A method of provisioning a computer against computer attacks includes
constructing a hierarchy characterizing different computer attacks and
counter measures, and traversing this hierarchy to identify computer
attacks and countermeasures relevant to a target platform. Detection and
protection measures are collected in response to this traversing. These
detection and protection measures are then downloaded to a security
sensor associated with the target platform.