A computer implemented method for monitoring system events and providing
real-time response to security threats. System data is collected by
monitors in the computing system. The expert system of the present
invention compares the data against information in a knowledge base to
identify a security threat to a system resource in a form of a system
event and an action for mitigating effects of the system event. A
determination is made as to whether a threat risk value of the system
event is greater than an action risk value of the action for mitigating
the system event. If the threat risk value is greater, a determination is
made as to whether a trust value set by a user is greater than the action
risk value. If the trust value is greater, the expert system executes the
action against the security threat.