白丝美女被狂躁免费视频网站,500av导航大全精品,yw.193.cnc爆乳尤物未满,97se亚洲综合色区,аⅴ天堂中文在线网官网

Message platform for automated threat simulation, reporting, detection, and remediation

專利號
US11997115B1
公開日期
2024-05-28
申請人
Cofense Inc.(US VA Leesburg)
發(fā)明人
Aaron Higbee; David Chamberlain; Vineetha Philip
IPC分類
H04L9/40; G06F16/35; G06F21/00; G06F21/55; H04L51/212; H04L51/08
技術(shù)領(lǐng)域
message,phishing,email,messages,be,or,emails,in,user,cluster
地域: VA VA Leesburg

摘要

Methods, network devices, and machine-readable media for an integrated environment and platform for automated processing of reports of suspicious messages, and further including automated threat simulation, reporting, detection, and remediation, including rapid quarantine and restore functions.

說明書

In some embodiments, multiple sets of headers can be used in a simulated phishing email for authentication. Some embodiments can include an encrypted data header and an encrypted key header. In addition to a data body (in some cases JSON content), the encrypted data header can have a random X-UUID name, which can be randomized for each scenario email that is generated. It can also contain information for software executing at an endpoint to ensure integrity of the emails received there. The data can be encrypted, using any appropriate technique, such as AES-128-CBC, and then Base64 encoded for transport. The encrypted key header can have a random X-UUID name, which also can be randomized for each scenario email generated. The key header can contain, for example, a 128-bit key and a 128-bit initialization vector for performing decryption, such an AES-128-CBC decryption of the data header. The key and the initialization vector can be encrypted using public key infrastructure, and the data base64 encoded for transport.

Example header field body content can include some or all of the content illustrated as scenario headers in FIG. 31. In some embodiments, the scenario headers can be represented in JSON. The scenario headers, in arbitrary format, can be encrypted at the time the simulated phishing message is created. As illustrated in FIG. 32, the plaintext JSON can be encrypted, and then base64 encoded before being incorporated into a simulated phishing message. In some embodiments, public/private key pairs can be used, in some cases the key pairs can be unique per organization that is engaged with the phishing simulations.

權(quán)利要求

1
微信群二維碼
意見反饋