Systems and method for identifying and mitigating information security risks
First Claim
1. A computer-implemented method for identifying and mitigating information security risks, the method comprising:
- assigning unique identifiers to a plurality of target e-mail addresses, wherein each e-mail address is associated with an individual user account, respectively;
delivering an e-mail message to one or more of the plurality of target e-mail addresses, wherein the e-mail message comprises a hypertext transfer protocol (HTTP) request and a unique identifier associated with a user account;
receiving, at a Phishing Metric Tool (PMT), a response including the unique identifier;
logging, by the PMT, a training requirement for the user account;
tracking, by the PMT, response metrics for the training requirement;
redirecting the HTTP request to a phishing training tool (PTT);
sending, by the PTT, a notification of a verified identity of the user account and the unique identifier to the PMT;
returning a status report for the training requirement, the status report including an indication of whether the user account has failed at least a portion of the training requirement; and
redirecting, by the PMT, the user account to undergo an additional training requirement related to the portion of the training requirement which was failed, upon receipt of the status report, when the status report indicates that the user account has failed at least the portion of the training requirement so that the user account is subjected to the additional training requirement,wherein the PMT and the PTT are respectively implemented by at least one processor of a computer processing device.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and systems for Sustained Testing and Awareness Refresh against Phishing threats (STAR*Phish™) are disclosed. In an embodiment, a method assigns schemes and unique identifiers to target e-mail addresses associated with a user accounts. The method delivers e-mail messages to the targeted e-mail addresses, the e-mail messages comprising an HTTP request and a unique identifier associated with each of the user accounts. The method then receives, at a Phishing Metric Tool (PMT), a response including the unique identifier. The PMT logs training requirements for the user accounts, tracks response metrics for the training requirements, and redirects the respective HTTP requests to a phishing training tool (PTT). The PTT sends a notification of the user account identities and the unique identifiers to the PMT and returns a status for the training requirements for the user accounts. Upon completion of the training, the PMT sends completion notifications for the user accounts.
-
Citations
20 Claims
-
1. A computer-implemented method for identifying and mitigating information security risks, the method comprising:
-
assigning unique identifiers to a plurality of target e-mail addresses, wherein each e-mail address is associated with an individual user account, respectively; delivering an e-mail message to one or more of the plurality of target e-mail addresses, wherein the e-mail message comprises a hypertext transfer protocol (HTTP) request and a unique identifier associated with a user account; receiving, at a Phishing Metric Tool (PMT), a response including the unique identifier; logging, by the PMT, a training requirement for the user account; tracking, by the PMT, response metrics for the training requirement; redirecting the HTTP request to a phishing training tool (PTT); sending, by the PTT, a notification of a verified identity of the user account and the unique identifier to the PMT; returning a status report for the training requirement, the status report including an indication of whether the user account has failed at least a portion of the training requirement; and redirecting, by the PMT, the user account to undergo an additional training requirement related to the portion of the training requirement which was failed, upon receipt of the status report, when the status report indicates that the user account has failed at least the portion of the training requirement so that the user account is subjected to the additional training requirement, wherein the PMT and the PTT are respectively implemented by at least one processor of a computer processing device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A non-transitory computer readable storage medium having program instructions stored thereon for identifying and mitigating information security risks, the instructions being executable by a processor of a computing device, the instructions comprising:
-
instructions for receiving, at a phishing metrics tool (PMT), a phishing hypertext transfer protocol (HTTP) request; instructions for sending a redirect message from the PMT to a browser session; instructions for receiving, at a phishing training tool (PTT), a request for an application, wherein the request is based at least in part on the received phishing HTTP request; instructions for sending, from the PTT to the browser session, the requested application; instructions for sending, from the PTT, a start message for a first training requirement; instructions for sending, from the PTT, a training exercise associated with the first training requirement; instructions for returning a status report for the first training requirement, the status report including an indication of whether at least a portion of the first training requirement has been failed; and instructions for redirecting, by the PMT, the browser session to undergo an additional training requirement related to portion of the first training requirement which was failed, upon receipt of the status report, when the status report indicates that the at least the portion of the first training requirement has been failed so that a user using the browsing session is subjected to the additional training requirement. - View Dependent Claims (11, 12, 13, 14, 15)
-
-
16. A system capable of identifying and mitigating information security risks, the system comprising:
-
a phishing metric tool (PMT) configured to; receive a phishing hypertext transfer protocol (HTTP) request from a browser session; and send a redirect message to the browser session, the redirect message redirecting the browser session to a phishing training tool (PTT); an e-mail server configured to; send an e-mail message to a target user account, wherein the e-mail message is based on the phishing HTTP request, and wherein the e-mail message includes a unique identifier; and receive a response from the target user account, wherein the response includes the unique identifier; wherein the PTT is configured to; receive an application request based on the response; send the requested application to the browser session; send a start message for a training requirement for the target user account; send a training exercise associated with the training requirement; send a notification to the PMT of an identity of the target user account and the unique identifier; and update a status of the training exercise, the status of the training exercise including an indication of whether the user account has failed at least a portion of the training requirement, wherein the PMT is configured to redirect the user account to undergo an additional training requirement related to portion of the training requirement which was failed, upon receipt of the status, when the status indicates that the user account has failed at least the portion of the training requirement so that the user account is subjected to the additional training requirement, and wherein the PMT and the PTT are respectively implemented by at least one processor of a computer processing device. - View Dependent Claims (17, 18, 19, 20)
-
Specification