Patent attributes
Techniques for providing dynamic resource implementation prioritization for a network are provided. In one embodiment, a method includes determining a user of a selected device and assigning a user value based on the user's identity. The method includes determining related devices on the network by evaluating user behavior information to identify devices in the network that are in communication with the selected device. The method includes calculating a composite device value based on a value of the selected device, the user value, and values of the related devices. The method includes determining a probability factor for potential security vulnerabilities affecting the selected device and calculating a risk score based on the composite device value and the probability factor. Security measures may be implemented based on a comparison of the calculated risk score for the selected device with a plurality of risk scores for other devices in the network.