risk score may be associated with a particular IOB 1108, ora particular security risk score 2028, associated with the user entity.

In various embodiments, as likewise described in greater detail herein,such human factors 430 may include certain cardinal traits 1402,emotional stressors 1404, and organizational dynamics 1406. For example,as shown in FIG. 22a , professional 1706 emotional stressors 1404 mayinclude unsatisfactory performance reviews or compensation, co-workerfriction, unmet expectations, cancelled projects, and so forth. Personal1704 emotional stressors 1404 may likewise include certain life changes,such as health issues, the birth, death, or sickness of a family memberor friend, separation or divorce, relocation to a new locale, and soforth.

Financial 1708 emotional stressors 1404 may likewise include bankruptcy,foreclosure, credit issues, gambling issues, and so forth, while legal1710 emotional stressors 1404 may include previous arrests, currentarrests or incarceration, drug/DUI offenses, wage garnishment, and soforth. Likewise, organizational dynamics 1406 human factors 430 mayinclude changes in management, reorganizations, mergers, acquisitions,downsizing, site closures, changes in work policies, declines in stockprices, and so forth. Those of skill in the art will recognize that manysuch examples are possible. Accordingly, the foregoing is not intendedto limit the spirit, scope, or intent of the invention.

FIG. 23 shows a functional block diagram of process flows associatedwith the operation of security analytics system implemented inaccordance with an embodiment of the invention. In certain embodiments,a security analytics system 118, described in greater detail herein, maybe implemented with an EBC system 120, a human factors framework 122,and a risk scoring system 124, or a combination thereof, as likewisedescribed in greater detail herein. In certain embodiments, the EBCsystem 120 may be implemented to define and manage an entity behaviorprofile (EBP) 420, as described in greater detail herein. In certainembodiments, the EBP 420 may be implemented to include a user entityprofile 422, a non-user entity profile 440, a data entity profile 450,and an entity state 462, or a combination thereof, as likewise describedin greater detail herein. In certain embodiments, the user entityprofile 422 may be implemented to include certain human factors 430 anduser entity mindset profile 632 information, as described in greaterdetail herein.

In certain embodiments, EBC system 120 operations are begun with thereceipt of information associated with an initial event i 2302. Invarious embodiments, information associated with an initial event i 2302may include user entity profile 422 attributes, user entity behaviorfactor information, user entity mindset profile 632 information, entitystate 462 information, certain contextual and temporal information, alldescribed in greater detail herein, or a combination thereof. In variousembodiments, certain user entity profile 422 data, user entity mindsetprofile 632 data, non-user entity profile 440 data, entity state 462data, contextual information, and temporal information stored in arepository of EBC data 540 may be retrieved and then used to performevent enrichment 2308 operations to enrich the information associatedwith event i 2302.

Analytic utility detection 2310 operations are then performed on theresulting enriched event i 2302 to determine whether it is of analyticutility. If so, then it is derived as an observable 1106, described ingreater detail herein. In certain embodiments, event i+l 2304 throughevent i+n 2306, may in turn be received by the EBC system 120 and beenriched 2308. Analytic utility detection 2310 operations are thenperformed on the resulting enriched event i+l 2304 through event i+n2306 to determine whether they are of analytic utility. Observables 1106are then derived from those that are.

In various embodiments, certain indicator of behavior (IOB) abstraction2314 operations may be performed on the resulting observables 1106corresponding to events i 2302, i+l 2304, and i+n 2306 to generate anassociated IOB 1108, described in greater detail herein. In variousembodiments, an IOB 1108 may be expressed in a Subject Action Objectformat and associated with observables 1106 resulting from eventinformation provided by various received from certain EBC data sources,likewise described in greater detail herein. In certain embodiments, anIOB abstraction 2314 operation may be performed to abstract away EBCdata source-specific knowledge and details when expressing an entitybehavior. For example, rather than providing the details associated witha “Windows:4624” non-user entity event, its details may be abstracted toa “User Login To Device” IOB 1108.

In various embodiments, sessionization and fingerprint 1020 operations,described in greater detail herein, may be performed on eventinformation corresponding to events i 2302, i+l 2304, i+n 2306, theircorresponding observables 1306, and their associated IOBs 1108, or acombination thereof, to generate session information. In variousembodiments, the resulting session information may be used to associatecertain events i 2302, i+l 2304, i+n 2306, or their correspondingobservables 2306, or their corresponding IOBs 1108, or a combinationthereof, with a particular session.

In certain embodiments, as likewise described in greater detail herein,one or more IOBs 1108 may in turn be associated with a corresponding EBPelement. In various embodiments, the previously-generated sessioninformation may be used to associate the one or more IOBs 1108 with aparticular EBP element. In certain embodiments, the one or more IOBs1108 may be associated with its corresponding EBP element through theperformance of an EBP management operation performed by the EBC system120. Likewise, in certain embodiments, one or more EBP elements may inturn be associated with the EBP 420 through the performance of an EBPmanagement operation performed by the EBC system 120.

In various embodiments, certain contextualization information stored inthe repository of EBC data 540 may be retrieved and then used to performentity behavior contextualization 2318 operations to provide entitybehavior context, based upon the entity's user entity profile 422, or anon-user entity profile 440, or a data entity 450, and theirrespectively associated entity state 462, or a combination thereof. Invarious embodiments, certain security risk use case association 1050operations may be performed to associate an EBP 420 with a particularsecurity risk use case, described in greater detail herein. In certainembodiments, the results of the previously-performed entity behaviorcontextualization 2318 operations may be used to perform the securityrisk use case association 1050 operations.

In various embodiments, security vulnerability scenario inference 1060operations may be performed to associate a security risk use case with aparticular security vulnerability scenario, described in greater detailherein. In various embodiments, certain observables 1106 derived fromevents of analytic utility may be used to perform the securityvulnerability scenario inference 1060 operations. In variousembodiments, certain entity behavior contexts resulting from theperformance of the entity behavior contextualization 2318 operations maybe used to perform the security vulnerability scenario inference 1060operations.

In certain embodiments, entity behavior meaning derivation 1532operations may be performed on the security vulnerability behaviorscenario selected as a result of the performance of the securityvulnerability scenario inference 1060 operations to derive meaning fromthe behavior of the entity. In certain embodiments, the entity behaviormeaning derivation 1532 operations may be performed by the human factorsframework 122. In certain embodiments, the human factors framework 122may be implemented to receive a stream of human factors information 406,as described in greater detail herein. In certain embodiments, the humanfactors framework 122 may be implemented to process the stream of humanfactors information 406 to derive certain human factors 430, and oncederived, store them in an associated user entity profile 422. In certainembodiments, the human factors framework 122 may be implemented toperform the entity behavior meaning derivation 1532 operation incombination with the EBC system 120.

In certain embodiments, the entity behavior meaning derivation 1532operations may be performed by analyzing the contents of the EBP 420 inthe context of the security vulnerability behavior scenario selected asa result of the performance of the security vulnerability scenarioinference 1060 operations. In certain embodiments, the human factorsframework 122 may be implemented to perform the entity behavior meaningderivation 1532 operations by analyzing certain information contained inthe EBP 420. In certain embodiments, the human factors framework 122 maybe implemented to perform the entity behavior meaning derivation 1532operations by analyzing certain human factors 430 and user entitymindset profile 632 information stored in the user entity profile 422 toderive the intent of a particular user entity behavior. In certainembodiments, the derivation of entity behavior meaning may includeinferring the intent of an entity associated with event i 2302 and eventi+l 2304 through event i+n 2306.

In various embodiments, performance of the entity behavior meaningderivation 1354 operations may result in the performance of a securityrisk assessment operation, described in greater detail herein. Incertain embodiments, the security risk assessment operation may beperformed to assess the security risk associated with the enactment of aparticular user entity behavior. In certain embodiments, the securityrisk assessment operation may be implemented as a human factors 430 riskassessment operation, described in greater detail herein. In variousembodiments, the risk scoring system 124 may be implemented to performthe security risk assessment operation. In certain embodiments, the riskscoring system 124 may be implemented to use certain security riskassessment information resulting from the performance of a security riskassessment operation to generate a security risk score.

In certain embodiments, a security risk score meeting certain securityrisk parameters may result in the performance of an associated securityoperation 470, described in greater detail herein. In certainembodiments, the security operation 470 may include a cyber kill chain2352 operation, or a risk-adaptive protection 2354 operation, or both.In certain embodiments, the cyber kill chain 2352 operation may beperformed to disrupt the execution of a cyber kill chain, described ingreater detail herein. In certain embodiments, the risk-adaptiveprotection 2352 operation may include adaptively responding with anassociated risk-adaptive response, as described in greater detailherein.

In various embodiments, the security operation 470 may include certainrisk mitigation operations being performed by a security administrator.As an example, performance of the security operation 470 may result in anotification being sent to a security administrator alerting them to thepossibility of suspicious behavior. In certain embodiments, the securityoperation 470 may include certain risk mitigation operations beingautomatically performed by a security analytics system or service. As anexample, performance of the security operation 470 may result in auser's access to a particular system being disabled if an attemptedaccess occurs at an unusual time or from an unknown device.

In certain embodiments, meaning derivation information associated withevent i 2302 may be used to update the user entity profile 420, non-userentity profile 440, or data entity profile 450 corresponding to theentity associated with event i 2302. In certain embodiments, the processis iteratively repeated, proceeding with meaning derivation informationassociated with event i+l 2304 through event i+n 2306. From theforegoing, skilled practitioners of the art will recognize that a userentity profile 420, non-user entity profile 440, or data entity profile450, or some combination thereof, as implemented in certain embodiments,not only allows the identification of events associated with aparticular entity that may be of analytic utility, but also provideshigher-level data that allows for the contextualization of observedevents. Accordingly, by viewing individual sets of events both incontext and with a view to how they may be of analytic utility, it ispossible to achieve a more nuanced and higher-level comprehension of anentity's intent.

FIGS. 24a and 24b show a simplified block diagram of a distributedsecurity analytics system environment implemented in accordance with anembodiment of the invention. In various embodiments, the distributedsecurity analytics system environment may be implemented to performcertain human factors risk operations, as described in greater detailherein. In various embodiments, the distributed security analyticssystem environment may be implemented to use certain human factorsinformation to assess the security risk corresponding to a particularindicator of behavior (JOB), as likewise described in greater detailherein. In certain embodiments, the distributed security analyticsmapping system environment may be implemented to include a securityanalytics system 118, described in greater detail herein. In certainembodiments, the security analytics system 118 may be implemented toinclude an entity behavior catalog (EBC) system 120, a human factorsframework 122, and a security risk scoring system 124, or a combinationthereof.

In various embodiments, the human factors framework 122 may beimplemented to provide certain human factors information, described ingreater detail herein, to the security analytics system 118. In variousembodiments, the security analytics system 118 may be implemented to usesuch human factors information to perform certain human factors riskoperations, likewise described in greater detail herein. In variousembodiments, certain human factors risk operations performed by thesecurity analytics system 118 may be used to assess the security riskassociated with a corresponding JOB, as described in greater detailherein. In certain embodiments, the security risk corresponding to aparticular IOB may be associated with one or more user entities,likewise as described in greater detail herein.

In certain embodiments, as likewise described in greater detail herein,the EBC system 120, the human factors framework 122, and the securityrisk scoring system 124, or a combination thereof, may be used incombination with the security analytics system 118 to perform such humanfactors risk operations. In various embodiments, certain data stored ina repository of event data 530, EBC data 540, security analytics 550data, or a repository of security risk scoring data 560, or acombination thereof, may be used by the security analytics system 118,the EBC system 120, the human factors framework 122, or the risk scoringsystem 124, or some combination thereof, to perform the human factorsrisk operation.

In various embodiments, the EBC system 120, as described in greaterdetail herein, may be implemented to use certain entity behaviorinformation and associated event data, to generate an entity behaviorprofile (EBP), as described in greater detail herein. In variousembodiments, the security analytics system 118 may be implemented to useone or more session-based fingerprints to perform security analyticsoperations to detect certain user, non-user, or data entity behavior, aslikewise described in greater detail herein. In certain embodiments, thesecurity analytics system 118 may be implemented to monitor entitybehavior associated with a user entity, such as a user ‘A’ 710 or user‘B’ 712. In certain embodiments, the user, non-user, or data entitybehavior, or a combination thereof, may be monitored during user/device930, user/network 942, user/resource 948, and user/user 920interactions. In certain embodiments, the user/user 920 interactions mayoccur between a first user entity, such as user ‘A’ 710 and a seconduser entity, such as user ‘B’ 912.

In certain embodiments, the human factors framework 122 may beimplemented to perform a human factors risk operation, described ingreater detail herein. In various embodiments, as likewise described ingreater detail herein, the human factors framework 122 may beimplemented to use certain associated event information to perform thehuman factors risk operation. In certain embodiments, the eventinformation may be stored in a repository of event 530 data. In variousembodiments, the security risk scoring system 124 may be implemented toprovide certain security risk scoring information stored in therepository of security risk scoring 560 data to the security analyticssystem 118 for use by the human factors framework 122.

In various embodiments, the human factors framework 122 may beimplemented, as described in greater detail herein, to manage certainhuman factors information relevant to the occurrence of an JOB. Invarious embodiments, as likewise described in greater detail herein, thehuman factors framework 122 may be implemented to provide certain humanfactors information relevant to the occurrence of a particular IOB tothe EBC system 120, or the risk scoring system 124, or both. In certainembodiments, the human factors information provided by the human factorsframework 122 to the EBC system 120, or the security risk scoring system124, or both, may be used to assess the security risk associated withthe occurrence of a particular indicator of behavior.

In certain embodiments, as described in greater detail herein, anendpoint agent 206 may be implemented on an endpoint device 204 toperform user, non-user, or data entity behavior monitoring. In certainembodiments, the user, non-user, or data entity behavior may bemonitored by the endpoint agent 206 during user/device 930 interactionsbetween a user entity, such as user ‘A’ 710, and an endpoint device 204.In certain embodiments, the user, non-user, or data entity behavior maybe monitored by the endpoint agent 206 during user/network 942interactions between user ‘A’ 710 and a network, such as a network 140or third party network 310. In certain embodiments, the user, non-user,or data entity behavior may be monitored by the endpoint agent 206during user/resource 948 interactions between user ‘A’ 710 and aresource 950, such as a facility, printer, surveillance camera, system,datastore, service, and so forth.

In certain embodiments, the monitoring of user or non-user entitybehavior by the endpoint agent 206 may include the monitoring ofelectronically-observable actions, or associated behavior, respectivelyenacted by a particular user, non-user, or data entity. In certainembodiments, the endpoint agent 206 may be implemented in combinationwith the security analytics system 118, the EBC system 120, the humanfactors framework 122, and the security risk scoring system 124, or acombination thereof, to detect an JOB, assess its associated risk, andperform a security operation to mitigate risk, or a combination thereof.

In certain embodiments, the endpoint agent 206 may be implemented toinclude an event counter feature pack 2408, an event analytics 210module, a human factors framework 2422 module, and a security riskscoring 2424 module, or a combination thereof. In certain embodiments,the event counter feature pack 2408 may be further implemented toinclude an event data detector 2410 module, an event counter 2412module, and an event data collector 2414 module, or a combinationthereof. In certain embodiments, the event analytics 210 module may beimplemented to include a security policy rule 2416 engine, an event ofanalytic utility 2418 module, and an IOB detection 2420 module, or acombination thereof.

In certain embodiments, the event data detector 2410 module may beimplemented to detect event data associated with a particular endpointdevice 204, as described in greater detail herein, resulting fromuser/device 930, user/network 942, user/resource 948, and user/user 920interactions. In various embodiments, the event counter 2412 module maybe implemented to collect, or otherwise track, the occurrence of certainevents, or classes of events, resulting from user/device 930,user/network 942, user/resource 948, and user/user 920 interactions.

In various embodiments, the event data collector 2414 module may beimplemented to collect certain event data associated with theuser/device 930, user/network 942, user/resource 948, and user/user 920interactions. In certain embodiments, the security policy rule 2416engine may be implemented to manage security policy information relevantto determining whether a particular event is of analytic utility,anomalous, or both. In certain embodiments, the event of analyticutility detection 2418 module may be implemented to detect an event ofanalytic utility associated with events corresponding to the user/device930, user/network 942, user/resource 948, and user/user 920interactions.

In various embodiments, the event of analytic utility detection 2418module may be implemented to use certain security policy informationprovided by the security policy rule 2416 engine to determine whether aparticular event associated with an endpoint device 204 is of analyticutility. In certain embodiments, the security policy rule 2416 enginemay be implemented to determine whether a particular event of analyticutility associated with an endpoint device 204 is anomalous.

In various embodiments, the IOB detection 2420 module may be implementedto perform certain IOB detection operations associated with events ofanalytic utility corresponding to the user/device 930, user/network 942,user/resource 948, and user/user 920 interactions. In variousembodiments, the event of analytic utility detection 2418 module may beimplemented to provide certain information associated with one or moreevents of analytic utility to the IOB 2420 module. In certainembodiments, the event of analytic utility detection 2418 module may beimplemented to determine whether the one or more events of analyticutility are associated with one another.

In various embodiments, the IOB detection 2420 module may be implementedto use such information in the performance of certain IOB detectionoperations, which in turn may result in the detection of an JOB. Incertain embodiments, the endpoint agent 206 may be implemented tocommunicate the event and associated event counter data collected by theevent data collector 2414 module, data associated with the events ofanalytic utility detected by the event of analytic utility detection2418 module, and information associated with the IOBs detected by theIOB detection 2420 module, or a combination thereof, to the securityanalytics 118 system or another component of the distributed securityanalytics system environment.

In certain embodiments, the human factors framework 2422 module may beimplemented to perform a human factors risk operation, as described ingreater detail herein. In various embodiments, the human factorsframework 2422 module may be implemented to provide certain humanfactors information to one or more other components of the distributedsecurity analytics system environment. In certain embodiments, thesecurity risk scoring system 2424 may be implemented to generate asecurity risk score, likewise described in greater detail, for an IOBcorresponding to one or more events detected by the IOB detection 2420module.

In certain embodiments, the security risk scoring system 2424 may beimplemented to generate a security risk score corresponding to aparticular IOB when it is first detected. In certain embodiments, thesecurity risk score corresponding to a particular IOB may be used as acomponent in the generation of a security risk score for an associateduser entity. In certain embodiments, the endpoint agent 206 may beimplemented to provide one or more security risk scores to one or moreother components of the distributed security analytics systemenvironment.

In certain embodiments, an edge device 304 may be implemented to includean edge device risk module 2406. In certain embodiments, the edge devicerisk module 2406 may be implemented to include an event detection 2428system, a human factors framework 2442 module, a security risk scoringsystem 2444, or a combination thereof. In certain embodiments, the eventdetection 2428 system may be implemented to include an event datadetector 2430 module, an event counter 2432 module, an event datacollector 2434 module, a security policy rule 2436 engine, an event ofanalytic utility 2438 module, and an IOB detection 2440 module, or acombination thereof.

In certain embodiments, the event data detector 2430 module may beimplemented to detect event data associated with a particular edgedevice 204, as described in greater detail herein, resulting fromuser/device 930, user/network 942, user/resource 948, and user/user 920interactions. In various embodiments, the event counter 2432 module maybe implemented to collect, or otherwise track, the occurrence of certainevents, or classes of events, resulting from user/device 930,user/network 942, user/resource 948, and user/user 920 interactions.

In various embodiments, the event data collector 2430 module may beimplemented to collect certain event data associated with theuser/device 930, user/network 942, user/resource 948, and user/user 920interactions. In certain embodiments, the security policy 2436 enginemay be implemented to manage security policy information relevant todetermining whether a particular event is of analytic utility,anomalous, or both. In certain embodiments, the event of analyticutility detection 2438 module may be implemented to detect an event ofanalytic utility associated with events corresponding to the user/device930, user/network 942, user/resource 948, and user/user 920interactions.

In various embodiments, the event of analytic utility detection 2438module may be implemented to use certain security policy informationprovided by the security policy rule 2436 engine to determine whether aparticular event associated with an edge device 304 is of analyticutility. In certain embodiments, the security policy rule 2436 enginemay be implemented to determine whether a particular event of analyticutility associated with an edge device 304 is anomalous.

In various embodiments, the IOB detection 2440 module may be implementedto perform certain IOB detection operations, described in greater detailherein, associated with events of analytic utility corresponding to theuser/device 930, user/network 942, user/resource 948, and user/user 920interactions. In various embodiments, the event of analytic utilitydetection 2438 module may be implemented to provide certain informationassociated with one or more events of analytic utility to the IOBdetection 2440 module. In certain embodiments, the event of analyticutility detection 2438 module may be implemented to determine whetherthe one or more events of analytic utility are associated with oneanother.

In various embodiments, the IOB detection 2440 module may be implementedto use such information in the performance of certain IOB detectionoperations, which in turn may result in the detection of an JOB. Incertain embodiments, the edge device risk module 2406 may be implementedto communicate the event and associated event counter data collected bythe event data collector 2434 module, data associated with the events ofanalytic utility detected by the event of analytic utility detection2438 module, and information associated with the IOBs detected by theIOB detection 2040 module, or a combination thereof, to the securityanalytics 118 system or another component of the distributed securityanalytics system environment.

In certain embodiments, the human factors framework 2442 module may beimplemented to perform a human factors risk operation, as described ingreater detail herein. In various embodiments, the human factorsframework 2442 may be implemented to provide certain human factorsinformation to one or more other components of the distributed securityanalytics system environment. In certain embodiments, the security riskscoring system 2444 may be implemented to generate a security riskscore, likewise described in greater detail, for an IOB corresponding toone or more events detected by the IOB detection 2440 module.

In certain embodiments, the security risk scoring system 2444 may beimplemented to generate a security risk score corresponding to aparticular IOB when it is first detected. In certain embodiments, thesecurity risk score corresponding to a particular IOB may be used as acomponent in the generation of a security risk score for an associateduser entity. In certain embodiments, the edge device risk module 2406may be implemented to provide one or more security risk scores to one ormore other components of the distributed security analytics systemenvironment.

In certain embodiments, a third party system 312 may be implemented toinclude a third party system risk module 2426. In certain embodiments,the third party system risk module 2426 may be implemented to include anevent detection 2448 system, a human factors framework 2462 module, anda security risk scoring system 2464, or a combination thereof. Incertain embodiments, the event detection 2448 system may be implementedto include an event data detector 2450 module, an event counter 2452module, an event data collector 2454 module, a security policy rule 2456engine, an event of analytic utility 2458 module, and an IOB detection2460 module, or a combination thereof.

In certain embodiments, the event data detector 2450 module may beimplemented to detect event data associated with a particular thirdparty system 312 resulting from user/device 930, user/network 942,user/resource 948, and user/user 920 interactions. In variousembodiments, the event counter 2452 module may be implemented tocollect, or otherwise track, the occurrence of certain events, orclasses of events, as described in greater detail herein, resulting fromuser/device 930, user/network 942, user/resource 948, and user/user 920interactions.

In various embodiments, the event data collector 2450 module may beimplemented to collect certain event data associated with theuser/device 930, user/network 942, user/resource 948, and user/user 920interactions. In certain embodiments, the security policy rule 2456engine may be implemented to manage security policy information relevantto determining whether a particular event is of analytic utility,anomalous, or both. In certain embodiments, the event of analyticutility detection 258 module may be implemented to detect an event ofanalytic utility associated with events corresponding to the user/device930, user/network 942, user/resource 948, and user/user 920interactions.

In various embodiments, the event of analytic utility detection 2458module may be implemented to use certain security policy informationprovided by the security policy rule 2456 engine to determine whether aparticular event associated with a third party system 312 is of analyticutility. In certain embodiments, the security policy rule 2456 enginemay be implemented to determine whether a particular event of analyticutility associated with a third party system 312 is anomalous.

In various embodiments, the IOB detection 2460 module may be implementedto perform certain IOB detection operations associated with events ofanalytic utility corresponding to the user/device 930, user/network 942,user/resource 948, and user/user 920 interactions. In variousembodiments, the event of analytic utility detection 2458 module may beimplemented to provide certain information associated with one or moreevents of analytic utility to the IOB detection 2460 module. In certainembodiments, the event of analytic utility detection 2458 module may beimplemented to determine whether the one or more events of analyticutility are associated with one another.

In various embodiments, the IOB detection 2460 module may be implementedto use such information in the performance of certain IOB detectionoperations, which in turn may result in the detection of an JOB. Incertain embodiments, the third party system risk module 2426 may beimplemented to communicate the event and associated event counter datacollected by the event data collector 2454 module, data associated withthe events of analytic utility detected by the event of analytic utilitydetection 2458 module, and information associated with the IOBs detectedby the IOB detection 2460 module, or a combination thereof, to thesecurity analytics 118 system or another component of the distributedsecurity analytics mapping system environment.

In certain embodiments, the human factors framework 2462 module may beimplemented to perform a human factors risk operation, as described ingreater detail herein. In various embodiments, human factors framework2462 module may be implemented to provide certain human factorsinformation to one or more other components of the distributed securityanalytics system environment. In certain embodiments, the security riskscoring system 2464 may be implemented to generate a security riskscore, likewise described in greater detail, for an IOB corresponding toone or more events detected by the IOB detection 2464 module.

In certain embodiments, the security risk scoring system 2464 may beimplemented to generate a security risk score corresponding to aparticular IOB when it is first detected, as likewise described ingreater detail herein. In certain embodiments, the security risk scorecorresponding to a particular IOB may be used as a component in thegeneration of a security risk score for an associated user entity. Incertain embodiments, the third party system risk module 2426 may beimplemented to provide one or more security risk scores to one or moreother components of the distributed security analytics environment.

In certain embodiments, the security analytics system 118 may beimplemented to receive the event data, the event counter data, the dataassociated with the detected events of analytic utility and IOBs, or acombination thereof, provided by the endpoint agent 206, the edge devicerisk module 2406, and the third party system risk module 2426, or acombination thereof. In certain embodiments, the security analyticssystem 118 may be implemented to provide the event data and eventcounter data, the data associated with the detected endpoint events ofanalytic utility and events, or a combination thereof, to the EBC system120, the human factors framework 122, and the security risk scoringsystem 124 for processing.

In certain embodiments, the EBC system 120 may be implemented to includean EBP element generator 2466 module, an EBP session generator 2468module, an EBP generator 2470 module, or a combination thereof. Invarious embodiments, the EBP element generator 2466 module may beimplemented to process event and event counter data, along with dataassociated with events of analytic utility and anomalous events,provided by the endpoint agent 206 to generate EBP elements, describedin greater detail herein. In certain embodiments, the EBP sessiongenerator 2468 may be implemented to use the event and endpoint eventcounter, data associated with events of analytic utility and anomalousevents provided by the endpoint agent 206, to generate sessioninformation. In certain embodiments, the EBP session generator 2468 maybe implemented to use the resulting session information to generate anactivity session, described in greater detail herein. In variousembodiments, as likewise described in greater detail herein, certain EBPmanagement operations may be performed to associate EBP elementsgenerated by the EBP element generator 2468 module with a correspondingEBP. Likewise, certain EBP management operations may be performed to usethe session information generated by the EBP session generator 2470module to associate a particular EBP element with a particular EBP.

In certain embodiments, the event detection system 2472 may beimplemented to include an event data detector 2474 module, an eventcounter 2476 module, an event data collector 2478 module, a securitypolicy rule 2480 engine, an event of analytic utility 2484 module, andan IOB detection 2484 module, or a combination thereof. In certainembodiments, the event data detector 2474 module may be implemented todetect event data associated with a particular endpoint device 204, edgedevice 304, or third party system 312, as described in greater detailherein, resulting from user/device 930, user/network 942, user/resource948, and user/user 920 interactions. In various embodiments, the eventcounter 2476 module may be implemented to collect, or otherwise track,the occurrence of certain events, or classes of events, as described ingreater detail herein, resulting from user/device 930, user/network 942,user/resource 948, and user/user 920 interactions.

In various embodiments, the event data collector 2474 module may beimplemented to collect certain event data associated with theuser/device 930, user/network 942, user/resource 948, and user/user 920interactions. In certain embodiments, the security policy rule 2480engine may be implemented to manage security policy information relevantto determining whether a particular event is of analytic utility,anomalous, or both. In certain embodiments, the event of analyticutility detection 2482 module may be implemented to detect an event ofanalytic utility associated with events corresponding to the user/device930, user/network 942, user/resource 948, and user/user 920interactions.

In various embodiments, the event of analytic utility detection 2482module may be implemented to use certain security policy informationprovided by the security policy rule 2480 engine to determine whether aparticular event associated with a particular endpoint device 204, edgedevice 304, or third party system 312 is of analytic utility. In certainembodiments, the security policy rule 2480 engine may be implemented todetermine whether a particular event of analytic utility associated withan endpoint device 204, edge device 304, or third party system 312 isanomalous.

In various embodiments, the IOB detection 2484 module may be implementedto perform certain IOB detection operations associated with events ofanalytic utility corresponding to the user/device 930, user/network 942,user/resource 948, and user/user 920 interactions. In variousembodiments, the event of analytic utility detection 2482 module may beimplemented to provide certain information associated with one or moreevents of analytic utility to the IOB detection 2484 module. In certainembodiments, the event of analytic utility detection 2482 module may beimplemented to determine whether the one or more events of analyticutility are associated with one another.

In various embodiments, the IOB detection 2484 module may be implementedto use such information in the performance of certain IOB detectionoperations, which in turn may result in the detection of an JOB. Incertain embodiments, the event detection system 2472 may be implementedto communicate the event and associated event counter data collected bythe event data collector 2478 module, data associated with the events ofanalytic utility detected by the event of analytic utility detection2482 module, and information associated with the IOBs detected by theIOB detection 2484 module, or a combination thereof, to anothercomponent of the distributed security analytics system environment.

In certain embodiments, the human factors framework 122 may beimplemented to perform a human factors risk operation, as described ingreater detail herein. In various embodiments, the human factorsframework 122 may be implemented to provide certain human factorsinformation to one or more other components of the distributed securityanalytics mapping system environment. In certain embodiments, thesecurity risk scoring system 124 may be implemented to generate asecurity risk score, likewise described in greater detail, for an IOBcorresponding to one or more events detected by the IOB detection 2484module.

In certain embodiments, the security risk scoring system 124 may beimplemented to generate a security risk score corresponding to aparticular IOB when it is first detected, as likewise described ingreater detail herein. In certain embodiments, the security risk scorecorresponding to a particular IOB may be used as a component in thegeneration of a security risk score for an associated user entity. Incertain embodiments, the security risk scoring system 124 may beimplemented to provide one or more security risk scores to one or moreother components of the distributed security analytics systemenvironment. Those of skill in the art will recognize that many suchimplementations are possible. Accordingly, the foregoing is not intendedto limit the spirit, scope, or intent of the invention.

FIGS. 25a and 25b show tables containing human factors-centric riskmodel data used to generate a user entity risk score associated with asecurity vulnerability scenario implemented in accordance with anembodiment of the invention for an example data theft scenario. Incertain embodiments, as described in greater detail herein, securityrisk personas 2508 associated with a particular security vulnerabilityscenario 1060 may be assigned a median risk score 2510. For example, asshown in FIGS. 25a and 25b , a security risk persona 2508 of “BoundaryPusher” may be assigned a median risk score 2510 of ‘20’ for thesecurity vulnerability scenario 1060 of “Data Theft.”

In certain embodiments, a concerning behavior risk score 2518 may begenerated for a particular user entity exhibiting concerning behaviorstypically associated with a corresponding security risk persona 2508during a calendar interval 2520 of time. In certain embodiments, theconcerning behavior risk score 2518 may be adjusted according to theuser entity's enduring behavior pattern 1642 and the median risk score2510 corresponding to the security risk persona 2508 currentlyassociated with the user entity. In certain embodiments, certain humanfactors 430 may be applied to the concerning behavior risk score 2518 togenerate an associated user entity risk score 2530.

For example, as shown in FIG. 25b , a user entity may be exhibitingconcerning behaviors associated with a security risk persona 2508 of“Hoarder/Collector” associated with a security vulnerability scenario1060 of “Data Theft” during the calendar interval 2520 of the secondhalf of July. In this example, the user entity's enduring behaviorpattern 1642 is “Hoarder/Collector,” signifying that the user entity'slong-term predisposition is to collect and hoard information.Accordingly, the median risk score 2510 of ‘20’ associated with thesecurity risk persona 2508 of “Hoarder/Collector” may be used togenerate a concerning behavior risk score 2518 of ‘30.’ To continue theexample, the resulting concerning behavior risk score 2818 of ‘30’ isthen respectively adjusted by cardinal factors 1402, emotional stressor1404, and organizational dynamics 1406 human factors 430 to yield a userentity risk score 2530 of ‘49.’

FIG. 26 shows a user interface (UI) window implemented in accordancewith an embodiment of the invention to graphically display an entityrisk score as it changes over time. In certain embodiments, changes in auser entity's entity risk score 2630 over an interval of time, such ascalendar intervals 2620, may be displayed within a window of a graphicaluser interface (GUI) 2602, such as that shown in FIG. 26.

As will be appreciated by one skilled in the art, the present inventionmay be embodied as a method, system, or computer program product.Accordingly, embodiments of the invention may be implemented entirely inhardware, entirely in software (including firmware, resident software,micro-code, etc.) or in an embodiment combining software and hardware.These various embodiments may all generally be referred to herein as a“circuit,” “module,” or “system.” Furthermore, the present invention maytake the form of a computer program product on a computer-usable storagemedium having computer-usable program code embodied in the medium.

Any suitable computer usable or computer readable medium may beutilized. The computer-usable or computer-readable medium may be, forexample, but not limited to, an electronic, magnetic, optical,electromagnetic, infrared, or semiconductor system, apparatus, ordevice. More specific examples (a non-exhaustive list) of thecomputer-readable medium would include the following: a portablecomputer diskette, a hard disk, a random access memory (RAM), aread-only memory (ROM), an erasable programmable read-only memory (EPROMor Flash memory), a portable compact disc read-only memory (CD-ROM), anoptical storage device, or a magnetic storage device. In the context ofthis document, a computer-usable or computer-readable medium may be anymedium that can contain, store, communicate, or transport the programfor use by or in connection with the instruction execution system,apparatus, or device.

Computer program code for carrying out operations of the presentinvention may be written in an object oriented programming language suchas Java, Smalltalk, C++ or the like. However, the computer program codefor carrying out operations of the present invention may also be writtenin conventional procedural programming languages, such as the “C”programming language or similar programming languages. The program codemay execute entirely on the user's computer, partly on the user'scomputer, as a stand-alone software package, partly on the user'scomputer and partly on a remote computer or entirely on the remotecomputer or server. In the latter scenario, the remote computer may beconnected to the user's computer through a local area network (LAN) or awide area network (WAN), or the connection may be made to an externalcomputer (for example, through the Internet using an Internet ServiceProvider).

Embodiments of the invention are described with reference to flowchartillustrations and/or block diagrams of methods, apparatus (systems) andcomputer program products according to embodiments of the invention. Itwill be understood that each block of the flowchart illustrations and/orblock diagrams, and combinations of blocks in the flowchartillustrations and/or block diagrams, can be implemented by computerprogram instructions. These computer program instructions may beprovided to a processor of a general purpose computer, special purposecomputer, or other programmable data processing apparatus to produce amachine, such that the instructions, which execute via the processor ofthe computer or other programmable data processing apparatus, createmeans for implementing the functions/acts specified in the flowchartand/or block diagram block or blocks.

These computer program instructions may also be stored in acomputer-readable memory that can direct a computer or otherprogrammable data processing apparatus to function in a particularmanner, such that the instructions stored in the computer-readablememory produce an article of manufacture including instruction meanswhich implement the function/act specified in the flowchart and/or blockdiagram block or blocks.

The computer program instructions may also be loaded onto a computer orother programmable data processing apparatus to cause a series ofoperational steps to be performed on the computer or other programmableapparatus to produce a computer implemented process such that theinstructions which execute on the computer or other programmableapparatus provide steps for implementing the functions/acts specified inthe flowchart and/or block diagram block or blocks.

The present invention is well adapted to attain the advantages mentionedas well as others inherent therein. While the present invention has beendepicted, described, and is defined by reference to particularembodiments of the invention, such references do not imply a limitationon the invention, and no such limitation is to be inferred. Theinvention is capable of considerable modification, alteration, andequivalents in form and function, as will occur to those ordinarilyskilled in the pertinent arts. The depicted and described embodimentsare examples only, and are not exhaustive of the scope of the invention.

Consequently, the invention is intended to be limited only by the spiritand scope of the appended claims, giving full cognizance to equivalentsin all respects.

What is claimed is:
 1. A computer-implementable method for performing asecurity operation, comprising: monitoring an entity to identify abehavior enacted by the entity, the monitoring observing at least oneelectronically-observable data source; deriving an observable based uponthe behavior enacted by the entity; identifying an event of analyticutility, the event of analytic utility being derived from the observablefrom the electronic data source, the event of analytic utilitycomprising a behavior enacted by the entity; identifying an indicator ofbehavior related to the event of analytic utility, the indicator ofbehavior providing an abstracted description of an inferred intentassociated with the behavior enacted by the entity; analyzing the eventof analytic utility, the analyzing the event of analytic utility beingbased upon the indicator of behavior related to the event of analyticutility; and, performing the security operation based upon the inferredintent associated with the behavior enacted by the entity.
 2. The methodof claim 1, wherein: the event of analytic utility comprises aninteraction between the entity and data; and, the indicator of behavioris based upon the behavior enacted by the entity and the interactionwith the data.
 3. The method of claim 1, further comprising: associatinga human factor with an entity; and, using the human factor whenanalyzing the event of analytic utility.
 4. The method of claim 3,wherein: the human factor comprises at least one of a cardinal trait, anemotional stressor and an organization dynamic.
 5. The method of claim1, further comprising: detecting a concerning behavior based upon theindicator of behavior in combination with the human factor.
 6. Themethod of claim 5, wherein: the security operation comprises inferringan associated adverse effect based upon the concerning behavior.
 7. Asystem comprising: a processor; a data bus coupled to the processor; anda non-transitory, computer-readable storage medium embodying computerprogram code, the non-transitory, computer-readable storage medium beingcoupled to the data bus, the computer program code interacting with aplurality of computer operations and comprising instructions executableby the processor and configured for: monitoring an entity to identify abehavior enacted by the entity, the monitoring observing at least oneelectronically-observable data source; deriving an observable based uponthe behavior enacted by the entity; identifying an event of analyticutility, the event of analytic utility being derived from the observablefrom the electronic data source, the event of analytic utilitycomprising a behavior enacted by the entity; identifying an indicator ofbehavior related to the event of analytic utility, the indicator ofbehavior providing an abstracted description of an inferred intentassociated with the behavior enacted by the entity; analyzing the eventof analytic utility, the analyzing the event of analytic utility beingbased upon the indicator of behavior related to the event of analyticutility; and, performing a security operation based upon the inferredintent associated with the behavior enacted by the entity.
 8. The systemof claim 7, wherein: the event of analytic utility comprises aninteraction between the entity and data; and, the indicator of behavioris based upon the behavior enacted by the entity and the interactionwith the data.
 9. The system of claim 8, wherein the instructionsexecutable by the processor are further configured for: associating ahuman factor with an entity; and, using the human factor when analyzingthe event of analytic utility.
 10. The system of claim 7, wherein: thehuman factor comprises at least one of a cardinal trait, an emotionalstressor and an organization dynamic.
 11. The system of claim 7, whereinthe instructions executable by the processor are further configured for:detecting a concerning behavior based upon the indicator of behavior incombination with the human factor.
 12. The system of claim 11, wherein:the security operation comprises inferring an associated adverse effectbased upon the concerning behavior.
 13. A non-transitory,computer-readable storage medium embodying computer program code, thecomputer program code comprising computer executable instructionsconfigured for: monitoring an entity to identify a behavior enacted bythe entity, the monitoring observing at least oneelectronically-observable data source; deriving an observable based uponthe behavior enacted by the entity; identifying an event of analyticutility, the event of analytic utility being derived from the observablefrom the electronic data source, the event of analytic utilitycomprising a behavior enacted by the entity; identifying an indicator ofbehavior related to the event of analytic utility, the indicator ofbehavior providing an abstracted description of an inferred intentassociated with the behavior enacted by the entity; analyzing the eventof analytic utility, the analyzing the event of analytic utility beingbased upon the indicator of behavior related to the event of analyticutility; and, performing a security operation based upon the inferredintent associated with the behavior enacted by the entity.
 14. Thenon-transitory, computer-readable storage medium of claim 13, wherein:the event of analytic utility comprises an interaction between theentity and data; and, the indicator of behavior is based upon thebehavior enacted by the entity and the interaction with the data. 15.The non-transitory, computer-readable storage medium of claim 14,wherein the computer executable instructions are further configured for:associating a human factor with an entity; and, using the human factorwhen analyzing the event of analytic utility.
 16. The non-transitory,computer-readable storage medium of claim 15, wherein: the human factorcomprises at least one of a cardinal trait, an emotional stressor and anorganization dynamic.
 17. The non-transitory, computer-readable storagemedium of claim 13, wherein the computer executable instructions arefurther configured for: detecting a concerning behavior based upon theindicator of behavior in combination with the human factor.
 18. Thenon-transitory, computer-readable storage medium of claim 17, wherein:the security operation comprises inferring an associated adverse effectbased upon the concerning behavior.
 19. The non-transitory,computer-readable storage medium of claim 13, wherein: the computerexecutable instructions are deployable to a client system from a serversystem at a remote location.
 20. The non-transitory, computer-readablestorage medium of claim 13, wherein: the computer executableinstructions are provided by a service provider to a user on anon-demand basis.