Mock attack cybersecurity training system and methods
A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user...
Gespeichert in:
Hauptverfasser: | , , , |
---|---|
Format: | Patent |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | |
container_volume | |
creator | Sadeh-Koniecpol Norman Hong Jason Wescoe Kurt Brubaker Jason |
description | A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's regular context of use of the electronic device. When a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and use the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user's susceptibility to a cybersecurity threat. |
format | Patent |
fullrecord | <record><control><sourceid>epo_EVB</sourceid><recordid>TN_cdi_epo_espacenet_US9824609B2</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>US9824609B2</sourcerecordid><originalsourceid>FETCH-epo_espacenet_US9824609B23</originalsourceid><addsrcrecordid>eNrjZDD1zU_OVkgsKUkEUsmVSalFxanJpUWZJZUKJUWJmXmZeekKxZXFJam5Col5KQq5qSUZ-SnFPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7UkPjTY0sLIxMzA0snImAglAERCLXE</addsrcrecordid><sourcetype>Open Access Repository</sourcetype><iscdi>true</iscdi><recordtype>patent</recordtype></control><display><type>patent</type><title>Mock attack cybersecurity training system and methods</title><source>esp@cenet</source><creator>Sadeh-Koniecpol Norman ; Hong Jason ; Wescoe Kurt ; Brubaker Jason</creator><creatorcontrib>Sadeh-Koniecpol Norman ; Hong Jason ; Wescoe Kurt ; Brubaker Jason</creatorcontrib><description>A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's regular context of use of the electronic device. When a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and use the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user's susceptibility to a cybersecurity threat.</description><language>eng</language><subject>ADVERTISING ; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND,DEAF OR MUTE ; CALCULATING ; COMPUTING ; COUNTING ; CRYPTOGRAPHY ; DIAGRAMS ; DISPLAY ; EDUCATION ; EDUCATIONAL OR DEMONSTRATION APPLIANCES ; ELECTRIC COMMUNICATION TECHNIQUE ; ELECTRIC DIGITAL DATA PROCESSING ; ELECTRICITY ; GLOBES ; PHYSICS ; PLANETARIA ; SEALS ; TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION ; WIRELESS COMMUNICATIONS NETWORKS</subject><creationdate>2017</creationdate><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20171121&DB=EPODOC&CC=US&NR=9824609B2$$EHTML$$P50$$Gepo$$Hfree_for_read</linktohtml><link.rule.ids>230,308,776,881,25542,76289</link.rule.ids><linktorsrc>$$Uhttps://worldwide.espacenet.com/publicationDetails/biblio?FT=D&date=20171121&DB=EPODOC&CC=US&NR=9824609B2$$EView_record_in_European_Patent_Office$$FView_record_in_$$GEuropean_Patent_Office$$Hfree_for_read</linktorsrc></links><search><creatorcontrib>Sadeh-Koniecpol Norman</creatorcontrib><creatorcontrib>Hong Jason</creatorcontrib><creatorcontrib>Wescoe Kurt</creatorcontrib><creatorcontrib>Brubaker Jason</creatorcontrib><title>Mock attack cybersecurity training system and methods</title><description>A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's regular context of use of the electronic device. When a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and use the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user's susceptibility to a cybersecurity threat.</description><subject>ADVERTISING</subject><subject>APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND,DEAF OR MUTE</subject><subject>CALCULATING</subject><subject>COMPUTING</subject><subject>COUNTING</subject><subject>CRYPTOGRAPHY</subject><subject>DIAGRAMS</subject><subject>DISPLAY</subject><subject>EDUCATION</subject><subject>EDUCATIONAL OR DEMONSTRATION APPLIANCES</subject><subject>ELECTRIC COMMUNICATION TECHNIQUE</subject><subject>ELECTRIC DIGITAL DATA PROCESSING</subject><subject>ELECTRICITY</subject><subject>GLOBES</subject><subject>PHYSICS</subject><subject>PLANETARIA</subject><subject>SEALS</subject><subject>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</subject><subject>WIRELESS COMMUNICATIONS NETWORKS</subject><fulltext>true</fulltext><rsrctype>patent</rsrctype><creationdate>2017</creationdate><recordtype>patent</recordtype><sourceid>EVB</sourceid><recordid>eNrjZDD1zU_OVkgsKUkEUsmVSalFxanJpUWZJZUKJUWJmXmZeekKxZXFJam5Col5KQq5qSUZ-SnFPAysaYk5xam8UJqbQcHNNcTZQze1ID8-tbggMTk1L7UkPjTY0sLIxMzA0snImAglAERCLXE</recordid><startdate>20171121</startdate><enddate>20171121</enddate><creator>Sadeh-Koniecpol Norman</creator><creator>Hong Jason</creator><creator>Wescoe Kurt</creator><creator>Brubaker Jason</creator><scope>EVB</scope></search><sort><creationdate>20171121</creationdate><title>Mock attack cybersecurity training system and methods</title><author>Sadeh-Koniecpol Norman ; Hong Jason ; Wescoe Kurt ; Brubaker Jason</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-epo_espacenet_US9824609B23</frbrgroupid><rsrctype>patents</rsrctype><prefilter>patents</prefilter><language>eng</language><creationdate>2017</creationdate><topic>ADVERTISING</topic><topic>APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND,DEAF OR MUTE</topic><topic>CALCULATING</topic><topic>COMPUTING</topic><topic>COUNTING</topic><topic>CRYPTOGRAPHY</topic><topic>DIAGRAMS</topic><topic>DISPLAY</topic><topic>EDUCATION</topic><topic>EDUCATIONAL OR DEMONSTRATION APPLIANCES</topic><topic>ELECTRIC COMMUNICATION TECHNIQUE</topic><topic>ELECTRIC DIGITAL DATA PROCESSING</topic><topic>ELECTRICITY</topic><topic>GLOBES</topic><topic>PHYSICS</topic><topic>PLANETARIA</topic><topic>SEALS</topic><topic>TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION</topic><topic>WIRELESS COMMUNICATIONS NETWORKS</topic><toplevel>online_resources</toplevel><creatorcontrib>Sadeh-Koniecpol Norman</creatorcontrib><creatorcontrib>Hong Jason</creatorcontrib><creatorcontrib>Wescoe Kurt</creatorcontrib><creatorcontrib>Brubaker Jason</creatorcontrib><collection>esp@cenet</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sadeh-Koniecpol Norman</au><au>Hong Jason</au><au>Wescoe Kurt</au><au>Brubaker Jason</au><format>patent</format><genre>patent</genre><ristype>GEN</ristype><title>Mock attack cybersecurity training system and methods</title><date>2017-11-21</date><risdate>2017</risdate><abstract>A system assesses the susceptibility of an electronic device user to a cybersecurity threat by identifying information relating to the user of an electronic device, selecting a mock attack, and causing the mock attack to be deployed to the user so that the user receives the mock attack in the user's regular context of use of the electronic device. When a sensor detects a user action that the user has interacted with the electronic device in response to the mock attack, the system will record the sensed user action and use the sensed user action to determine the susceptibility of the user to a cybersecurity threat. In some embodiments, the lack of user action in response to a mock attack also may be used to determine the user's susceptibility to a cybersecurity threat.</abstract><oa>free_for_read</oa></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | |
ispartof | |
issn | |
language | eng |
recordid | cdi_epo_espacenet_US9824609B2 |
source | esp@cenet |
subjects | ADVERTISING APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND,DEAF OR MUTE CALCULATING COMPUTING COUNTING CRYPTOGRAPHY DIAGRAMS DISPLAY EDUCATION EDUCATIONAL OR DEMONSTRATION APPLIANCES ELECTRIC COMMUNICATION TECHNIQUE ELECTRIC DIGITAL DATA PROCESSING ELECTRICITY GLOBES PHYSICS PLANETARIA SEALS TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHICCOMMUNICATION WIRELESS COMMUNICATIONS NETWORKS |
title | Mock attack cybersecurity training system and methods |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-11T23%3A47%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-epo_EVB&rft_val_fmt=info:ofi/fmt:kev:mtx:patent&rft.genre=patent&rft.au=Sadeh-Koniecpol%20Norman&rft.date=2017-11-21&rft_id=info:doi/&rft_dat=%3Cepo_EVB%3EUS9824609B2%3C/epo_EVB%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |