Social Engineering Simulation Workflow Appliance
First Claim
1. A method of reducing organizational susceptibility to social engineering, the organization having a plurality of sources, the method comprising:
- providing a computer appliance;
providing a computer platform remote from the computer appliance;
receiving at the computer appliance contact information for a plurality of members of the organization;
monitoring at the computer appliance each of the sources for triggering events;
receiving at the computer platform signals from the computer appliance indicative of the detected triggering events and delivery identifiers associated with the triggering events;
preparing at the computer platform communications including templates based on each of the triggering events, wherein the computer platform is configured to compile information regarding triggering events and to evaluate susceptibility of the organization to social engineering based on the triggering events, and wherein the computer platform does not receive the contact information of the plurality of members from the computer appliance;
transmitting the communications including templates to the computer appliance;
identifying at the computer appliance at least one member of the organization as an intended recipient based on a detected triggering event;
preparing at the computer appliance a message to the intended recipient based on characteristics of the detected triggering event, the message soliciting an action by the intended recipient;
transmitting the message to the intended recipient;
determining whether the intended recipient acts as solicited by the message; and
evaluating the action of the intended recipient.
8 Assignments
0 Petitions
Accused Products
Abstract
A system for evaluating the susceptibility of an organization to social engineering, the organization having a plurality of sources and a plurality of members using electronic devices, is provided. The system includes an appliance in communication with the plurality of sources configured to retrieve contact information of members and to detect triggering events from the plurality of sources. The system includes a platform remote from the appliance configured to receive signals from the appliance indicative of the triggering events and to prepare and send communications, including templates based on each of the triggering events to the appliance. Upon receipt of the communications, the appliance is configured to retrieve the contact information of intended recipient members, to create messages based on the templates, and to send the messages to the intended recipient members. The platform does not receive the contact information of the plurality of members from the appliance.
-
Citations
20 Claims
-
1. A method of reducing organizational susceptibility to social engineering, the organization having a plurality of sources, the method comprising:
-
providing a computer appliance; providing a computer platform remote from the computer appliance; receiving at the computer appliance contact information for a plurality of members of the organization; monitoring at the computer appliance each of the sources for triggering events; receiving at the computer platform signals from the computer appliance indicative of the detected triggering events and delivery identifiers associated with the triggering events; preparing at the computer platform communications including templates based on each of the triggering events, wherein the computer platform is configured to compile information regarding triggering events and to evaluate susceptibility of the organization to social engineering based on the triggering events, and wherein the computer platform does not receive the contact information of the plurality of members from the computer appliance; transmitting the communications including templates to the computer appliance; identifying at the computer appliance at least one member of the organization as an intended recipient based on a detected triggering event; preparing at the computer appliance a message to the intended recipient based on characteristics of the detected triggering event, the message soliciting an action by the intended recipient; transmitting the message to the intended recipient; determining whether the intended recipient acts as solicited by the message; and evaluating the action of the intended recipient. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11)
-
-
12. A system for evaluating the susceptibility to social engineering of an organization having a directory, a plurality of databases, and a messaging system, the system comprising:
-
an appliance configured to receive an address book having contact information for members of the organization from the directory and to connect to the plurality of databases and the messaging system, the appliance being configured to monitor the plurality of databases and the messaging system for triggering events; and a platform configured to receive signals from the appliance indicative of triggering events identified by the appliance, to create templates based on the signals, and to send the templates to the appliance; wherein the appliance is configured to create messages to intended recipients based on the templates; wherein the platform is configured to determine whether the intended recipients take a predetermined action in response to the messages; and wherein the platform is configured to compile statistics regarding the triggering events, messages, and intended recipients'"'"' actions in response to the messages. - View Dependent Claims (13, 14, 15, 16, 17)
-
-
18. A system for evaluating the susceptibility of an organization to social engineering, the organization having a plurality of sources and a plurality of members using electronic devices, the system comprising:
-
an appliance configured to receive an address book from at least one of the sources including identifying information and contact information regarding each of the plurality of members of the organization, the appliance being configured to alias at least some of the identifying information and to replace the contact information with identifiers to create an aliased address book, the information to be aliased being determined based on a predetermined algorithm; a platform configured to receive the aliased address book from the appliance; wherein the appliance is configured to detect a triggering event from the sources and to transmit an indication of the triggering event to the platform; wherein the platform is configured to provide a communication to the appliance including a message template based on the triggering event, an indication of a delivery mode, a delivery identifier known by the appliance to map to one of the members of the organization, and scheduling instructions; wherein the appliance is configured to create a personalized message based on the template for each of the intended recipients from information in the address book; wherein the appliance is configured to send the messages to one of a plurality of servers separate from the platform based on the type of the message, the one of the servers being configured to send the messages to the intended recipients; wherein the appliance is configured to monitor responses to the messages from the intended recipients; and wherein the appliance is configured to alias portions of the responses, leave other portions of the responses un-aliased, and to profile portions of the responses based on a predetermined algorithm and to send the aliased, un-aliased, and profiled portions of the responses to the platform. - View Dependent Claims (19, 20)
-
Specification