Context-aware cybersecurity training systems, apparatuses, and methods
First Claim
1. A computer-implemented method for assessing cybersecurity training needs, comprising:
- by a sensor, sensing data corresponding to at least one action performed by a user with respect to a user computing device; and
by a computer system comprising a processor, executing computer-readable programming instructions that cause the computer system to;
access a data storage device that stores a training needs model,map the sensed data to the training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model,in response to determining that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, anduse the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario for which the user is at risk.
7 Assignments
0 Petitions
Accused Products
Abstract
A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model. When the system determines that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, and use the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario.
209 Citations
30 Claims
-
1. A computer-implemented method for assessing cybersecurity training needs, comprising:
-
by a sensor, sensing data corresponding to at least one action performed by a user with respect to a user computing device; and by a computer system comprising a processor, executing computer-readable programming instructions that cause the computer system to; access a data storage device that stores a training needs model, map the sensed data to the training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, in response to determining that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, and use the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario for which the user is at risk. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A system for assessing cybersecurity training needs, comprising:
-
a sensor that is configured to sense data corresponding to at least one action performed by a user with respect to a user computing device; a data storage device that stores a training needs model; a processor; and a computer-readable non-transitory memory containing programming instructions that are configured to cause the processor to; map the sensed data to the training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, in response to determining that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, and use the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario for which the user is at risk. - View Dependent Claims (17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30)
-
Specification