Mock attack cybersecurity training system and methods

A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user&#...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Hauptverfasser: Sadeh-Koniecpol Norman, Hong Jason, Wescoe Kurt, Brubaker Jason
Format: Patent
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title
container_volume
creator Sadeh-Koniecpol Norman
Hong Jason
Wescoe Kurt
Brubaker Jason
description A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's regular context of use of the electronic device. When a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and use the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user's susceptibility to a cybersecurity threat.
format Patent
fullrecord <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9824609B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9824609B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9824609B23</originalsourceid><addsrcrecordid>eNrjZDD1zU_OVkgsKUkEUsmVSalFxanJpUWZJZUKJUWJmXmZeekKxZXFJam5Col5KQq5qSUZ-SnFPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7UkPjTY0sLIxMzA0snImAglAERCLXE</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Mock attack cybersecurity training system and methods</title><source>esp@cenet</source><creator>Sadeh-Koniecpol Norman ; Hong Jason ; Wescoe Kurt ; Brubaker Jason</creator><creatorcontrib>Sadeh-Koniecpol Norman ; Hong Jason ; Wescoe Kurt ; Brubaker Jason</creatorcontrib><description>A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's regular context of use of the electronic device. When a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and use the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user's susceptibility to a cybersecurity threat.</description><language>eng</language><subject>ADVERTISING ; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND,DEAF OR MUTE ; CALCULATING ; COMPUTING ; COUNTING ; CRYPTOGRAPHY ; DIAGRAMS ; DISPLAY ; EDUCATION ; EDUCATIONAL OR DEMONSTRATION APPLIANCES ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; GLOBES ; PHYSICS ; PLANETARIA ; SEALS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20171121&amp;DB=EPODOC&amp;CC=US&amp;NR=9824609B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&amp;date=20171121&amp;DB=EPODOC&amp;CC=US&amp;NR=9824609B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Sadeh-Koniecpol Norman</creatorcontrib><creatorcontrib>Hong Jason</creatorcontrib><creatorcontrib>Wescoe Kurt</creatorcontrib><creatorcontrib>Brubaker Jason</creatorcontrib><title>Mock attack cybersecurity training system and methods</title><description>A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's regular context of use of the electronic device. When a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and use the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user's susceptibility to a cybersecurity threat.</description><subject>ADVERTISING</subject><subject>APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND,DEAF OR MUTE</subject><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>CRYPTOGRAPHY</subject><subject>DIAGRAMS</subject><subject>DISPLAY</subject><subject>EDUCATION</subject><subject>EDUCATIONAL OR DEMONSTRATION APPLIANCES</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>GLOBES</subject><subject>PHYSICS</subject><subject>PLANETARIA</subject><subject>SEALS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDD1zU_OVkgsKUkEUsmVSalFxanJpUWZJZUKJUWJmXmZeekKxZXFJam5Col5KQq5qSUZ-SnFPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7UkPjTY0sLIxMzA0snImAglAERCLXE</recordid><startdate>20171121</startdate><enddate>20171121</enddate><creator>Sadeh-Koniecpol Norman</creator><creator>Hong Jason</creator><creator>Wescoe Kurt</creator><creator>Brubaker Jason</creator><scope>EVB</scope></search><sort><creationdate>20171121</creationdate><title>Mock attack cybersecurity training system and methods</title><author>Sadeh-Koniecpol Norman ; Hong Jason ; Wescoe Kurt ; Brubaker Jason</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9824609B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>ADVERTISING</topic><topic>APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND,DEAF OR MUTE</topic><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>CRYPTOGRAPHY</topic><topic>DIAGRAMS</topic><topic>DISPLAY</topic><topic>EDUCATION</topic><topic>EDUCATIONAL OR DEMONSTRATION APPLIANCES</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>GLOBES</topic><topic>PHYSICS</topic><topic>PLANETARIA</topic><topic>SEALS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>Sadeh-Koniecpol Norman</creatorcontrib><creatorcontrib>Hong Jason</creatorcontrib><creatorcontrib>Wescoe Kurt</creatorcontrib><creatorcontrib>Brubaker Jason</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sadeh-Koniecpol Norman</au><au>Hong Jason</au><au>Wescoe Kurt</au><au>Brubaker Jason</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Mock attack cybersecurity training system and methods</title><date>2017-11-21</date><risdate>2017</risdate><abstract>A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's regular context of use of the electronic device. When a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and use the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user's susceptibility to a cybersecurity threat.</abstract><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier
ispartof
issn
language eng
recordid cdi_epo_espacenet_US9824609B2
source esp@cenet
subjects ADVERTISING
APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND,DEAF OR MUTE
CALCULATING
COMPUTING
COUNTING
CRYPTOGRAPHY
DIAGRAMS
DISPLAY
EDUCATION
EDUCATIONAL OR DEMONSTRATION APPLIANCES
ELECTRIC COMMUNICATION TECHNIQUE
ELECTRIC DIGITAL DATA PROCESSING
ELECTRICITY
GLOBES
PHYSICS
PLANETARIA
SEALS
TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION
WIRELESS COMMUNICATIONS NETWORKS
title Mock attack cybersecurity training system and methods
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T23%3A47%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Sadeh-Koniecpol%20Norman&rft.date=2017-11-21&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9824609B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true