Patent attributes
Security of sensitive information stored on a computing system is protected by monitoring a set of performance indicators of the computing system and executing remedial measures to protect the sensitive information when the set of performance indicators indicates a likelihood of malicious activity. A particular technique involves limiting the amount of sensitive information looted during a malicious attack on a computing system. The technique includes monitoring a set of performance indicators of the computing system. The set of performance indicators provides a measure of sensitive information being accessed on the computing system. The technique further includes testing whether the monitored set of performance indicators indicates a likelihood of looting, and temporarily reducing access to the sensitive information on the computing system in response to the act of testing indicating a likelihood of looting.