What is Context Aware Security?
Context Aware security is a branch of information security that uses
situational information to make decisions related to information access.
How Context Aware Security Works?
It understands the who, what, when, where, and why of access
requests to allow or deny information access.
Some factors used by Context Aware Security are:
Browser Used: Conducts historical analysis of
browser used to demand access & alerts if it falls
outside of normal user behavior.
Location: It detects if any requests are made from
abnormal locations and prevents access initiated from
geographies known to foster malicious activity.
Time: Denies requests made outside the customary
times & days of the users.
Blacklist: Prohibits access to the forbidden networks
or addresses.
Whitelist: Authorizes access requests based on a list
of approved networks or network addresses.
05
01
02
03
04
www.centextech.com
Centex Technologies
13355 Noel Road,
Suite # 1100, Dallas, TX 75240
Phone: (972) 375 - 9654
501 N. 4th Street,
Killeen, TX 76541
Phone: (254) 213 - 4740
1201 Peachtree St NE,
Suite 200, Atlanta, GA 30361
Phone: (404) 994 - 5074
Capital Factory, 701, Brazos
Street, Austin, TX 78701
Phone: (512) 956 - 5454

More Related Content

PPT
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
PPTX
context aware.pptx
PPTX
DC MEETING I on 19.3.2024 design of context aware security model
PPTX
contextawareness.pptx
PPT
Context Aware Computing
PDF
Semantic security framework and context-aware role-based access control ontol...
PDF
Realities of Security in the Cloud
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
context aware.pptx
DC MEETING I on 19.3.2024 design of context aware security model
contextawareness.pptx
Context Aware Computing
Semantic security framework and context-aware role-based access control ontol...
Realities of Security in the Cloud

Similar to What is Context Aware Security? (11)

PPTX
Introduction to Cyber Security - Best Practices-Standards and a plan of Actio...
PDF
The New Normal - Rackspace Solve 2015
PDF
Review 1 부분4
PDF
context aware computing
PDF
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
PPT
Debs 2010 context based computing tutorial
PPTX
Situational awareness for computer network security
PDF
20101012 isa larry_clinton
PPTX
Splunk Enterprise Security
PDF
Kind of big data in info sec
PDF
YBB-NW-distribution
Introduction to Cyber Security - Best Practices-Standards and a plan of Actio...
The New Normal - Rackspace Solve 2015
Review 1 부분4
context aware computing
PROTECT AND SURVIVE – SAFEGUARDING YOUR INFORMATION ASSETS - #MFSummit2017
Debs 2010 context based computing tutorial
Situational awareness for computer network security
20101012 isa larry_clinton
Splunk Enterprise Security
Kind of big data in info sec
YBB-NW-distribution
Ad

More from Centextech (20)

PDF
Mobile Device Management (MDM) For Enterprise Security
PDF
How To Stay Prepared for Faster Incident Recovery
PDF
Dallas, Texas USA: Threat Hunting Strategies
PDF
Dallas, TX: Elements of Privacy First Design
PDF
Killeen: Privacy Enhancing Technologies (PETs)
PDF
Data Modeling Practices for Effective Database Design
PDF
Killeen: Next-Generation Firewalls (NGFW)
PDF
Content Discovery & Enterprise Data Protection
PDF
Dallas - Indicators of Compromise (IoCs)
PDF
Security at the Core: Unraveling Secure by Design Principles
PDF
CI/CD Pipelines In Software Development:
PDF
Upgrading or Migrating Enterprise Networks
PDF
Cybersecurity Incident Management for Small and Medium-sized Businesses
PDF
Mobile Application Security: Safeguarding Apps in the Digital Age
PDF
Cybersecurity Best Practices for Small Businesses
PDF
Secure Access Control with Smart Cards
PDF
Incident Management for Ransomware Attacks Best Practices for Response and Re...
PDF
Cyber security For IoT Devices
PDF
Effective Ways to Manage Third Party Cyber Risks
PDF
How To Improve It Risk Management Efficiency
Mobile Device Management (MDM) For Enterprise Security
How To Stay Prepared for Faster Incident Recovery
Dallas, Texas USA: Threat Hunting Strategies
Dallas, TX: Elements of Privacy First Design
Killeen: Privacy Enhancing Technologies (PETs)
Data Modeling Practices for Effective Database Design
Killeen: Next-Generation Firewalls (NGFW)
Content Discovery & Enterprise Data Protection
Dallas - Indicators of Compromise (IoCs)
Security at the Core: Unraveling Secure by Design Principles
CI/CD Pipelines In Software Development:
Upgrading or Migrating Enterprise Networks
Cybersecurity Incident Management for Small and Medium-sized Businesses
Mobile Application Security: Safeguarding Apps in the Digital Age
Cybersecurity Best Practices for Small Businesses
Secure Access Control with Smart Cards
Incident Management for Ransomware Attacks Best Practices for Response and Re...
Cyber security For IoT Devices
Effective Ways to Manage Third Party Cyber Risks
How To Improve It Risk Management Efficiency
Ad

Recently uploaded (20)

PPTX
operations management : demand supply ch
DOCX
Hand book of Entrepreneurship 4 Chapters.docx
DOCX
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
PDF
Highest-Paid CEO in 2025_ You Won’t Believe Who Tops the List.pdf
PDF
Sustainable Digital Finance in Asia_FINAL_22.pdf
PPTX
33ABJFA6556B1ZP researhchzfrsdfasdfsadzd
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PDF
HQ #118 / 'Building Resilience While Climbing the Event Mountain
PDF
Tortilla Mexican Grill 发射点犯得上发射点发生发射点犯得上发生
PPTX
Market and Demand Analysis.pptx for Management students
PPTX
basic introduction to research chapter 1.pptx
PPTX
df0ee68f89e1a869be4bff9b80a7 business 79f0.pptx
PDF
1911 Gold Corporate Presentation Aug 2025.pdf
DOCX
Center Enamel A Strategic Partner for the Modernization of Georgia's Chemical...
PDF
Middle East's Most Impactful Business Leaders to Follow in 2025
DOCX
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
PDF
Communication Tactics in Legal Contexts: Historical Case Studies (www.kiu.ac...
PDF
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
DOCX
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
PDF
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
operations management : demand supply ch
Hand book of Entrepreneurship 4 Chapters.docx
Center Enamel Powering Innovation and Resilience in the Italian Chemical Indu...
Highest-Paid CEO in 2025_ You Won’t Believe Who Tops the List.pdf
Sustainable Digital Finance in Asia_FINAL_22.pdf
33ABJFA6556B1ZP researhchzfrsdfasdfsadzd
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
HQ #118 / 'Building Resilience While Climbing the Event Mountain
Tortilla Mexican Grill 发射点犯得上发射点发生发射点犯得上发生
Market and Demand Analysis.pptx for Management students
basic introduction to research chapter 1.pptx
df0ee68f89e1a869be4bff9b80a7 business 79f0.pptx
1911 Gold Corporate Presentation Aug 2025.pdf
Center Enamel A Strategic Partner for the Modernization of Georgia's Chemical...
Middle East's Most Impactful Business Leaders to Follow in 2025
80 DE ÔN VÀO 10 NĂM 2023vhkkkjjhhhhjjjj
Communication Tactics in Legal Contexts: Historical Case Studies (www.kiu.ac...
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
Handbook of Entrepreneurship- Chapter 5: Identifying business opportunity.docx
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...

What is Context Aware Security?

  • 1. What is Context Aware Security? Context Aware security is a branch of information security that uses situational information to make decisions related to information access. How Context Aware Security Works? It understands the who, what, when, where, and why of access requests to allow or deny information access. Some factors used by Context Aware Security are: Browser Used: Conducts historical analysis of browser used to demand access & alerts if it falls outside of normal user behavior. Location: It detects if any requests are made from abnormal locations and prevents access initiated from geographies known to foster malicious activity. Time: Denies requests made outside the customary times & days of the users. Blacklist: Prohibits access to the forbidden networks or addresses. Whitelist: Authorizes access requests based on a list of approved networks or network addresses. 05 01 02 03 04 www.centextech.com Centex Technologies 13355 Noel Road, Suite # 1100, Dallas, TX 75240 Phone: (972) 375 - 9654 501 N. 4th Street, Killeen, TX 76541 Phone: (254) 213 - 4740 1201 Peachtree St NE, Suite 200, Atlanta, GA 30361 Phone: (404) 994 - 5074 Capital Factory, 701, Brazos Street, Austin, TX 78701 Phone: (512) 956 - 5454