Risk profiling in order to optimize the deployment of security measures
such as behavior-blocking, hardening, or securing techniques is
disclosed. Risk profiling includes evaluating a risk to a host service
based on communication with a remote system, creating a risk profile for
the host service, and deploying a security measure to protect the host
service based on the risk profile. Risk profiling enables optimization of
deployment of security measures to protect a host service that is either
directly or indirectly communicating with a remote system. Using a risk
profile enables the optimal deployment of security measures while
preventing host system performance degradation and increased system
requirements (e.g., increased memory and processor usage).