An adaptive method, system and program for securing data against a
plurality of electronic and environmental events directed at computers
utilizes a hacking monitor which generates attack warnings (such as a
hacking warning) dependent upon the severity of the attack. Based upon
these warnings, data is filtered to extract security sensitive words etc.
and the extract and remainder data (if necessary) is stored in assigned
memory. Full or partial reconstruction is permitted, manually or
automatically, with a security clearance. Encryption is typically used
dependent upon the warning. The information processing system includes a
filter which is adjusted based upon the degree of attack warning to
extract security sensitive words. A storage system stores extracted data
and remainder data (if necessary) based upon the level of the warning and
a compiler is used to reconstruct the data in the presence of the
appropriate security clearance level.