MA66045B1 - Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage. - Google Patents
Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage.Info
- Publication number
- MA66045B1 MA66045B1 MA66045A MA66045A MA66045B1 MA 66045 B1 MA66045 B1 MA 66045B1 MA 66045 A MA66045 A MA 66045A MA 66045 A MA66045 A MA 66045A MA 66045 B1 MA66045 B1 MA 66045B1
- Authority
- MA
- Morocco
- Prior art keywords
- information
- threat intelligence
- phishing attacks
- automated simulation
- victims
- Prior art date
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
- G06F21/554—Detecting local intrusion or implementing counter-measures involving event detection and direct action
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Computer And Data Communications (AREA)
Abstract
Linvention concerne un système et une méthode de cybersécurité permettant de prédire de manière proactive le risque de violation des données, grâce à l'utilisation de simulations dattaque par hameçonnage (phishing) automatisées. La méthode comprend la réception d'une pluralité d'informations sur les victimes ; la classification de ces informations pour attribuer un ensemble de types dinformations ; l'attribution d'un ensemble de catégories aux victimes ; l'utilisation des informations classifiées sur les victimes pour simuler une attaque par hameçonnage ; et le calcul d'un score de prédiction de violation de données pour chaque victime catégorisée.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MA66045A MA66045B1 (fr) | 2024-05-28 | 2024-05-28 | Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage. |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| MA66045A MA66045B1 (fr) | 2024-05-28 | 2024-05-28 | Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage. |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| MA66045A1 MA66045A1 (fr) | 2025-11-28 |
| MA66045B1 true MA66045B1 (fr) | 2026-02-27 |
Family
ID=98218044
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| MA66045A MA66045B1 (fr) | 2024-05-28 | 2024-05-28 | Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage. |
Country Status (1)
| Country | Link |
|---|---|
| MA (1) | MA66045B1 (fr) |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2676197A1 (fr) * | 2011-02-18 | 2013-12-25 | CSidentity Corporation | Système et procédés permettant d'identifier des informations d'identification personnelle compromises sur internet |
| US11829486B1 (en) * | 2023-02-08 | 2023-11-28 | BobaGuard LLP | Apparatus and method for enhancing cybersecurity of an entity |
| US20230421587A1 (en) * | 2022-06-24 | 2023-12-28 | Crowdstrike, Inc. | Distributed Digital Security System for Predicting Malicious Behavior |
-
2024
- 2024-05-28 MA MA66045A patent/MA66045B1/fr unknown
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP2676197A1 (fr) * | 2011-02-18 | 2013-12-25 | CSidentity Corporation | Système et procédés permettant d'identifier des informations d'identification personnelle compromises sur internet |
| US20230421587A1 (en) * | 2022-06-24 | 2023-12-28 | Crowdstrike, Inc. | Distributed Digital Security System for Predicting Malicious Behavior |
| US11829486B1 (en) * | 2023-02-08 | 2023-11-28 | BobaGuard LLP | Apparatus and method for enhancing cybersecurity of an entity |
Also Published As
| Publication number | Publication date |
|---|---|
| MA66045A1 (fr) | 2025-11-28 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Idowu | Debiasing education algorithms | |
| CN108764267B (zh) | 一种基于对抗式决策树集成的拒绝服务攻击检测方法 | |
| CN116506217A (zh) | 业务数据流安全风险的分析方法、系统、存储介质及终端 | |
| CN116846619A (zh) | 一种自动化网络安全风险评估方法、系统及可读存储介质 | |
| CN113139191B (zh) | 一种漏洞处置修复优先级的统计方法 | |
| CN119484153B (zh) | 一种基于epss的漏洞可达性评级方法 | |
| JP2019219898A (ja) | セキュリティ対策検討ツール | |
| CN118012775A (zh) | 一种基于内核保护服务器数据的加固测试方法 | |
| MA66045B1 (fr) | Méthode de cybersécurité comprenant l'utilisation du renseignement sur les menaces pour la simulation automatisée d’attaques par hameçonnage. | |
| Sulaj | Legal responses to challenges posed by deepfakes | |
| Paiva et al. | Assessing the suitability of social media data for identifying crisis events in smart cities: an exploratory study on flood situations | |
| CN118282767A (zh) | 一种用于计算机网络的监控系统及方法 | |
| Mussiraliyeva et al. | Identifying cyber-threatening texts in the kazakh segment of web resources | |
| CN118210619A (zh) | 一种任务处理方法及电子设备 | |
| Debbarma | The legal framework and challenges in prosecuting cybercrimes including Hacking, identity Theft, and online fraud | |
| Radanliev et al. | Generative pre-trained transformers, natural language processing and artificial intelligence and machine learning (AI/ML) in software vulnerability management: automations in the software bill of materials (SBOM) and the vulnerability-exploitability eXchange (VEX) | |
| Tardelli et al. | Cyber intelligence and social media analytics: current research trends and challenges | |
| Gavrilă | Ethical and legal challenges of artificial intelligence in intelligence: Between operational efficiency and respect for fundamental rights | |
| CN115022082B (zh) | 网络安全检测方法、网络安全检测系统、终端以及介质 | |
| Okanda et al. | AN EVALUATION OF CYBER INCIDENT MANAGEMENT SYSTEMS IN HIGHER EDUCATION INSTITUTIONS (HEIS) IN KENYA | |
| Leszczuk et al. | Selected aspects of the new recommendation on subjective methods of assessing video quality in recognition tasks | |
| Alharthi et al. | Network traffic analysis for DDOS attack detection | |
| CN118967029B (zh) | 一种数字化的项目申请智能审查系统及方法 | |
| US12547735B2 (en) | Predictive artificial intelligence for determining security events and mitigation strategies | |
| Berzinji et al. | Development of an Intelligence Gathering Framework for Analysing Cyber Extremism on Social Media Networks |