A system in which a networked device automatically evaluates hacker attack
notification information and, based thereon, selects and executes
responses to the attack. The notification may include information such as
the address of the infected system, identification of the specific worm,
and a list of vulnerable applications and operating systems. The
evaluation is based on factors including criticality and vulnerability of
applications running on the system and connectivity of the device. A
variety of automatic responses can be selected, including notification of
network administration, shutdown of the device or services running on the
device, updating and activation of anti-virus software, and selective
handling of data sent from the address of the suspect network device. The
selection of responses can occur automatically based on rules input
during setup or by intervention of network administration.