Context-aware training systems, apparatuses, and methods
First Claim
Patent Images
1. A computer-implemented method of providing cybersecurity training to a user, comprising:
- by one or more processors of a cloud-based system, generating a command to present a user with a mock attack situation;
by a sensor device, sensing an action of the user when using an electronic device in response to the mock attack situation, wherein the sensor device comprises at least one of the following;
a USB sensor device configured to detect that the user has connected a USB device to the electronic device, ora Wi-Fi sensor device configured to detect that the user has connected or attempted to connect the electronic device to a Wi-Fi access point;
by the one or more processors of the cloud-based system, using data from the sensor device to determine that, in response to the mock attack situation, the user has performed an action that indicates a need for the user to receive a cybersecurity training intervention relating to the performed action; and
by the one or more processors of the cloud-based system, generating a command to deliver the cybersecurity training intervention to the user via an electronic device.
8 Assignments
0 Petitions
Accused Products
Abstract
A context-aware training system senses sensing a user action that may expose the user'"'"'s computer to a cybersecurity threat. The system selects training action from a collection of available training actions and causes the training action to be selected to the user.
-
Citations
20 Claims
-
1. A computer-implemented method of providing cybersecurity training to a user, comprising:
-
by one or more processors of a cloud-based system, generating a command to present a user with a mock attack situation; by a sensor device, sensing an action of the user when using an electronic device in response to the mock attack situation, wherein the sensor device comprises at least one of the following; a USB sensor device configured to detect that the user has connected a USB device to the electronic device, or a Wi-Fi sensor device configured to detect that the user has connected or attempted to connect the electronic device to a Wi-Fi access point; by the one or more processors of the cloud-based system, using data from the sensor device to determine that, in response to the mock attack situation, the user has performed an action that indicates a need for the user to receive a cybersecurity training intervention relating to the performed action; and by the one or more processors of the cloud-based system, generating a command to deliver the cybersecurity training intervention to the user via an electronic device. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A computer-implemented method of providing cybersecurity training to a user, comprising:
by one or more processors of a cloud-based system; receiving, from a sensor device, a sensed action of the a user of an electronic device, wherein the sensor device and sensed action comprise at least one of the following; a USB sensor device, and that the user has connected a USB device to the electronic device, or a Wi-Fi sensor and that the user has connected or attempted to connect the electronic device to a Wi-Fi access point; using data from the sensor device to determine that the user is at risk for a cybersecurity threat scenario; identifying a data storage system comprising a collection of available training interventions that are relevant to the cybersecurity threat scenario; accessing a training needs model for the user; selecting a training intervention from the collection that relates to the identified threat scenario, wherein the selecting is based on the identified cybersecurity threat scenario and one or more of the following;
historical user training data, user behavior data or user profile information; andgenerating a command to deliver the training intervention to the user. - View Dependent Claims (10, 11, 12, 13, 14, 15)
-
16. A cybersecurity training system, comprising:
-
a first computer-readable memory portion containing a collection of available cybersecurity training interventions; a second computer-readable memory portion containing a risk model comprising a susceptibility estimate of a user of an electronic device falling victim to a cybersecurity threat scenario; a sensor device comprising; a USB sensor device configured to detect that the user has connected a USB device to the electronic device, or a Wi-Fi sensor device configured to detect that the user has connected or attempted to connect the electronic device to a Wi-Fi access point; and a computer system comprising one or more processors and computer-readable instructions that, when executed by the one or more processors, cause the computer system to; receive, from the sensor device, a sensed action of the user, wherein the sensed action comprises; that the user has connected a USB device to the electronic device, or that the user has connected or attempted to connect the electronic device to a Wi-Fi access point; and determine, based on the sensed data and the risk model, that the user is at risk for a cybersecurity threat scenario; select, based on the cybersecurity threat scenario, a cybersecurity training intervention from the collection; and generate a command to deliver the cybersecurity selected training intervention to the user via an electronic device. - View Dependent Claims (17, 18, 19, 20)
-
Specification