Medical School Johns Hopkins University School of Medicine Graduated: 1983
Procedures:
Proctosigmoidoscopy Colonoscopy Destruction of Lesions on the Anus Hemorrhoid Procedures Sigmoidoscopy
Conditions:
Anal Fissure Anal or Rectal Abscess Benign Polyps of the Colon Malignant Neoplasm of Colon Malignant Neoplasm of Female Breast
Languages:
English
Description:
Dr. Blake graduated from the Johns Hopkins University School of Medicine in 1983. He works in Lone Tree, CO and specializes in Colon & Rectal Surgery. Dr. Blake is affiliated with Littleton Adventist Hospital and Sky Ridge Medical Center.
Kenneth W. Blake - Austin TX, US Vikki Kim Converse - Austin TX, US Ronald O'Neal Edmark - Smyrna TN, US John Michael Garrison - Austin TX, US
Assignee:
International Business Machines Corporation - Armonk NY
International Classification:
G06F 12/14 G06F 15/18 G06B 23/00 G06F 15/173
US Classification:
726 23, 709224, 726 25
Abstract:
A method, system, apparatus, or computer program product is presented for morphing a honeypot system on a dynamic and configurable basis. The morphing honeypot emulates a variety of services while falsely presenting information about potential vulnerabilities within the system that supports the honeypot. The morphing honeypot has the ability to dynamically change its personality or displayed characteristics using a variety of algorithms and a database of known operating system and service vulnerabilities. The morphing honeypot's personality can be changed on a timed or scheduled basis, on the basis of activity that is generated by the presented honeypot personality, or on some other basis.
Method And System For Morphing Honeypot With Computer Security Incident Correlation
A method, system, apparatus, or computer program product is presented for morphing a honeypot system on a dynamic and configurable basis. The morphing honeypot emulates a variety of services while falsely presenting information about potential vulnerabilities within the system that supports the honeypot. The morphing honeypot has the ability to dynamically change its personality or displayed characteristics using a variety of algorithms and a database of known operating system and service vulnerabilities. The morphing honeypot's personality can be changed on a timed or scheduled basis, on the basis of activity that is generated by the presented honeypot personality, or on some other basis. The morphing honeypot can also be integrated with intrusion detection systems and other types of computer security incident recognition systems to correlate its personality with detected nefarious activities.
Method And System For Morphing Honeypot With Computer Security Incident Correlation
A method, system, apparatus, or computer program product is presented for morphing a honeypot system on a dynamic and configurable basis. The morphing honeypot emulates a variety of services while falsely presenting information about potential vulnerabilities within the system that supports the honeypot. The morphing honeypot has the ability to dynamically change its personality or displayed characteristics using a variety of algorithms and a database of known operating system and service vulnerabilities. The morphing honeypot's personality can be changed on a timed or scheduled basis, on the basis of activity that is generated by the presented honeypot personality, or on some other basis. The morphing honeypot can also be integrated with intrusion detection systems and other types of computer security incident recognition systems to correlate its personality with detected nefarious activities.
Kenneth W. Blake - Austin TX, US Vikki Kim Converse - Austin TX, US Ronald O'Neal Edmark - Smyrna TN, US John Michael Garrison - Austin TX, US
International Classification:
G06F 12/14 G06F 15/18 G08B 23/00 G06F 15/173
US Classification:
726 23, 726 25, 709224
Abstract:
A method, system, apparatus, or computer program product is presented for morphing a honeypot system on a dynamic and configurable basis. The morphing honeypot emulates a variety of services while falsely presenting information about potential vulnerabilities within the system that supports the honeypot. The morphing honeypot has the ability to dynamically change its personality or displayed characteristics using a variety of algorithms and a database of known operating system and service vulnerabilities. The morphing honeypot's personality can be changed on a timed or scheduled basis, on the basis of activity that is generated by the presented honeypot personality, or on some other basis.
Youtube
Kenneth Blake is Dolly Parton: "Dolly" Medley...
Kenneth Blake becomes Dolly Parton and performs two of her songs, "Tog...
Duration:
6m 16s
Frank Marino & Kenneth Blake on "The Morning ...
Frank Marino & Kenneth Blake on "The Morning Blend"
Duration:
8m 19s
Don't fall for this doctrine of devil. - - C...
Duration:
2m 7s
Kenneth Blake is Madonna: "Dick Tracy" Medley...
Kenneth Blake becomes Madonna from the film, "Dick Tracy" and performs...
Duration:
5m 42s
Kenneth Blake as Dolly Parton in Las Vegas 1995
Kenneth Blake as Dolly Parton in Las Vegas 1995. We were in the La Cag...
Duration:
2m 5s
56 Year-Old Pastor, Kenneth Blake Charged fo...
A second paternity test has all but concluded that the Kingston pastor...
Hope Elementary School Hope KS 1986-1990, Hope Rural High School Hope KS 1990-1994
Community:
Jennifer Penquite, Patrick Dolan, Josey New, Charles Barnett, A James, Jefferson Rogers, Kent Jacobson, Holly Domann, Steven Rohrer, Bubba Smith, Elizabeth Storey, Kelly Emig
Kenneth Blake teaches wicker art and is known to everyone at the centre as 'Neaty'. He has been working with wicker for more than 30 years and his moniker ...
Kenneth Blake, an associate professor of journalism in the College of Mass Communication, said he does not worry about technology being a distraction during ...