SlideShare a Scribd company logo
What is Context Aware Security?
Context Aware security is a branch of information security that uses
situational information to make decisions related to information access.
How Context Aware Security Works?
It understands the who, what, when, where, and why of access
requests to allow or deny information access.
Some factors used by Context Aware Security are:
Browser Used: Conducts historical analysis of
browser used to demand access & alerts if it falls
outside of normal user behavior.
Location: It detects if any requests are made from
abnormal locations and prevents access initiated from
geographies known to foster malicious activity.
Time: Denies requests made outside the customary
times & days of the users.
Blacklist: Prohibits access to the forbidden networks
or addresses.
Whitelist: Authorizes access requests based on a list
of approved networks or network addresses.
05
01
02
03
04
www.centextech.com
Centex Technologies
13355 Noel Road,
Suite # 1100, Dallas, TX 75240
Phone: (972) 375 - 9654
501 N. 4th Street,
Killeen, TX 76541
Phone: (254) 213 - 4740
1201 Peachtree St NE,
Suite 200, Atlanta, GA 30361
Phone: (404) 994 - 5074
Capital Factory, 701, Brazos
Street, Austin, TX 78701
Phone: (512) 956 - 5454

More Related Content

Similar to What is Context Aware Security?

1 introit security
1 introit security1 introit security
1 introit security
richarddxd
 
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
Top 20 Cyber Security Interview Questions and Answers in 2023.pptxTop 20 Cyber Security Interview Questions and Answers in 2023.pptx
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
AnanthReddy38
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
youfanlimboo
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
Paul Andrews
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdf
annaielectronicsvill
 

Similar to What is Context Aware Security? (20)

Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
Cyber forensics and auditing
Cyber forensics and auditingCyber forensics and auditing
Cyber forensics and auditing
 
1 introit security
1 introit security1 introit security
1 introit security
 
network security ppt.pptx
network security ppt.pptxnetwork security ppt.pptx
network security ppt.pptx
 
Network security ppt
Network security pptNetwork security ppt
Network security ppt
 
Ethical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdfEthical Hacking Interview Questions and Answers.pdf
Ethical Hacking Interview Questions and Answers.pdf
 
Top 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdfTop 25 SOC Analyst interview questions.pdf
Top 25 SOC Analyst interview questions.pdf
 
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
Top 20 Cyber Security Interview Questions and Answers in 2023.pptxTop 20 Cyber Security Interview Questions and Answers in 2023.pptx
Top 20 Cyber Security Interview Questions and Answers in 2023.pptx
 
Network security unit 1,2,3
Network security unit 1,2,3 Network security unit 1,2,3
Network security unit 1,2,3
 
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor AuthenticationAddressing Insider Threat using "Where You Are" as Fourth Factor Authentication
Addressing Insider Threat using "Where You Are" as Fourth Factor Authentication
 
Introduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptxIntroduction to Pre-Cybersecurity.pptx
Introduction to Pre-Cybersecurity.pptx
 
Network Security-Module_1.pdf
Network Security-Module_1.pdfNetwork Security-Module_1.pdf
Network Security-Module_1.pdf
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Security Audits & Cyber
Security Audits & CyberSecurity Audits & Cyber
Security Audits & Cyber
 
Network-security-ppt.pptx...............
Network-security-ppt.pptx...............Network-security-ppt.pptx...............
Network-security-ppt.pptx...............
 
Database forensics
Database forensicsDatabase forensics
Database forensics
 
Module 3-cyber security
Module 3-cyber securityModule 3-cyber security
Module 3-cyber security
 
CIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdfCIA = Confidentiality of information, Integrity of information, Avai.pdf
CIA = Confidentiality of information, Integrity of information, Avai.pdf
 
PACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security ControlPACE-IT: Physical Network Security Control
PACE-IT: Physical Network Security Control
 
Ethical hacking and social engineering
Ethical hacking and social engineeringEthical hacking and social engineering
Ethical hacking and social engineering
 

More from Centextech

Data Modeling Practices for Effective Database Design
Data Modeling Practices for Effective Database DesignData Modeling Practices for Effective Database Design
Data Modeling Practices for Effective Database Design
Centextech
 
Killeen: Next-Generation Firewalls (NGFW)
Killeen: Next-Generation Firewalls (NGFW)Killeen: Next-Generation Firewalls (NGFW)
Killeen: Next-Generation Firewalls (NGFW)
Centextech
 
Content Discovery & Enterprise Data Protection
Content Discovery & Enterprise Data ProtectionContent Discovery & Enterprise Data Protection
Content Discovery & Enterprise Data Protection
Centextech
 
Dallas - Indicators of Compromise (IoCs)
Dallas - Indicators of Compromise (IoCs)Dallas - Indicators of Compromise (IoCs)
Dallas - Indicators of Compromise (IoCs)
Centextech
 
Security at the Core: Unraveling Secure by Design Principles
Security at the Core: Unraveling Secure by Design PrinciplesSecurity at the Core: Unraveling Secure by Design Principles
Security at the Core: Unraveling Secure by Design Principles
Centextech
 
CI/CD Pipelines In Software Development:
CI/CD Pipelines In Software Development:CI/CD Pipelines In Software Development:
CI/CD Pipelines In Software Development:
Centextech
 
Upgrading or Migrating Enterprise Networks
Upgrading or Migrating Enterprise NetworksUpgrading or Migrating Enterprise Networks
Upgrading or Migrating Enterprise Networks
Centextech
 
Cybersecurity Incident Management for Small and Medium-sized Businesses
Cybersecurity Incident Management for Small and Medium-sized BusinessesCybersecurity Incident Management for Small and Medium-sized Businesses
Cybersecurity Incident Management for Small and Medium-sized Businesses
Centextech
 
Cybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small BusinessesCybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small Businesses
Centextech
 
Secure Access Control with Smart Cards
Secure Access Control with Smart CardsSecure Access Control with Smart Cards
Secure Access Control with Smart Cards
Centextech
 
Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...
Centextech
 
Cyber security For IoT Devices
Cyber security For IoT DevicesCyber security For IoT Devices
Cyber security For IoT Devices
Centextech
 
Effective Ways to Manage Third Party Cyber Risks
Effective Ways to Manage Third Party  Cyber Risks Effective Ways to Manage Third Party  Cyber Risks
Effective Ways to Manage Third Party Cyber Risks
Centextech
 
How To Improve It Risk Management Efficiency
How To Improve It Risk Management EfficiencyHow To Improve It Risk Management Efficiency
How To Improve It Risk Management Efficiency
Centextech
 
10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy
Centextech
 
Top AI-Powered Cyber Threats
Top AI-Powered Cyber ThreatsTop AI-Powered Cyber Threats
Top AI-Powered Cyber Threats
Centextech
 
Technological Advancements in Cyber Security
Technological Advancements in Cyber SecurityTechnological Advancements in Cyber Security
Technological Advancements in Cyber Security
Centextech
 
What is Endpoint Protection?
What is Endpoint Protection?What is Endpoint Protection?
What is Endpoint Protection?
Centextech
 
6 Steps of Incident Response Plan
6 Steps of Incident Response Plan6 Steps of Incident Response Plan
6 Steps of Incident Response Plan
Centextech
 
Benefits of VPN For Businesses
Benefits of VPN For BusinessesBenefits of VPN For Businesses
Benefits of VPN For Businesses
Centextech
 

More from Centextech (20)

Data Modeling Practices for Effective Database Design
Data Modeling Practices for Effective Database DesignData Modeling Practices for Effective Database Design
Data Modeling Practices for Effective Database Design
 
Killeen: Next-Generation Firewalls (NGFW)
Killeen: Next-Generation Firewalls (NGFW)Killeen: Next-Generation Firewalls (NGFW)
Killeen: Next-Generation Firewalls (NGFW)
 
Content Discovery & Enterprise Data Protection
Content Discovery & Enterprise Data ProtectionContent Discovery & Enterprise Data Protection
Content Discovery & Enterprise Data Protection
 
Dallas - Indicators of Compromise (IoCs)
Dallas - Indicators of Compromise (IoCs)Dallas - Indicators of Compromise (IoCs)
Dallas - Indicators of Compromise (IoCs)
 
Security at the Core: Unraveling Secure by Design Principles
Security at the Core: Unraveling Secure by Design PrinciplesSecurity at the Core: Unraveling Secure by Design Principles
Security at the Core: Unraveling Secure by Design Principles
 
CI/CD Pipelines In Software Development:
CI/CD Pipelines In Software Development:CI/CD Pipelines In Software Development:
CI/CD Pipelines In Software Development:
 
Upgrading or Migrating Enterprise Networks
Upgrading or Migrating Enterprise NetworksUpgrading or Migrating Enterprise Networks
Upgrading or Migrating Enterprise Networks
 
Cybersecurity Incident Management for Small and Medium-sized Businesses
Cybersecurity Incident Management for Small and Medium-sized BusinessesCybersecurity Incident Management for Small and Medium-sized Businesses
Cybersecurity Incident Management for Small and Medium-sized Businesses
 
Cybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small BusinessesCybersecurity Best Practices for Small Businesses
Cybersecurity Best Practices for Small Businesses
 
Secure Access Control with Smart Cards
Secure Access Control with Smart CardsSecure Access Control with Smart Cards
Secure Access Control with Smart Cards
 
Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...
 
Cyber security For IoT Devices
Cyber security For IoT DevicesCyber security For IoT Devices
Cyber security For IoT Devices
 
Effective Ways to Manage Third Party Cyber Risks
Effective Ways to Manage Third Party  Cyber Risks Effective Ways to Manage Third Party  Cyber Risks
Effective Ways to Manage Third Party Cyber Risks
 
How To Improve It Risk Management Efficiency
How To Improve It Risk Management EfficiencyHow To Improve It Risk Management Efficiency
How To Improve It Risk Management Efficiency
 
10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy10 Essentials Of Effective Cyber Security Strategy
10 Essentials Of Effective Cyber Security Strategy
 
Top AI-Powered Cyber Threats
Top AI-Powered Cyber ThreatsTop AI-Powered Cyber Threats
Top AI-Powered Cyber Threats
 
Technological Advancements in Cyber Security
Technological Advancements in Cyber SecurityTechnological Advancements in Cyber Security
Technological Advancements in Cyber Security
 
What is Endpoint Protection?
What is Endpoint Protection?What is Endpoint Protection?
What is Endpoint Protection?
 
6 Steps of Incident Response Plan
6 Steps of Incident Response Plan6 Steps of Incident Response Plan
6 Steps of Incident Response Plan
 
Benefits of VPN For Businesses
Benefits of VPN For BusinessesBenefits of VPN For Businesses
Benefits of VPN For Businesses
 

Recently uploaded

NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
Khaled Al Awadi
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
anasabutalha2013
 

Recently uploaded (20)

Cracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptxCracking the Workplace Discipline Code Main.pptx
Cracking the Workplace Discipline Code Main.pptx
 
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptxTaurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
Taurus Zodiac Sign_ Personality Traits and Sign Dates.pptx
 
How to Maintain Healthy Life style.pptx
How to Maintain  Healthy Life style.pptxHow to Maintain  Healthy Life style.pptx
How to Maintain Healthy Life style.pptx
 
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
RMD24 | Debunking the non-endemic revenue myth Marvin Vacquier Droop | First ...
 
What are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdfWhat are the main advantages of using HR recruiter services.pdf
What are the main advantages of using HR recruiter services.pdf
 
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlastUnlock Your TikTok Potential: Free TikTok Likes with InstBlast
Unlock Your TikTok Potential: Free TikTok Likes with InstBlast
 
Global Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdfGlobal Interconnection Group Joint Venture[960] (1).pdf
Global Interconnection Group Joint Venture[960] (1).pdf
 
TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024TriStar Gold Corporate Presentation May 2024
TriStar Gold Corporate Presentation May 2024
 
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...NewBase   24 May  2024  Energy News issue - 1727 by Khaled Al Awadi_compresse...
NewBase 24 May 2024 Energy News issue - 1727 by Khaled Al Awadi_compresse...
 
India’s Recommended Women Surgeons to Watch in 2024.pdf
India’s Recommended Women Surgeons to Watch in 2024.pdfIndia’s Recommended Women Surgeons to Watch in 2024.pdf
India’s Recommended Women Surgeons to Watch in 2024.pdf
 
anas about venice for grade 6f about venice
anas about venice for grade 6f about veniceanas about venice for grade 6f about venice
anas about venice for grade 6f about venice
 
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deckPitch Deck Teardown: RAW Dating App's $3M Angel deck
Pitch Deck Teardown: RAW Dating App's $3M Angel deck
 
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
12 Conversion Rate Optimization Strategies for Ecommerce Websites.pdf
 
sales plan presentation by mckinsey alum
sales plan presentation by mckinsey alumsales plan presentation by mckinsey alum
sales plan presentation by mckinsey alum
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | ShajaraLuxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
Luxury Artificial Plants Dubai | Plants in KSA, UAE | Shajara
 
BeMetals Presentation_May_22_2024 .pdf
BeMetals Presentation_May_22_2024   .pdfBeMetals Presentation_May_22_2024   .pdf
BeMetals Presentation_May_22_2024 .pdf
 
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
RMD24 | Retail media: hoe zet je dit in als je geen AH of Unilever bent? Heid...
 
Understanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and EmployeesUnderstanding UAE Labour Law: Key Points for Employers and Employees
Understanding UAE Labour Law: Key Points for Employers and Employees
 
Using Generative AI for Content Marketing
Using Generative AI for Content MarketingUsing Generative AI for Content Marketing
Using Generative AI for Content Marketing
 

What is Context Aware Security?

  • 1. What is Context Aware Security? Context Aware security is a branch of information security that uses situational information to make decisions related to information access. How Context Aware Security Works? It understands the who, what, when, where, and why of access requests to allow or deny information access. Some factors used by Context Aware Security are: Browser Used: Conducts historical analysis of browser used to demand access & alerts if it falls outside of normal user behavior. Location: It detects if any requests are made from abnormal locations and prevents access initiated from geographies known to foster malicious activity. Time: Denies requests made outside the customary times & days of the users. Blacklist: Prohibits access to the forbidden networks or addresses. Whitelist: Authorizes access requests based on a list of approved networks or network addresses. 05 01 02 03 04 www.centextech.com Centex Technologies 13355 Noel Road, Suite # 1100, Dallas, TX 75240 Phone: (972) 375 - 9654 501 N. 4th Street, Killeen, TX 76541 Phone: (254) 213 - 4740 1201 Peachtree St NE, Suite 200, Atlanta, GA 30361 Phone: (404) 994 - 5074 Capital Factory, 701, Brazos Street, Austin, TX 78701 Phone: (512) 956 - 5454