Mock attack cybersecurity training system and methods
First Claim
1. A computer-implemented method of assessing susceptibility of an electronic device user to a cybersecurity threat, the method comprising:
- by one or more processors;
accessing identifying information relating to a user of an electronic device;
selecting a mock attack;
causing the mock attack to be deployed to the user so that the user receives the mock attack in the user'"'"'s regular context of use of the electronic device;
receiving, from a sensor, a sensed user action in response to the mock attack, wherein the sensed user action comprises a user interaction with the electronic device;
recording the sensed user action;
using the sensed user action to determine a susceptibility of the user to a cybersecurity threat; and
generating one or more records that include the identifying information relating to the user, the susceptibility of the user to the cybersecurity threat, and the sensed user action in response to the mock attack.
7 Assignments
0 Petitions
Accused Products
Abstract
A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user'"'"'s regular context of use of the electronic device. When a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and use the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user'"'"'s susceptibility to a cybersecurity threat.
-
Citations
19 Claims
-
1. A computer-implemented method of assessing susceptibility of an electronic device user to a cybersecurity threat, the method comprising:
by one or more processors; accessing identifying information relating to a user of an electronic device; selecting a mock attack; causing the mock attack to be deployed to the user so that the user receives the mock attack in the user'"'"'s regular context of use of the electronic device; receiving, from a sensor, a sensed user action in response to the mock attack, wherein the sensed user action comprises a user interaction with the electronic device; recording the sensed user action; using the sensed user action to determine a susceptibility of the user to a cybersecurity threat; and generating one or more records that include the identifying information relating to the user, the susceptibility of the user to the cybersecurity threat, and the sensed user action in response to the mock attack. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
9. A computer-implemented method of assessing susceptibility of an electronic device user to a cybersecurity threat, the method comprising:
by one or more processors; accessing identifying information relating to a user of an electronic device; selecting a mock attack; causing the mock attack to be deployed to the user so that the user receives the mock attack in the user'"'"'s regular context of use of the electronic device; by a sensor, sensing whether there is a user action that comprises a user interaction with the electronic device in response to the mock attack; detecting, by the sensor, a lack of the user action in response to the mock attack, wherein the user action comprises a user interaction with the electronic device; using the lack of the user action to determine a susceptibility of the user to a cybersecurity threat; and generating one or more records that include the identifying information relating to the user and the susceptibility of the user to the cybersecurity threat. - View Dependent Claims (10, 11, 12, 13, 14)
-
15. A computer-implemented method of providing cybersecurity training to a user of an electronic device, the method comprising:
by one or more processors;
selecting a mock attack;
causing the mock attack to be deployed to the user so that the user receives the mock attack in a regular context of use of the user;receiving, from a sensor, a sensed user action in response to the mock attack; and implementing a policy manager that; uses the sensed user action to determine a susceptibility of the user to a cybersecurity threat; based on the susceptibility of the user to the cybersecurity threat, selects a training intervention that corresponds to the sensed action; and causes the selected training intervention to be presented to the user. - View Dependent Claims (16, 17, 18, 19)
Specification