MA66045B1 - Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage. - Google Patents

Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage.

Info

Publication number
MA66045B1
MA66045B1 MA66045A MA66045A MA66045B1 MA 66045 B1 MA66045 B1 MA 66045B1 MA 66045 A MA66045 A MA 66045A MA 66045 A MA66045 A MA 66045A MA 66045 B1 MA66045 B1 MA 66045B1
Authority
MA
Morocco
Prior art keywords
information
threat intelligence
phishing attacks
automated simulation
victims
Prior art date
Application number
MA66045A
Other languages
English (en)
Other versions
MA66045A1 (fr
Inventor
Bajeddi Amine
Sabri Marouane
Nassiri Charafeddine
Original Assignee
Defendis
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Defendis filed Critical Defendis
Priority to MA66045A priority Critical patent/MA66045B1/fr
Publication of MA66045A1 publication Critical patent/MA66045A1/fr
Publication of MA66045B1 publication Critical patent/MA66045B1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • G06F21/554Detecting local intrusion or implementing counter-measures involving event detection and direct action
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1433Vulnerability analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Computer And Data Communications (AREA)

Abstract

Linvention concerne un système et une méthode de cybersécurité permettant de prédire de manière proactive le risque de violation des données, grâce à l'utilisation de simulations dattaque par hameçonnage (phishing) automatisées. La méthode comprend la réception d'une pluralité d'informations sur les victimes ; la classification de ces informations pour attribuer un ensemble de types dinformations ; l'attribution d'un ensemble de catégories aux victimes ; l'utilisation des informations classifiées sur les victimes pour simuler une attaque par hameçonnage ; et le calcul d'un score de prédiction de violation de données pour chaque victime catégorisée.
MA66045A 2024-05-28 2024-05-28 Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage. MA66045B1 (fr)

Priority Applications (1)

Application Number Priority Date Filing Date Title
MA66045A MA66045B1 (fr) 2024-05-28 2024-05-28 Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage.

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
MA66045A MA66045B1 (fr) 2024-05-28 2024-05-28 Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage.

Publications (2)

Publication Number Publication Date
MA66045A1 MA66045A1 (fr) 2025-11-28
MA66045B1 true MA66045B1 (fr) 2026-02-27

Family

ID=98218044

Family Applications (1)

Application Number Title Priority Date Filing Date
MA66045A MA66045B1 (fr) 2024-05-28 2024-05-28 Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage.

Country Status (1)

Country Link
MA (1) MA66045B1 (fr)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2676197A1 (fr) * 2011-02-18 2013-12-25 CSidentity Corporation Système et procédés permettant d'identifier des informations d'identification personnelle compromises sur internet
US11829486B1 (en) * 2023-02-08 2023-11-28 BobaGuard LLP Apparatus and method for enhancing cybersecurity of an entity
US20230421587A1 (en) * 2022-06-24 2023-12-28 Crowdstrike, Inc. Distributed Digital Security System for Predicting Malicious Behavior

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2676197A1 (fr) * 2011-02-18 2013-12-25 CSidentity Corporation Système et procédés permettant d'identifier des informations d'identification personnelle compromises sur internet
US20230421587A1 (en) * 2022-06-24 2023-12-28 Crowdstrike, Inc. Distributed Digital Security System for Predicting Malicious Behavior
US11829486B1 (en) * 2023-02-08 2023-11-28 BobaGuard LLP Apparatus and method for enhancing cybersecurity of an entity

Also Published As

Publication number Publication date
MA66045A1 (fr) 2025-11-28

Similar Documents

Publication Publication Date Title
Idowu Debiasing education algorithms
CN108764267B (zh) 一种基于对抗式决策树集成的拒绝服务攻击检测方法
CN116506217A (zh) 业务数据流安全风险的分析方法、系统、存储介质及终端
CN116846619A (zh) 一种自动化网络安全风险评估方法、系统及可读存储介质
CN113139191B (zh) 一种漏洞处置修复优先级的统计方法
CN119484153B (zh) 一种基于epss的漏洞可达性评级方法
JP2019219898A (ja) セキュリティ対策検討ツール
CN118012775A (zh) 一种基于内核保护服务器数据的加固测试方法
MA66045B1 (fr) Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage.
Sulaj Legal responses to challenges posed by deepfakes
Paiva et al. Assessing the suitability of social media data for identifying crisis events in smart cities: an exploratory study on flood situations
CN118282767A (zh) 一种用于计算机网络的监控系统及方法
Mussiraliyeva et al. Identifying cyber-threatening texts in the kazakh segment of web resources
CN118210619A (zh) 一种任务处理方法及电子设备
Debbarma The legal framework and challenges in prosecuting cybercrimes including Hacking, identity Theft, and online fraud
Radanliev et al. Generative pre-trained transformers, natural language processing and artificial intelligence and machine learning (AI/ML) in software vulnerability management: automations in the software bill of materials (SBOM) and the vulnerability-exploitability eXchange (VEX)
Tardelli et al. Cyber intelligence and social media analytics: current research trends and challenges
Gavrilă Ethical and legal challenges of artificial intelligence in intelligence: Between operational efficiency and respect for fundamental rights
CN115022082B (zh) 网络安全检测方法、网络安全检测系统、终端以及介质
Okanda et al. AN EVALUATION OF CYBER INCIDENT MANAGEMENT SYSTEMS IN HIGHER EDUCATION INSTITUTIONS (HEIS) IN KENYA
Leszczuk et al. Selected aspects of the new recommendation on subjective methods of assessing video quality in recognition tasks
Alharthi et al. Network traffic analysis for DDOS attack detection
CN118967029B (zh) 一种数字化的项目申请智能审查系统及方法
US12547735B2 (en) Predictive artificial intelligence for determining security events and mitigation strategies
Berzinji et al. Development of an Intelligence Gathering Framework for Analysing Cyber Extremism on Social Media Networks