×

Method and system for controlling context-aware cybersecurity training

  • US 9,373,267 B2
  • Filed: 03/17/2014
  • Issued: 06/21/2016
  • Est. Priority Date: 04/08/2011
  • Status: Active Grant
First Claim
Patent Images

1. A cybersecurity training system, comprising:

  • one or more data storage devices that store;

    at least one cybersecurity training intervention, anda training needs model;

    an electronic device comprising one or more sensors that sense data relating to behavior or activity of at least one user of the electronic device, wherein the one or more sensors comprise one or more of the following;

    a USB device sensor configured to detect when a USB drive has been connected to the electronic device,a Wi-Fi sensor configured to detect a Wi-Fi access point to which the electronic device is connected, ora Wi-Fi sensor configured to detect whether the at least one user has attempted to connect the electronic device to a mock rogue Wi-Fi access point;

    an analysis host computer comprising a computer-readable memory portion holding programming instructions that, when executed, instruct one or more processors of the analysis host computer to implement a policy manager that;

    receives the sensed data from the electronic device via a communications network;

    analyzes the sensed data by applying the training needs model to the sensed data to determine whether the at least one user may be at risk for a threat scenario, andidentifies, from the at least one cybersecurity training intervention, a set of one or more policy manager-identified cybersecurity training interventions that are relevant to the threat scenario;

    a computer-readable memory portion holding programming instructions that, when executed, instruct one or more processors to implement a system administrator interface that displays the set of one or more policy manager-identified cybersecurity training interventions and receives a selection of an intervention in the set via the system administrator interface; and

    a computer-readable memory portion holding programming instructions that, when executed, instruct one or more processors to generate a command to deliver the selected cybersecurity training intervention to an electronic device for presentation to the at least one user.

View all claims
  • 9 Assignments
Timeline View
Assignment View
    ×
    ×