Examples of triggering events 610 include, but are not limited to, change in network traffic, a predetermined period of time, an authentication process, activation of a user button or switch, a program starts up, a change in destination, and/or any combination of these factors.
A change in network traffic may refer to a change in the pattern of network traffic. For example, the SCS computer system 100 may detect that the system 100 is being scanned by a remote computer system over the network. The change in network traffic may also refer to a change in data packet (or datagram) volume and/or size. For example, the SCS computer system 100 may detect a drastic increase (or decrease) in data packets and/or datagrams, which may indicate a Denial of Service attack. The SCS computer device 100 may also detect a change in the latency or loss of packets and/or datagrams. This may be an indicator of a man-in-the-middle attack, or a new source for messages. In at least one embodiment, the SCS computer system 100 is acting as a server computer device and detects a drop-off or increase in the latency or number of packets. This may trigger the server to change its behavior (i.e., network settings) to handle the change in traffic.