Movatterモバイル変換


[0]ホーム

URL:


US20220013036A1 - Context-Aware Cybersecurity Training Systems, Apparatuses, and Methods - Google Patents

Context-Aware Cybersecurity Training Systems, Apparatuses, and Methods
Download PDF

Info

Publication number
US20220013036A1
US20220013036A1US17/486,014US202117486014AUS2022013036A1US 20220013036 A1US20220013036 A1US 20220013036A1US 202117486014 AUS202117486014 AUS 202117486014AUS 2022013036 A1US2022013036 A1US 2022013036A1
Authority
US
United States
Prior art keywords
user
training
mock
data
trainee
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
US17/486,014
Inventor
Norman Sadeh-Koniecpol
Kurt Wescoe
Jason Brubaker
Jason Hong
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Proofpoint Inc
Original Assignee
Proofpoint Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from US13/442,587external-prioritypatent/US9547998B2/en
Application filed by Proofpoint IncfiledCriticalProofpoint Inc
Priority to US17/486,014priorityCriticalpatent/US20220013036A1/en
Publication of US20220013036A1publicationCriticalpatent/US20220013036A1/en
Pendinglegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A system assesses the susceptibility of an electronic device user to a cybersecurity threat by sensing a user action with respect to the electronic device. The system maps the sensed data to a training needs model to determine whether the sensed data corresponds to a pattern associated with a threat scenario in the training needs model. When the system determines that the sensed data corresponds to a pattern associated with a threat scenario in the training needs model, identify a cybersecurity threat scenario for which the user is at risk, and use the training needs model to estimate susceptibility of the user to the cybersecurity threat scenario.

Description

Claims (21)

24. A computer-implemented method for automatically providing cybersecurity training to a user of an electronic device, the method comprising:
by one or more processors:
receiving historical data for a user of an electronic device;
using the historical data to determine a first susceptibility of the user to a first cybersecurity threat and the historical data to determine a second susceptibility of the user to a second cybersecurity threat;
determining, based on the first susceptibility of the user to the first cybersecurity threat and the second susceptibility of the user to the second cybersecurity threat, that the user is more susceptible to the first cybersecurity threat;
determining an amount of time available to train the user, wherein the amount of time available to train the user indicates that a single training intervention is sufficient to train the user;
based on the determination that the user is more susceptible to the first cybersecurity threat and the amount of time available to train the user, selecting a training intervention, wherein the training intervention corresponds to the first cybersecurity threat; and
causing the selected training intervention to be presented to the user.
32. The method ofclaim 25, further comprising:
establishing known trainee information indicating that the user is a trainee and a second user is a non-trainee;
identifying, based on the trainee information, that the user is a trainee, wherein the first interaction event comprises scanning a mock malicious barcode with the electronic device that causes user identification information for the user to be shared with a policy manager, wherein causing the selected training intervention to be presented to the user is based on identifying that the user is a trainee;
identifying, based on the trainee information and a third interaction event, that the second user is a non-trainee, wherein the third interaction event comprises scanning the mock malicious barcode with a second electronic device that causes user identification information for the second user to be shared with the policy manager; and
based on identifying that the second user is a non-trainee, causing a non-training interface to be presented to the second user.
36. A system comprising:
an analysis host computer comprising a processor and a non-transitory memory storing instructions that, when executed by the processor, cause the analysis host computer to:
receive historical data for a user,
use the historical data to determine a first susceptibility of the user to a first cybersecurity threat and the historical data to determine a second susceptibility of the user to a second cybersecurity threat,
determine, based on the first susceptibility of the user to the first cybersecurity threat and the second susceptibility of the user to the second cybersecurity threat, that the user is more susceptible to the first cybersecurity threat,
determine an amount of time available to train the user, wherein the amount of time available to train the user indicates that a single training intervention is sufficient to train the user,
select, based on the determination that the user is more susceptible to the first cybersecurity threat and the amount of time available to train the user, a training intervention that corresponds to the first cybersecurity threat, and
transmit the selected training intervention to an electronic device.
US17/486,0142011-04-082021-09-27Context-Aware Cybersecurity Training Systems, Apparatuses, and MethodsPendingUS20220013036A1 (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US17/486,014US20220013036A1 (en)2011-04-082021-09-27Context-Aware Cybersecurity Training Systems, Apparatuses, and Methods

Applications Claiming Priority (9)

Application NumberPriority DateFiling DateTitle
US201161473366P2011-04-082011-04-08
US201161473384P2011-04-082011-04-08
US13/442,587US9547998B2 (en)2011-04-082012-04-09Context-aware training systems, apparatuses, and methods
US201361793011P2013-03-152013-03-15
US13/832,070US9280911B2 (en)2011-04-082013-03-15Context-aware training systems, apparatuses, and methods
US14/216,002US9558677B2 (en)2011-04-082014-03-17Mock attack cybersecurity training system and methods
US15/418,867US9870715B2 (en)2011-04-082017-01-30Context-aware cybersecurity training systems, apparatuses, and methods
US15/810,302US11158207B1 (en)2011-04-082017-11-13Context-aware cybersecurity training systems, apparatuses, and methods
US17/486,014US20220013036A1 (en)2011-04-082021-09-27Context-Aware Cybersecurity Training Systems, Apparatuses, and Methods

Related Parent Applications (1)

Application NumberTitlePriority DateFiling Date
US15/810,302ContinuationUS11158207B1 (en)2011-04-082017-11-13Context-aware cybersecurity training systems, apparatuses, and methods

Publications (1)

Publication NumberPublication Date
US20220013036A1true US20220013036A1 (en)2022-01-13

Family

ID=51165415

Family Applications (4)

Application NumberTitlePriority DateFiling Date
US14/216,002ActiveUS9558677B2 (en)2011-04-082014-03-17Mock attack cybersecurity training system and methods
US15/418,867Active2032-06-10US9870715B2 (en)2011-04-082017-01-30Context-aware cybersecurity training systems, apparatuses, and methods
US15/810,302Active2033-08-30US11158207B1 (en)2011-04-082017-11-13Context-aware cybersecurity training systems, apparatuses, and methods
US17/486,014PendingUS20220013036A1 (en)2011-04-082021-09-27Context-Aware Cybersecurity Training Systems, Apparatuses, and Methods

Family Applications Before (3)

Application NumberTitlePriority DateFiling Date
US14/216,002ActiveUS9558677B2 (en)2011-04-082014-03-17Mock attack cybersecurity training system and methods
US15/418,867Active2032-06-10US9870715B2 (en)2011-04-082017-01-30Context-aware cybersecurity training systems, apparatuses, and methods
US15/810,302Active2033-08-30US11158207B1 (en)2011-04-082017-11-13Context-aware cybersecurity training systems, apparatuses, and methods

Country Status (1)

CountryLink
US (4)US9558677B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12346457B1 (en)2024-12-092025-07-01Wiz, Inc.System and method for scanning private code and CI/CD registries

Families Citing this family (184)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US9558677B2 (en)2011-04-082017-01-31Wombat Security Technologies, Inc.Mock attack cybersecurity training system and methods
US9824609B2 (en)2011-04-082017-11-21Wombat Security Technologies, Inc.Mock attack cybersecurity training system and methods
US10749887B2 (en)2011-04-082020-08-18Proofpoint, Inc.Assessing security risks of users in a computing network
US8484741B1 (en)2012-01-272013-07-09Chapman Technology Group, Inc.Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams
IL219597A0 (en)*2012-05-032012-10-31Syndrome X LtdMalicious threat detection, malicious threat prevention, and a learning systems and methods for malicious threat detection and prevention
US9779260B1 (en)2012-06-112017-10-03Dell Software Inc.Aggregation and classification of secure data
US9398038B2 (en)2013-02-082016-07-19PhishMe, Inc.Collaborative phishing attack detection
US8966637B2 (en)2013-02-082015-02-24PhishMe, Inc.Performance benchmarking for simulated phishing attacks
US9356948B2 (en)2013-02-082016-05-31PhishMe, Inc.Collaborative phishing attack detection
US20150287336A1 (en)*2014-04-042015-10-08Bank Of America CorporationAutomated phishing-email training
US20150371547A1 (en)*2014-06-192015-12-24International Business Machines CorporationProviding targeted and personalized education to prevent human errors
US20160004991A1 (en)*2014-07-072016-01-07Lurniture Corp.System and method for delivering sales training videos
US9398029B2 (en)*2014-08-012016-07-19Wombat Security Technologies, Inc.Cybersecurity training system with automated application of branded content
GB2529392B (en)*2014-08-132019-07-10F Secure CorpDetection of webcam abuse
WO2016072790A1 (en)*2014-11-072016-05-12박현수Protective system, device, and method for protecting electronic communication device
US9501647B2 (en)2014-12-132016-11-22Security Scorecard, Inc.Calculating and benchmarking an entity's cybersecurity risk score
US9378364B1 (en)*2014-12-272016-06-28Intel CorporationTechnologies for managing security threats to a computing system utilizing user interactions
AU2016215226A1 (en)2015-02-052017-08-17Phishline, LlcSocial engineering simulation workflow appliance
US9875357B2 (en)2015-02-062018-01-23Qualcomm IncorporatedMethods and systems for detecting fake user interactions with a mobile device for improved malware protection
US10326748B1 (en)2015-02-252019-06-18Quest Software Inc.Systems and methods for event-based authentication
US9619649B1 (en)*2015-03-132017-04-11Symantec CorporationSystems and methods for detecting potentially malicious applications
US10417613B1 (en)2015-03-172019-09-17Quest Software Inc.Systems and methods of patternizing logged user-initiated events for scheduling functions
US10116688B1 (en)2015-03-242018-10-30Symantec CorporationSystems and methods for detecting potentially malicious files
US9990506B1 (en)2015-03-302018-06-05Quest Software Inc.Systems and methods of securing network-accessible peripheral devices
US9798878B1 (en)2015-03-312017-10-24Symantec CorporationSystems and methods for detecting text display manipulation attacks
US10298602B2 (en)*2015-04-102019-05-21Cofense Inc.Suspicious message processing and incident response
US9842220B1 (en)2015-04-102017-12-12Dell Software Inc.Systems and methods of secure self-service access to content
US9641555B1 (en)2015-04-102017-05-02Dell Software Inc.Systems and methods of tracking content-exposure events
US9842218B1 (en)2015-04-102017-12-12Dell Software Inc.Systems and methods of secure self-service access to content
US9906539B2 (en)*2015-04-102018-02-27PhishMe, Inc.Suspicious message processing and incident response
US10621613B2 (en)*2015-05-052020-04-14The Nielsen Company (Us), LlcSystems and methods for monitoring malicious software engaging in online advertising fraud or other form of deceit
CN106302936B (en)*2015-05-182019-10-25腾讯科技(深圳)有限公司A kind of labeling method of user identifier, device and system
US9697018B2 (en)2015-05-292017-07-04International Business Machines CorporationSynthesizing inputs to preserve functionality
US10536352B1 (en)2015-08-052020-01-14Quest Software Inc.Systems and methods for tuning cross-platform data collection
US9781140B2 (en)*2015-08-172017-10-03Paypal, Inc.High-yielding detection of remote abusive content
KR102113587B1 (en)2015-09-242020-05-22서케이든스 코퍼레이션 Mission-based game-implemented cyber education system and method
US10238948B2 (en)2015-09-242019-03-26Circadence CorporationMission-based, game-implemented cyber training system and method
US10672289B2 (en)*2015-09-242020-06-02Circadence CorporationSystem for dynamically provisioning cyber training environments
US12237199B2 (en)*2015-09-242025-02-25Circadence CorporationSystem for dynamically provisioning cyber training environments
US10218588B1 (en)2015-10-052019-02-26Quest Software Inc.Systems and methods for multi-stream performance patternization and optimization of virtual meetings
US10157358B1 (en)2015-10-052018-12-18Quest Software Inc.Systems and methods for multi-stream performance patternization and interval-based prediction
JP2017079042A (en)*2015-10-222017-04-27富士通株式会社Attention alert action support program, attention alert action support device, and attention alert action support method
US10885133B1 (en)*2015-11-112021-01-05TransNexus Financial Strategies, LLCSearch and retrieval data processing system for retrieving classified data for execution against logic rules
US20170169022A1 (en)*2015-12-112017-06-15Quixey, Inc.Generating Software Application Search Results Using Application Connections
US10146879B2 (en)2015-12-112018-12-04Samsung Electronics Co., Ltd.Generating software application search results using application connection keywords
US10079850B1 (en)*2015-12-292018-09-18Symantec CorporationSystems and methods for provisioning cyber security simulation exercises
US10021126B2 (en)2016-02-262018-07-10KnowBe4, Inc.Systems and methods for creating and running heterogeneous phishing attack campaigns
US10142391B1 (en)2016-03-252018-11-27Quest Software Inc.Systems and methods of diagnosing down-layer performance problems via multi-stream performance patternization
US9967268B1 (en)2016-04-192018-05-08Wells Fargo Bank, N.A.Identifying e-mail security threats
US10432656B2 (en)*2016-04-282019-10-01Shevirah Inc.Method and system for assessing data security
US20220245539A1 (en)*2016-06-102022-08-04OneTrust, LLCData processing systems and methods for customizing privacy training
US10172109B2 (en)2016-06-242019-01-01JIO, Inc.Synchronizing location status information in a computing system
US10791429B2 (en)2016-06-242020-09-29JIO, Inc.Communicating location change information in accordance with a reporting approach
US10448215B2 (en)*2016-06-242019-10-15JIO, Inc.Communicating location change information
US9980087B2 (en)*2016-06-242018-05-22JIO, Inc.Establishing location tracking information based on a plurality of locating category options
US9800613B1 (en)2016-06-282017-10-24KnowBe4, Inc.Systems and methods for performing a simulated phishing attack
US10986122B2 (en)*2016-08-022021-04-20Sophos LimitedIdentifying and remediating phishing security weaknesses
WO2018031015A1 (en)*2016-08-112018-02-15Kimberly-Clark Worldwide, Inc.Usb baiting method and design
US10409979B1 (en)*2016-08-152019-09-10Symantec CorporationSystems and methods for preventing addictive application usage
US9912687B1 (en)2016-08-172018-03-06Wombat Security Technologies, Inc.Advanced processing of electronic messages with attachments in a cybersecurity system
US9781149B1 (en)2016-08-172017-10-03Wombat Security Technologies, Inc.Method and system for reducing reporting of non-malicious electronic messages in a cybersecurity system
US9774626B1 (en)2016-08-172017-09-26Wombat Security Technologies, Inc.Method and system for assessing and classifying reported potentially malicious messages in a cybersecurity system
US10454971B2 (en)*2016-09-072019-10-22International Business Machines CorporationManaging privileged system access based on risk assessment
US10735445B2 (en)*2016-09-212020-08-04Cognizant Technology Solutions U.S. CorporationDetecting behavioral anomaly in machine learned rule sets
US10855714B2 (en)2016-10-312020-12-01KnowBe4, Inc.Systems and methods for an artificial intelligence driven agent
CA3042534A1 (en)2016-11-072018-05-11Walmart Apollo, LlcReducing cybersecurity risks when purchasing products over a network
US10171510B2 (en)2016-12-142019-01-01CyberSaint, Inc.System and method for monitoring and grading a cybersecurity framework
US10728262B1 (en)2016-12-212020-07-28Palantir Technologies Inc.Context-aware network-based malicious activity warning systems
US9876753B1 (en)2016-12-222018-01-23Wombat Security Technologies, Inc.Automated message security scanner detection system
US10721262B2 (en)*2016-12-282020-07-21Palantir Technologies Inc.Resource-centric network cyber attack warning system
US10839703B2 (en)*2016-12-302020-11-17Fortinet, Inc.Proactive network security assessment based on benign variants of known threats
US9749360B1 (en)*2017-01-052017-08-29KnowBe4, Inc.Systems and methods for performing simulated phishing attacks using social engineering indicators
US10999308B2 (en)2017-01-302021-05-04Xm Cyber Ltd.Setting-up penetration testing campaigns
JP6679529B2 (en)*2017-04-042020-04-15株式会社東芝 Disability training system, terminal, and disability training program
US9742803B1 (en)2017-04-062017-08-22Knowb4, Inc.Systems and methods for subscription management of specific classification groups based on user's actions
US20180307844A1 (en)2017-04-212018-10-25KnowBe4, Inc.Using smart groups for simulated phishing training and phishing campaigns
WO2018208669A1 (en)*2017-05-082018-11-15KnowBe4, Inc.Systems and methods for providing user interfaces based on actions associated with untrusted emails
US10170112B2 (en)*2017-05-112019-01-01Google LlcDetecting and suppressing voice queries
US10999296B2 (en)2017-05-152021-05-04Forcepoint, LLCGenerating adaptive trust profiles using information derived from similarly situated organizations
IL252455B (en)*2017-05-232018-04-30Gabay ShaiSystem and method for on-premise cyber training
US10243904B1 (en)2017-05-262019-03-26Wombat Security Technologies, Inc.Determining authenticity of reported user action in cybersecurity risk assessment
US11599838B2 (en)2017-06-202023-03-07KnowBe4, Inc.Systems and methods for creating and commissioning a security awareness program
US11343276B2 (en)2017-07-132022-05-24KnowBe4, Inc.Systems and methods for discovering and alerting users of potentially hazardous messages
KR101999148B1 (en)*2017-07-282019-07-11(주)씨드젠System and method for detecting rogue access point and user device and computer program for the same
EP3662400B1 (en)2017-07-312025-02-26Knowbe4, Inc.Method for using attribute data for system protection and security awareness training
US11295010B2 (en)2017-07-312022-04-05KnowBe4, Inc.Systems and methods for using attribute data for system protection and security awareness training
US10708297B2 (en)2017-08-252020-07-07Ecrime Management Strategies, Inc.Security system for detection and mitigation of malicious communications
US12086162B2 (en)*2017-09-142024-09-10Sap SeAggregation and analysis of data based on computational models
US10885808B2 (en)*2017-09-282021-01-05International Business Machines CorporationCurating tutorials based on historic user data
EP3711279A1 (en)2017-11-152020-09-23XM Cyber Ltd.Selectively choosing between actual-attack and simulation/evaluation for validating a vulnerability of a network node during execution of a penetration testing campaign
US10715549B2 (en)2017-12-012020-07-14KnowBe4, Inc.Systems and methods for AIDA based role models
US10673895B2 (en)2017-12-012020-06-02KnowBe4, Inc.Systems and methods for AIDA based grouping
US10839083B2 (en)*2017-12-012020-11-17KnowBe4, Inc.Systems and methods for AIDA campaign controller intelligent records
US10679164B2 (en)2017-12-012020-06-09KnowBe4, Inc.Systems and methods for using artificial intelligence driven agent to automate assessment of organizational vulnerabilities
US10257225B1 (en)2017-12-012019-04-09KnowBe4, Inc.Systems and methods for artificial intelligence driven agent campaign controller
US10581910B2 (en)2017-12-012020-03-03KnowBe4, Inc.Systems and methods for AIDA based A/B testing
US11777986B2 (en)2017-12-012023-10-03KnowBe4, Inc.Systems and methods for AIDA based exploit selection
US10348761B2 (en)2017-12-012019-07-09KnowBe4, Inc.Systems and methods for situational localization of AIDA
US10313387B1 (en)2017-12-012019-06-04KnowBe4, Inc.Time based triggering of dynamic templates
US10348762B2 (en)2017-12-012019-07-09KnowBe4, Inc.Systems and methods for serving module
US10009375B1 (en)2017-12-012018-06-26KnowBe4, Inc.Systems and methods for artificial model building techniques
US10812527B2 (en)2017-12-012020-10-20KnowBe4, Inc.Systems and methods for aida based second chance
US10812510B2 (en)*2018-01-122020-10-20The Boeing CompanyAnticipatory cyber defense
US10924517B2 (en)2018-02-072021-02-16Sophos LimitedProcessing network traffic based on assessed security weaknesses
US10237302B1 (en)*2018-03-202019-03-19KnowBe4, Inc.System and methods for reverse vishing and point of failure remedial training
KR102074353B1 (en)*2018-04-132020-02-06한국전자통신연구원Apparatus and method for providing cyber security real-time training in control system field
US10931702B2 (en)*2018-04-242021-02-23Cyberfortress, Inc.Vulnerability profiling based on time series analysis of data streams
EP3785152A4 (en)*2018-04-272021-12-22Dcoya Ltd. SYSTEM AND PROCEDURE FOR SECURING ELECTRONIC CORRESPONDENCE
US10673876B2 (en)2018-05-162020-06-02KnowBe4, Inc.Systems and methods for determining individual and group risk scores
CN108768989A (en)*2018-05-182018-11-06刘勇It is a kind of using the APT attack defense methods of mimicry technology, system
US20200026742A1 (en)*2018-05-282020-01-23Open Invention Network LlcIntegrating communications into a social graph
DE102018113994A1 (en)2018-06-122019-12-12IT-Seal GmbH A method of determining a level of deception for a single phishing attack against a person
US10749890B1 (en)2018-06-192020-08-18Architecture Technology CorporationSystems and methods for improving the ranking and prioritization of attack-related events
US10771485B2 (en)2018-07-122020-09-08Bank Of America CorporationSystems and methods for cross-channel electronic communication security with dynamic targeting
US10917439B2 (en)2018-07-162021-02-09Securityadvisor Technologies, Inc.Contextual security behavior management and change execution
US20220070216A1 (en)*2018-07-252022-03-03Cyren, Inc.Phishing detection system and method of use
US10540493B1 (en)2018-09-192020-01-21KnowBe4, Inc.System and methods for minimizing organization risk from users associated with a password breach
US10673894B2 (en)2018-09-262020-06-02KnowBe4, Inc.System and methods for spoofed domain identification and user training
US10419219B1 (en)2018-10-082019-09-17Capital One Services, LlcSystem, method, and computer-accessible medium for actionable push notifications
US11962605B2 (en)*2018-10-112024-04-16Nippon Telegraph And Telephone CorporationInformation processing apparatus, data analysis method and program
US11257393B2 (en)*2018-10-262022-02-22Circadence CorporationMethod and system for evaluating individual and group cyber threat awareness
US10979448B2 (en)2018-11-022021-04-13KnowBe4, Inc.Systems and methods of cybersecurity attack simulation for incident response training and awareness
US10992701B2 (en)2018-11-202021-04-27Bank Of America CorporationSystems and methods for dynamic targeting of secure repurposed cross-channel electronic communications
US10812507B2 (en)2018-12-152020-10-20KnowBe4, Inc.System and methods for efficient combining of malware detection rules
GB201820853D0 (en)*2018-12-202019-02-06Palantir Technologies IncDetection of vulnerabilities in a computer network
US11429713B1 (en)*2019-01-242022-08-30Architecture Technology CorporationArtificial intelligence modeling for cyber-attack simulation protocols
US11128654B1 (en)2019-02-042021-09-21Architecture Technology CorporationSystems and methods for unified hierarchical cybersecurity
US12375502B2 (en)*2019-02-082025-07-29Fortinet, Inc.Providing secure data-replication between a master node and tenant nodes of a multi-tenancy architecture
US11283827B2 (en)2019-02-282022-03-22Xm Cyber Ltd.Lateral movement strategy during penetration testing of a networked system
AU2020262970A1 (en)*2019-04-232021-11-11Commonwealth Scientific And Industrial Research OrganisationMitigation of phishing risk
US11108821B2 (en)2019-05-012021-08-31KnowBe4, Inc.Systems and methods for use of address fields in a simulated phishing attack
US11206281B2 (en)2019-05-082021-12-21Xm Cyber Ltd.Validating the use of user credentials in a penetration testing campaign
US11403405B1 (en)2019-06-272022-08-02Architecture Technology CorporationPortable vulnerability identification tool for embedded non-IP devices
US11281776B2 (en)*2019-07-012022-03-22Paypal, Inc.Detection of fraudulent displayable code data during device capture
US10637883B1 (en)2019-07-042020-04-28Xm Cyber Ltd.Systems and methods for determining optimal remediation recommendations in penetration testing
US11240272B2 (en)*2019-07-242022-02-01Bank Of America CorporationUser responses to cyber security threats
US10880326B1 (en)2019-08-012020-12-29Xm Cyber Ltd.Systems and methods for determining an opportunity for node poisoning in a penetration testing campaign, based on actual network traffic
US11411978B2 (en)*2019-08-072022-08-09CyberConIQ, Inc.System and method for implementing discriminated cybersecurity interventions
US11509642B2 (en)*2019-08-212022-11-22Truist BankLocation-based mobile device authentication
US11489868B2 (en)*2019-09-052022-11-01Proofpoint, Inc.Dynamically initiating and managing automated spear phishing in enterprise computing environments
US11488493B2 (en)2019-09-122022-11-01EC-Council International LimitedMulti-dimensional cybersecurity skills assessment method and system
US11444974B1 (en)2019-10-232022-09-13Architecture Technology CorporationSystems and methods for cyber-physical threat modeling
US11316902B2 (en)*2019-10-312022-04-26Dell Products, L.P.Systems and methods for securing a dynamic workspace in an enterprise productivity ecosystem
US11005878B1 (en)2019-11-072021-05-11Xm Cyber Ltd.Cooperation between reconnaissance agents in penetration testing campaigns
US11503075B1 (en)2020-01-142022-11-15Architecture Technology CorporationSystems and methods for continuous compliance of nodes
US11575700B2 (en)2020-01-272023-02-07Xm Cyber Ltd.Systems and methods for displaying an attack vector available to an attacker of a networked system
US11316886B2 (en)*2020-01-312022-04-26International Business Machines CorporationPreventing vulnerable configurations in sensor-based devices
US10945051B1 (en)2020-04-062021-03-09Bank Of America CorporationSystem and method for intentionally distorting digital media to reduce the accuracy of generative machine learning algorithms
US11582256B2 (en)2020-04-062023-02-14Xm Cyber Ltd.Determining multiple ways for compromising a network node in a penetration testing campaign
US20240179175A1 (en)*2020-04-102024-05-30AttackIQ, Inc.System and method for emulating a known attack on a target computer network
US20240179174A1 (en)*2020-04-102024-05-30AttackIQ, Inc.System and method for emulating a known attack on a target computer network
US11799878B2 (en)2020-04-152023-10-24T-Mobile Usa, Inc.On-demand software-defined security service orchestration for a 5G wireless network
US11444980B2 (en)2020-04-152022-09-13T-Mobile Usa, Inc.On-demand wireless device centric security for a 5G wireless network
US11070982B1 (en)2020-04-152021-07-20T-Mobile Usa, Inc.Self-cleaning function for a network access node of a network
US11824881B2 (en)2020-04-152023-11-21T-Mobile Usa, Inc.On-demand security layer for a 5G wireless network
US11115824B1 (en)2020-05-142021-09-07T-Mobile Usa, Inc.5G cybersecurity protection system
US11057774B1 (en)2020-05-142021-07-06T-Mobile Usa, Inc.Intelligent GNODEB cybersecurity protection system
US11206542B2 (en)2020-05-142021-12-21T-Mobile Usa, Inc.5G cybersecurity protection system using personalized signatures
US20210390510A1 (en)*2020-06-162021-12-16Proofpoint, Inc.Dynamically Providing Cybersecurity Training Based on User-Specific Threat Information
EP4189569B1 (en)*2020-07-282025-09-24OneTrust LLCSystems and methods for automatically blocking the use of tracking tools
US11496514B2 (en)*2020-07-312022-11-08KnowBe4, Inc.Systems and methods for security awareness using ad-based simulated phishing attacks
EP4172819A4 (en)*2020-09-012024-07-10Thomson Reuters Enterprise Centre GmbHSystem and method for conducting social engineering red team campaigns
US11606694B2 (en)2020-10-082023-03-14Surendra GoelSystem that provides cybersecurity in a home or office by interacting with internet of things devices and other devices
KR20220062951A (en)2020-11-092022-05-17삼성전자주식회사Electronic device and method for managing contacts thereof
CN112634696B (en)*2020-12-212023-01-31贝壳技术有限公司Fault positioning exercise method and device, electronic equipment and storage medium
CN112668913B (en)*2020-12-312024-05-31深圳前海微众银行股份有限公司Network construction method, device, equipment and storage medium based on federal learning
US11909746B2 (en)*2021-02-042024-02-20Dell Products L.P.Multi-path user authentication and threat detection system and related methods
FR3119699A1 (en)*2021-02-092022-08-12Thales SKILLS ASSESSMENT SYSTEM AND PROCEDURE
US11882148B1 (en)*2021-03-232024-01-23Trend Micro IncorporatedAutomated mitigation of cyber threats using a semantic cybersecurity database
US12034768B2 (en)2021-04-142024-07-09Bank Of America CorporationInformation security system and method for phishing domain detection
US12028373B2 (en)2021-04-142024-07-02Bank Of America CorporationInformation security system and method for preventing communications from detected phishing domains
US12008379B2 (en)2021-05-142024-06-11Samsung Electronics Co., Ltd.Automotive image sensor, image processing system including the same and operating method thereof
US11914709B2 (en)*2021-07-202024-02-27Bank Of America CorporationHybrid machine learning and knowledge graph approach for estimating and mitigating the spread of malicious software
US12058163B2 (en)2021-08-102024-08-06CyberSaint, Inc.Systems, media, and methods for utilizing a crosswalk algorithm to identify controls across frameworks, and for utilizing identified controls to generate cybersecurity risk assessments
CN114143044B (en)*2021-11-102023-10-31广州大学Network project recommendation method, device, equipment and storage medium
US12388811B2 (en)*2021-12-222025-08-12Mcafee, LlcDeterministic hash to secure personal data and passwords
WO2023166614A1 (en)*2022-03-022023-09-07日本電気株式会社Information processing device, information processing method, and computer-readable recording medium
US12407723B2 (en)*2022-03-142025-09-02Ironvest, Inc.System, device, and method of protecting users and online accounts against attacks that utilize SIM swap scams
CN114679327B (en)*2022-04-062024-06-21网络通信与安全紫金山实验室Network attack level determination method, device, computer equipment and storage medium
US20230396643A1 (en)*2022-06-072023-12-07Evolve Security, LLCLive exploitation feed on penetration testing portal
US12423428B2 (en)*2022-12-212025-09-23Dtex Systems, Inc.Method and system for inferring document sensitivity
TWI858869B (en)*2023-08-162024-10-11臺灣中小企業銀行股份有限公司System and method for counterfeit detection of applications on ios
CN119906572A (en)*2025-01-172025-04-29烽火通信科技股份有限公司 Device protection method and computer readable storage medium
US12401680B1 (en)*2025-05-062025-08-26U.S. Bancorp, National AssociationAgentic on-device adaptation for increasing node efficiency by accommodating distribution shifts

Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040148253A1 (en)*2001-04-232004-07-29Young-Cheol ShinElectronic settlement system, electronic settlement method and cash paying method using lcd barcode display on mobile terminal
US20040208307A1 (en)*1997-04-112004-10-21Walker Jay S.System and method for call routing and enabling interaction between callers with calls positioned in a queue
US20050158697A1 (en)*2004-01-152005-07-21Integrity InteractiveSystem and method for providing customized, effective, risk based ethics and compliance training and information using a network
US20060047544A1 (en)*2004-09-012006-03-02Habon Michael WSoftware training method and apparatus
US20060166174A1 (en)*2005-01-212006-07-27Rowe T PPredictive artificial intelligence and pedagogical agent modeling in the cognitive imprinting of knowledge and skill domains
US20060233346A1 (en)*1999-11-162006-10-19Knowlagent, Inc.Method and system for prioritizing performance interventions
US20070033639A1 (en)*2004-12-022007-02-08Microsoft CorporationPhishing Detection, Prevention, and Notification
US20070201679A1 (en)*2004-10-012007-08-30Knowlagent, Inc.Method and system for assessing and deploying personnel for roles in a contact center
US20080286737A1 (en)*2003-04-022008-11-20Planetii Usa Inc.Adaptive Engine Logic Used in Training Academic Proficiency
US7841008B1 (en)*2006-03-312010-11-23Symantec CorporationThreat personalization

Family Cites Families (110)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US6324647B1 (en)1999-08-312001-11-27Michel K. Bowman-AmuahSystem, method and article of manufacture for security management in a development architecture framework
US6954858B1 (en)1999-12-222005-10-11Kimberly Joyce WelbornComputer virus avoidance system and mechanism
US20110238855A1 (en)2000-09-252011-09-29Yevgeny KorsunskyProcessing data flows with a data flow processor
US7092861B1 (en)2000-11-022006-08-15Koninklijke Philips Electronics N.V.Visual anti-virus in a network control environment
US8677505B2 (en)*2000-11-132014-03-18Digital Doors, Inc.Security system with extraction, reconstruction and secure recovery and storage of data
US20020066028A1 (en)2000-11-302002-05-30Welborn Christopher MichaelComputer virus avoidance system and mechanism using website
US20020091940A1 (en)2001-01-052002-07-11Welborn Christopher MichaelE-mail user behavior modification system and mechanism for computer virus avoidance
US7325252B2 (en)*2001-05-182008-01-29Achilles Guard Inc.Network security testing
US6634887B1 (en)2001-06-192003-10-21Carnegie Mellon UniversityMethods and systems for tutoring using a tutorial model with interactive dialog
US8560709B1 (en)2004-02-252013-10-15F5 Networks, Inc.System and method for dynamic policy based access over a virtual private network
WO2003065177A2 (en)*2002-02-012003-08-07John FairweatherSystem and method for navigating data
US6914975B2 (en)*2002-02-212005-07-05Sbc Properties, L.P.Interactive dialog-based training method
US7139798B2 (en)*2002-05-172006-11-21Groove Networks, Inc.Method and apparatus for connecting a secure peer-to-peer collaboration system to an external system
US20040107345A1 (en)2002-10-212004-06-03Brandt David D.System and methodology providing automation security protocols and intrusion detection in an industrial controller environment
US7353533B2 (en)2002-12-182008-04-01Novell, Inc.Administration of protection of data accessible by a mobile device
US9076132B2 (en)*2003-11-072015-07-07Emc CorporationSystem and method of addressing email and electronic communication fraud
US20050183143A1 (en)2004-02-132005-08-18Anderholm Eric J.Methods and systems for monitoring user, application or device activity
US7457823B2 (en)2004-05-022008-11-25Markmonitor Inc.Methods and systems for analyzing data related to possible online fraud
US7603705B2 (en)*2004-05-042009-10-13Next It CorporationMethods and systems for enforcing network and computer use policy
US7665119B2 (en)2004-09-032010-02-16Secure Elements, Inc.Policy-based selection of remediation
US8402528B1 (en)2004-08-092013-03-19Symantec CorporationPortable firewall adapter
US7941856B2 (en)*2004-12-062011-05-10Wisconsin Alumni Research FoundationSystems and methods for testing and evaluating an intrusion detection system
US8266320B1 (en)*2005-01-272012-09-11Science Applications International CorporationComputer network defense
US8793795B1 (en)2005-01-282014-07-29Intelligent Computer Solutions, Inc.Computer forensic tool
WO2006093917A2 (en)2005-02-282006-09-08Trust DigitalMobile data security system and methods
US7761618B2 (en)2005-03-252010-07-20Microsoft CorporationUsing a USB host controller security extension for controlling changes in and auditing USB topology
US8438499B2 (en)*2005-05-032013-05-07Mcafee, Inc.Indicating website reputations during user interactions
US8046374B1 (en)*2005-05-062011-10-25Symantec CorporationAutomatic training of a database intrusion detection system
US7486666B2 (en)2005-07-282009-02-03Symbol Technologies, Inc.Rogue AP roaming prevention
US9055093B2 (en)*2005-10-212015-06-09Kevin R. BordersMethod, system and computer program product for detecting at least one of security threats and undesirable computer files
US8146164B2 (en)2006-01-242012-03-27Eshun Kobi OMethod and apparatus for thwarting spyware
US20070180525A1 (en)*2006-01-302007-08-02Bagnall Robert JSecurity system and method
US20070271613A1 (en)*2006-02-162007-11-22Joyce James BMethod and Apparatus for Heuristic/Deterministic Finite Automata
US8478860B2 (en)2006-03-142013-07-02Strong Bear L.L.C.Device detection system for monitoring use of removable media in networked computers
US7530105B2 (en)*2006-03-212009-05-0521St Century Technologies, Inc.Tactical and strategic attack detection and prediction
JP2007287124A (en)2006-04-182007-11-01Softrun IncPhishing prevention method through analysis of internet website to be accessed and storage medium storing computer program for executing its method
US8763103B2 (en)*2006-04-212014-06-24The Trustees Of Columbia University In The City Of New YorkSystems and methods for inhibiting attacks on applications
WO2007143011A2 (en)*2006-05-312007-12-13The Trustees Of Columbia University In The City Ofnew YorkSystems, methods, and media for generating bait information for trap-based defenses
US8220047B1 (en)2006-08-092012-07-10Google Inc.Anti-phishing system and method
US8903365B2 (en)2006-08-182014-12-02Ca, Inc.Mobile device management
US8457594B2 (en)2006-08-252013-06-04Qwest Communications International Inc.Protection against unauthorized wireless access points
US8782745B2 (en)2006-08-252014-07-15Qwest Communications International Inc.Detection of unauthorized wireless access points
US20080167920A1 (en)*2006-11-292008-07-10Robert SchmidtMethods and apparatus for developing cyber defense processes and a cadre of expertise
US8468244B2 (en)2007-01-052013-06-18Digital Doors, Inc.Digital information infrastructure and method for security designated data and with granular data stores
US20080244715A1 (en)*2007-03-272008-10-02Tim PedoneMethod and apparatus for detecting and reporting phishing attempts
WO2008119078A2 (en)2007-03-282008-10-02Breakthrough Performance Technologies, LlcSystems and methods for computerized interactive training
US9118665B2 (en)2007-04-182015-08-25Imation Corp.Authentication system and method
US8205255B2 (en)*2007-05-142012-06-19Cisco Technology, Inc.Anti-content spoofing (ACS)
US20080288330A1 (en)2007-05-142008-11-20Sailpoint Technologies, Inc.System and method for user access risk scoring
US8464346B2 (en)*2007-05-242013-06-11Iviz Techno Solutions Pvt. LtdMethod and system simulating a hacking attack on a network
US8533847B2 (en)2007-05-242013-09-10Sandisk Il Ltd.Apparatus and method for screening new data without impacting download speed
US9367484B2 (en)2007-06-012016-06-14Linda R. StilwellSystem and apparatus for controlling use of mass storage devices
JP5112751B2 (en)2007-06-052013-01-09株式会社日立ソリューションズ Self-inspection system for security measures
US8608487B2 (en)2007-11-292013-12-17Bank Of America CorporationPhishing redirect for consumer education: fraud detection
US7880591B2 (en)2008-02-012011-02-01Apple Inc.Consumer abuse detection system and method
US8560864B2 (en)2008-03-262013-10-15Fego Precision Industrial Co., Ltd.Firewall for removable mass storage devices
US9031536B2 (en)2008-04-022015-05-12Yougetitback LimitedMethod for mitigating the unauthorized use of a device
US8423483B2 (en)*2008-05-162013-04-16Carnegie Mellon UniversityUser-controllable learning of policies
US8341729B2 (en)2008-06-032012-12-25Ca, Inc.Hardware access and monitoring control
US20090319247A1 (en)2008-06-182009-12-24Eads Na Defense Security And Systems Solutions IncSystems and Methods for A Simulated Network Environment and Operation Thereof
US8918872B2 (en)2008-06-272014-12-23Mcafee, Inc.System, method, and computer program product for reacting in response to a detection of an attempt to store a configuration file and an executable file on a removable device
US11461785B2 (en)*2008-07-102022-10-04Ron M. RedlichSystem and method to identify, classify and monetize information as an intangible asset and a production model based thereon
MX2011001060A (en)*2008-07-282011-07-29Breakthrough Performancetech LlcSystems and methods for computerized interactive skill training.
US8769684B2 (en)*2008-12-022014-07-01The Trustees Of Columbia University In The City Of New YorkMethods, systems, and media for masquerade attack detection by monitoring computer user behavior
US8448245B2 (en)*2009-01-172013-05-21Stopthehacker.com, Jaal LLCAutomated identification of phishing, phony and malicious web sites
US20100192201A1 (en)*2009-01-292010-07-29Breach Security, Inc.Method and Apparatus for Excessive Access Rate Detection
WO2010105184A2 (en)2009-03-132010-09-16Breach Security , Inc.A method and apparatus for phishing and leeching vulnerability detection
US9015789B2 (en)2009-03-172015-04-21Sophos LimitedComputer security lock down methods
US9426179B2 (en)2009-03-172016-08-23Sophos LimitedProtecting sensitive information from a secure data store
US8468279B2 (en)2009-03-312013-06-18Intel CorporationPlatform based verification of contents of input-output devices
US8423791B1 (en)2009-08-072013-04-16Google Inc.Location data quarantine system
US8707180B2 (en)2009-08-172014-04-22The Board Of Trustees Of The University Of IllinoisSystem for cyber investigation and data management
US8719925B1 (en)2009-08-252014-05-06Sandia CorporationContent-addressable memory based enforcement of configurable policies
EP3009941B1 (en)2009-12-142017-07-26Citrix Systems Inc.Methods and systems for communicating between trusted and non-trusted virtual machines
US10282702B2 (en)2010-01-042019-05-07Bank Of America CorporationDynamic employee security risk scoring
WO2011097294A1 (en)2010-02-022011-08-11Legal Digital ServicesDigital forensic acquisition kit and methods of use thereof
US8955109B1 (en)2010-04-302015-02-10Symantec CorporationEducating computer users concerning social engineering security threats
KR101089023B1 (en)2010-08-062011-12-01삼성에스디에스 주식회사 Smart card, and anti-virus system and scanning method using same
WO2012068255A2 (en)2010-11-162012-05-24Art FritzsonSystems and methods for identifying and mitigating information security risks
US8763126B2 (en)2010-12-082014-06-24At&T Intellectual Property I, L.P.Devices, systems, and methods for detecting proximity-based mobile propagation
US8943554B2 (en)2011-03-182015-01-27Smith Micro Software, Inc.Managing tethered data traffic over a hotspot network
US9558677B2 (en)2011-04-082017-01-31Wombat Security Technologies, Inc.Mock attack cybersecurity training system and methods
WO2012139127A1 (en)2011-04-082012-10-11Wombat Security Technologies, Inc.Context-aware training systems, apparatuses, and methods
US9373267B2 (en)2011-04-082016-06-21Wombat Security Technologies, Inc.Method and system for controlling context-aware cybersecurity training
US9118702B2 (en)2011-05-312015-08-25Bce Inc.System and method for generating and refining cyber threat intelligence data
EP2541862B1 (en)2011-06-292017-11-15The Boeing CompanyA method of and apparatus for monitoring for security threats in computer network traffic
EP2737404A4 (en)*2011-07-262015-04-29Light Cyber Ltd METHOD FOR DETECTING ABNORMAL ACTIONS IN A COMPUTER NETWORK
US9065826B2 (en)2011-08-082015-06-23Microsoft Technology Licensing, LlcIdentifying application reputation based on resource accesses
US8978151B1 (en)2011-08-232015-03-10Craig ChamberlainRemovable drive security monitoring method and system
US9137262B2 (en)2011-10-112015-09-15Citrix Systems, Inc.Providing secure mobile device access to enterprise resources using application tunnels
US20130232576A1 (en)*2011-11-182013-09-05Vinsula, Inc.Systems and methods for cyber-threat detection
US8484741B1 (en)2012-01-272013-07-09Chapman Technology Group, Inc.Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams
US9330257B2 (en)2012-08-152016-05-03Qualcomm IncorporatedAdaptive observation of behavioral features on a mobile device
US9258321B2 (en)*2012-08-232016-02-09Raytheon Foreground Security, Inc.Automated internet threat detection and mitigation system and associated methods
US9021092B2 (en)*2012-10-192015-04-28Shadow Networks, Inc.Network infrastructure obfuscation
US8931101B2 (en)2012-11-142015-01-06International Business Machines CorporationApplication-level anomaly detection
US20140157405A1 (en)*2012-12-042014-06-05Bill JollCyber Behavior Analysis and Detection Method, System and Architecture
US9954883B2 (en)2012-12-182018-04-24Mcafee, Inc.Automated asset criticality assessment
US9356948B2 (en)2013-02-082016-05-31PhishMe, Inc.Collaborative phishing attack detection
US9253207B2 (en)2013-02-082016-02-02PhishMe, Inc.Collaborative phishing attack detection
US9053326B2 (en)2013-02-082015-06-09PhishMe, Inc.Simulated phishing attack with sequential messages
US8966637B2 (en)*2013-02-082015-02-24PhishMe, Inc.Performance benchmarking for simulated phishing attacks
US9398038B2 (en)2013-02-082016-07-19PhishMe, Inc.Collaborative phishing attack detection
US9027134B2 (en)2013-03-152015-05-05Zerofox, Inc.Social threat scoring
US9674212B2 (en)2013-03-152017-06-06Zerofox, Inc.Social network data removal
US9674214B2 (en)2013-03-152017-06-06Zerofox, Inc.Social network profile data removal
US9215250B2 (en)2013-08-202015-12-15Janus Technologies, Inc.System and method for remotely managing security and configuration of compute devices
US9262629B2 (en)2014-01-212016-02-16PhishMe, Inc.Methods and systems for preventing malicious use of phishing simulation records
US20150287336A1 (en)2014-04-042015-10-08Bank Of America CorporationAutomated phishing-email training
US9398029B2 (en)2014-08-012016-07-19Wombat Security Technologies, Inc.Cybersecurity training system with automated application of branded content

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US20040208307A1 (en)*1997-04-112004-10-21Walker Jay S.System and method for call routing and enabling interaction between callers with calls positioned in a queue
US20060233346A1 (en)*1999-11-162006-10-19Knowlagent, Inc.Method and system for prioritizing performance interventions
US20040148253A1 (en)*2001-04-232004-07-29Young-Cheol ShinElectronic settlement system, electronic settlement method and cash paying method using lcd barcode display on mobile terminal
US20080286737A1 (en)*2003-04-022008-11-20Planetii Usa Inc.Adaptive Engine Logic Used in Training Academic Proficiency
US20050158697A1 (en)*2004-01-152005-07-21Integrity InteractiveSystem and method for providing customized, effective, risk based ethics and compliance training and information using a network
US20060047544A1 (en)*2004-09-012006-03-02Habon Michael WSoftware training method and apparatus
US20070201679A1 (en)*2004-10-012007-08-30Knowlagent, Inc.Method and system for assessing and deploying personnel for roles in a contact center
US20070033639A1 (en)*2004-12-022007-02-08Microsoft CorporationPhishing Detection, Prevention, and Notification
US20060166174A1 (en)*2005-01-212006-07-27Rowe T PPredictive artificial intelligence and pedagogical agent modeling in the cognitive imprinting of knowledge and skill domains
US7841008B1 (en)*2006-03-312010-11-23Symantec CorporationThreat personalization

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US12346457B1 (en)2024-12-092025-07-01Wiz, Inc.System and method for scanning private code and CI/CD registries

Also Published As

Publication numberPublication date
US9870715B2 (en)2018-01-16
US9558677B2 (en)2017-01-31
US11158207B1 (en)2021-10-26
US20140199664A1 (en)2014-07-17
US20170140663A1 (en)2017-05-18

Similar Documents

PublicationPublication DateTitle
US20220013036A1 (en)Context-Aware Cybersecurity Training Systems, Apparatuses, and Methods
US9824609B2 (en)Mock attack cybersecurity training system and methods
US9373267B2 (en)Method and system for controlling context-aware cybersecurity training
US12069083B2 (en)Assessing security risks of users in a computing network
US9280911B2 (en)Context-aware training systems, apparatuses, and methods
US11089044B2 (en)Method and system for assessing data security
US9813454B2 (en)Cybersecurity training system with automated application of branded content
Freed et al.“a stalker's paradise” how intimate partner abusers exploit technology
Zahadat et al.BYOD security engineering: A framework and its analysis
US20210240836A1 (en)System and method for securing electronic correspondence
US9348981B1 (en)System and method for generating user authentication challenges
US20180219914A1 (en)Security via adaptive threat modeling
Harkin et al.Operating-system design and its implications for victims of family violence: the comparative threat of smart phone spyware for Android versus iPhone users
SteinmetzExecuting effective social engineering penetration tests: A qualitative analysis
Blancaflor et al.Penetration assessment and ways to combat attack on Android devices through StormBreaker-a social engineering tool
Speed et al.Mobile Security: How to secure, privatize and recover your devices
ZahadatMobile security: A systems engineering framework for implementing bring your own device (BYOD) security through the combination of policy management and technology
AU2021336803B2 (en)System and method for conducting social engineering red team campaigns
NusairSmart Home Cybersecurity Challenges: An Assessment of End-User Knowledge and a Training Solution to Mitigate These Challenges
Okokpujie et al.Evaluating Students' Vulnerability and Awareness to Phishing Attacks in Educational Institutions.
Jones et al.Mobile Device Management in the DoD Enterprise Network: Factors for Risk Management, Integration, and IT Acquisition
NunooSmartphone Information Security Risks: Portable Devices and Workforce Mobility
Frumento et al.Cognitive approach for social engineering
PerryDigital stalking
VassiljevEnhancing the hierarchical framework model of mobile security

Legal Events

DateCodeTitleDescription
STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:ADVISORY ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPPInformation on status: patent application and granting procedure in general

Free format text:FINAL REJECTION MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:DOCKETED NEW CASE - READY FOR EXAMINATION

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION COUNTED, NOT YET MAILED

STPPInformation on status: patent application and granting procedure in general

Free format text:NON FINAL ACTION MAILED


[8]ページ先頭

©2009-2025 Movatter.jp