Systems and methods for using artificial intelligence driven agent to automate assessment of organizational vulnerabilities

ABSTRACT

The present disclosure describes systems and method for performing a vulnerabilities assessment of an organization. A campaign controller executes one or more simulated phishing campaigns directed to a plurality of users of an organization, using a plurality of models determined by the campaign controller based at least on identification of the organization. The campaign controller stores to a database the results of execution of the one or more simulated phishing campaigns and based on the results, the campaign controller determines one or more vulnerabilities to phishing for the organization. In one embodiment, the campaign controller determines a percentage of the plurality of users of the organization that are phish-prone. In some embodiments, the users of the organization that are phish-prone interacted with a link of a simulated phishing communication.

CROSS-REFERENCE TO RELATED APPLICATION

This patent application is a continuation of, and claims priority to andthe benefit of U.S. patent application Ser. No. 15/829,714, titled“SYSTEMS AND METHODS FOR USING ARTIFICIAL INTELLIGENCE DRIVEN AGENT TOAUTOMATE ASSESSMENT OF ORGANIZATIONAL VULNERABILITIES,” and filed Dec.1, 2017, the contents of all of which are hereby incorporated herein byreference in its entirety for all purposes.

FIELD OF THE DISCLOSURE

This disclosure generally relates to artificial intelligence drivensecurity awareness systems for performing simulated phishing attacks.

BACKGROUND OF THE DISCLOSURE

It can be useful to perform simulated phishing attacks on an individualor set of individuals for the purposes of extracting information from adevice used by the individuals. A phishing attack involves an attempt toacquire sensitive information such as usernames, passwords, credit carddetails, etc., often for malicious reasons, possible by masquerading asa trustworthy entity. For example, an email may be sent to a target, theemail having an attachment that performs malicious actions when executedor a link to a webpage that either performs malicious actions whenaccessed or prompts the user to execute a malicious program. Maliciousactions may include malicious data collection or actions harmful to thenormal functioning of a device on which the email was activated, or anyother malicious actions capable of being performed by a program or a setof programs.

BRIEF SUMMARY OF THE DISCLOSURE

A simulated phishing attack may test the readiness of a security systemor users of a system to handle phishing attacks such that maliciousactions are prevented. A simulated phishing attack may, for example,target a large number of users, such as employees of an organization.Such an attack may be performed by a party friendly or neutral to thetargets of the simulated attack. In one type of simulated phishingattack, an attempt is made to lure a user (e.g., an employee of abusiness entity) into performing a target action. Performing a simulatedphishing attack can help expose individuals that are more susceptible tophishing attacks, in addition to exposing weaknesses in the securityinfrastructure meant to protect users and/or devices from phishingattacks or other computerized, cyber, or digital attacks. Differentusers respond differently to different stimuli, and therefore the typeof phishing attack that one user falls prey to may not be remotelytempting to a different user. The same user may also respond differentlyto a phishing attack depending on where the user is, who the user iswith, what the user is doing, etc. These differences in user behaviorsmean that the same simulated phishing attack does not have the sameeffectiveness in terms of teaching a user how to recognize threats,because not all users would have likely responded to a similar realphishing email in the first place.

Phishing attacks are rapidly getting more and more sophisticated, andthe instigators of the phishing attacks have been able to mass scalespear phishing, which is individualized, real time, and reactive. Inorder for a security awareness system to be able to train users todetect such highly sophisticated and personalized attacks, the securityawareness system needs to create a simulated phishing environment thatis as sophisticated and individualized and synonymous with the kinds ofattacks a user is likely to encounter in the real world.

A security awareness system can be configured to send multiple simulatedphishing emails, text or short message service (SMS) messages, voicecalls (e.g. via Voice Over Internet Protocol or VoIP), or Internet basedcommunications (collectively referred to as simulated phishing messagesor messages), varying the quantity, frequency, type, sophistication,timing, and combinations using machine learning algorithms or otherforms of artificial intelligence.

In some implementations, the security awareness system may adaptivelylearn the best design of a simulated phishing campaign to get a user toperform the requested actions, such as clicking a hyperlink or opening afile. In some implementations, the system may adapt an ongoing campaignbased on user's responses to messages in the campaign, along with thesystem's learned awareness. The learning process implemented by thesecurity awareness system can be trained by observing the behavior ofother users in the same company, other users in the same industry, otherusers that share similar attributes, all other users of the system, orusers that have user attributes that match criteria set by the system,or that match attributes of a subset of other users in the system.

The system can record when and how the user action was performed and canproduce reports about the actions. The reports can track the number ofusers the simulated phishing messages were sent to, whether the messageswere successfully delivered, whether a user performed an action, whethera user performed a requested action, when an action or requested actionwas performed, and a combination and timing of messages that induced auser to perform a requested action. In some implementations, the systemmay provide training on why a user should not have performed a requestedaction at the time that the user performs the requested action. In someimplementations, the system may enroll the user in training to beperformed in the future. In some implementations, the system may add theuser to a group of users.

In one embodiment, a campaign controller executes one or more simulatedphishing campaigns directed to a plurality of users of an organization,using a plurality of models determined by the campaign controller basedat least on identification of the organization. The campaign controllerstores to a database the results of execution of the one or moresimulated phishing campaigns and based on the results, the campaigncontroller determines one or more vulnerabilities to phishing for theorganization. In one embodiment, the campaign controller determines apercentage of the plurality of users of the organization that arephish-prone. In some embodiments, the users of the organization that arephish-prone interacted with a link of a simulated phishingcommunication.

In one embodiment, the campaign controller identifies the organizationfor which to assess vulnerabilities to phishing based on at leastidentifying a plurality of attributes of the organization.

In one embodiment, the campaign controller determines the plurality ofmodels to use for the one or more simulated phishing campaigns for theorganization based on at least the attributes of the organization. Inone embodiment, the campaign controller determines the plurality ofmodels to user for the one or more simulated phishing campaigns for theorganization based on a plurality of attributes of the plurality ofusers identified by the campaign controller.

In one embodiment, the campaign controller identifies the one or moreattributes of the organization using a questionnaire regardingimplementation of a security awareness program by the organization,wherein the questionnaire is constructed based on at least results ofprevious simulated phishing campaigns across one or more organizations.

In one embodiment, the campaign controller selects one or more templatesfor each of the plurality of models. The templates identify one or moreof the following: one or more types of simulated phishingcommunications, a type of exploit, type of data to collect, an order ofsimulated phishing communications, a timing of or between simulatedphishing communications, and content of one or more simulated phishingcommunications. In one embodiment the campaign controller executes theone or more simulated phishing campaigns using the one or moretemplates.

In one embodiment, the campaign controller communicates a plurality ofsimulated phishing communications of different types, including one ormore of the following: an email, a text or SMS message, a phone call, avoice over internet protocol (VoIP) communication or an Internet basedmessage.

In one embodiment, a vulnerability of the organization is determined bythe campaign controller by identifying what caused one or more users tointeract with a link of a simulated phishing communications, or fromdetermining metrics from the results of one or more of the following:the type of simulated phishing communication, the type of exploit, thecontent of the simulated phishing communication and/or the timing of orbetween simulated phishing communications.

In one embodiment, the campaign controller identifies, based on at leastthe one or more vulnerabilities, one or more training modules forelectronic based training of users of the organization for securityawareness and/or configuration of a subsequent simulated phishingcampaign to execute for the organization.

BRIEF DESCRIPTION OF THE DRAWINGS

The foregoing and other objects, aspects, features, and advantages ofthe disclosure will become more apparent and better understood byreferring to the following description taken in conjunction with theaccompanying drawings, in which:

FIG. 1A is a block diagram depicting an embodiment of a networkenvironment comprising client device in communication with serverdevice;

FIG. 1B is a block diagram depicting a could computing environmentcomprising client device in communication with cloud service providers;

FIGS. 1C and 1D are block diagrams depicting embodiments of computingdevices useful in connection with the methods and systems describedherein;

FIG. 2A depicts an implementation of some of the architecture of animplementation of a system capable of performing artificial intelligencedriven simulated phishing attack campaigns as part of a securityawareness system;

FIG. 2B depicts an implementation of an artificial intelligence drivenagent (AIDA) system;

FIG. 2C depicts an example of a user interface and/or dashboard fordisplaying metrics and statistics about simulated phishing campaigns,showing recipient information;

FIG. 2D depicts an example of a user interface and/or dashboard fordisplaying metrics and statistics about simulated phishing campaigns,showing bounced emails;

FIG. 2E depicts an example of a user interface and/or dashboard fordisplaying metrics and statistics about simulated phishing campaigns,showing SMS messages sent;

FIG. 3 depicts an implementation of some of the architecture of animplementation of a system capable of creating artificial intelligencemodels for use as part of a security awareness system;

FIG. 4 depicts an implementation of a method for assessingvulnerabilities of an organization to phishing based on artificialintelligence driven agent simulated phishing campaigns;

FIG. 5 depicts an example output of a system monitoring modulemonitoring the creation of one or more models;

FIG. 6 depicts an example input screen for a company administratorconsole to create an AIDA campaign; and

FIG. 7 depicts a company administrator console dashboard showing anoverview summary of an AIDA campaign.

DETAILED DESCRIPTION

For purposes of reading the description of the various embodimentsbelow, the following descriptions of the sections of the specificationsand their respective contents may be helpful:

Section A describes a network environment and computing environmentwhich may be useful for practicing embodiments described herein.

Section B describes an artificial intelligence network and environmentwhich may be useful for practicing embodiments described herein.

Section C describes embodiments of systems and methods for creating,controlling and executing simulated phishing campaigns using artificialintelligence as part of a security awareness system.

Section D describes embodiments of systems and methods for generating,revising, and tuning artificial intelligence models for use as part of asecurity awareness system.

A. Computing and Network Environment

Prior to discussing specific embodiments of the present solution, it maybe helpful to describe aspects of the operating environment as well asassociated system components (e.g. hardware elements) in connection withthe methods and systems described herein. Referring to FIG. 1A, anembodiment of a network environment is depicted. In brief overview, thenetwork environment includes one or more clients 102 a-102 n (alsogenerally referred to as local machines(s) 102, client(s) 102, clientnode(s) 102, client machine(s) 102, client computer(s) 102, clientdevice(s) 102, endpoint(s) 102, or endpoint node(s) 102) incommunication with one or more servers 106 a-106 n (also generallyreferred to as server(s) 106, node(s) 106, machine(s) 106, or remotemachine(s) 106) via one or more networks 104. In some embodiments, aclient 102 has the capacity to function as both a client node seekingaccess to resources provided by a server and as a server providingaccess to hosted resources for other clients 102 a-102 n.

Although FIG. 1A shows a network 104 between the clients 102 and theservers 106, the clients 102 and the servers 106 may be on the samenetwork 104. In some embodiments, there are multiple networks 104between the clients 102 and the servers 106. In one of theseembodiments, a network 104′ (not shown) may be a private network and anetwork 104 may be a public network. In another of these embodiments, anetwork 104 may be a private network and a network 104′ may be a publicnetwork. In still another of these embodiments, networks 104 and 104′may both be private networks.

The network 104 may be connected via wired or wireless links. Wiredlinks may include Digital Subscriber Line (DSL), coaxial cable lines, oroptical fiber lines. Wireless links may include Bluetooth®, BluetoothLow Energy (BLE), ANT/ANT+, ZigBee, Z-Wave, Thread, Wi-Fi®, WorldwideInteroperability for Microwave Access (WiMAX®), mobile WiMAX®,WiMAX®-Advanced, NFC, SigFox, LoRa, Random Phase Multiple Access (RPMA),Weightless-N/P/W, an infrared channel or a satellite band. The wirelesslinks may also include any cellular network standards to communicateamong mobile devices, including standards that qualify as 1G, 2G, 3G,4G, or 5G. The network standards may qualify as one or more generationsof mobile telecommunication standards by fulfilling a specification orstandards such as the specifications maintained by the InternationalTelecommunication Union. The 3G standards, for example, may correspondto the International Mobile Telecommuniations-2000 (IMT-2000)specification, and the 4G standards may correspond to the InternationalMobile Telecommunication Advanced (IMT-Advanced) specification. Examplesof cellular network standards include AMPS, GSM, GPRS, UMTS, CDMA2000,CDMA-1×RTT, CDMA-EVDO, LTE, LTE-Advanced, LTE-M1, and Narrowband IoT(NB-IoT). Wireless standards may use various channel access methods,e.g. FDMA, TDMA, CDMA, or SDMA. In some embodiments, different types ofdata may be transmitted via different links and standards. In otherembodiments, the same types of data may be transmitted via differentlinks and standards.

The network 104 may be any type and/or form of network. The geographicalscope of the network may vary widely and the network 104 can be a bodyarea network (BAN), a personal area network (PAN), a local-area network(LAN), e.g. Intranet, a metropolitan area network (MAN), a wide areanetwork (WAN), or the Internet. The topology of the network 104 may beof any form and may include, e.g., any of the following: point-to-point,bus, star, ring, mesh, or tree. The network 104 may be an overlaynetwork which is virtual and sits on top of one or more layers of othernetworks 104′. The network 104 may be of any such network topology asknown to those ordinarily skilled in the art capable of supporting theoperations described herein. The network 104 may utilize differenttechniques and layers or stacks of protocols, including, e.g., theEthernet protocol, the internet protocol suite (TCP/IP), the ATM(Asynchronous Transfer Mode) technique, the SONET (Synchronous OpticalNetworking) protocol, or the SDH (Synchronous Digital Hierarchy)protocol. The TCP/IP internet protocol suite may include applicationlayer, transport layer, internet layer (including, e.g., IPv4 and IPv6),or the link layer. The network 104 may be a type of broadcast network, atelecommunications network, a data communication network, or a computernetwork.

In some embodiments, the system may include multiple, logically-groupedservers 106. In one of these embodiments, the logical group of serversmay be referred to as a server farm or a machine farm. In another ofthese embodiments, the servers 106 may be geographically dispersed. Inother embodiments, a machine farm may be administered as a singleentity. In still other embodiments, the machine farm includes aplurality of machine farms. The servers 106 within each machine farm canbe heterogeneous—one or more of the servers 106 or machines 106 canoperate according to one type of operating system platform (e.g.,Windows, manufactured by Microsoft Corp. of Redmond, Wash.), while oneor more of the other servers 106 can operate according to another typeof operating system platform (e.g., Unix, Linux, or Mac OSX).

In one embodiment, servers 106 in the machine farm may be stored inhigh-density rack systems, along with associated storage systems, andlocated in an enterprise data center. In this embodiment, consolidatingthe servers 106 in this way may improve system manageability, datasecurity, the physical security of the system, and system performance bylocating servers 106 and high-performance storage systems on localizedhigh-performance networks. Centralizing the servers 106 and storagesystems and coupling them with advanced system management tools allowsmore efficient use of server resources.

The servers 106 of each machine farm do not need to be physicallyproximate to another server 106 in the same machine farm. Thus, thegroup of servers 106 logically grouped as a machine farm may beinterconnected using a wide-area network (WAN) connection or ametropolitan-area network (MAN) connection. For example, a machine farm38 may include servers 106 physically located in different continents ordifferent regions of a continent, country, state, city, campus, or room.Data transmission speeds between servers 106 in the machine farm can beincreased if the servers 106 are connected using a local-area network(LAN) connection or some form of direct connection. Additionally, aheterogeneous machine farm may include one or more servers 106 operatingaccording to a type of operating system, while one or more other serversexecute one or more types of hypervisors rather than operating systems.In these embodiments, hypervisors may be used to emulate virtualhardware, partition physical hardware, virtualize physical hardware, andexecute virtual machines that provide access to computing environments,allowing multiple operating systems to run concurrently on a hostcomputer. Native hypervisors may run directly on the host computer.Hypervisors may include VMware ESX/ESXi, manufactured by VMWare, Inc.,of Palo Alta, Calif.; the Xen hypervisor, an open source product whosedevelopment is overseen by Citrix Systems, Inc. of Fort Lauderdale,Fla.; the HYPER-V hypervisors provided by Microsoft, or others. Hostedhypervisors may run within an operating system on a second softwarelevel. Examples of hosted hypervisors may include VMWare Workstation andVirtualBox, manufactured by Oracle Corporation of Redwood City, Calif.

Management of the machine farm may be de-centralized. For example, oneor more servers 106 may comprise components, subsystems and modules tosupport one or more management services for the machine farm. In one ofthese embodiments, one or more servers 106 provide functionality formanagement of dynamic data, including techniques for handling failover,data replication, and increasing the robustness of the machine farm.Each server 106 may communicate with a persistent store and, in someembodiments, with a dynamic store.

Server 106 may be a file server, application server, web server, proxyserver, appliance, network appliance, gateway, gateway server,virtualization server, deployment server, SSL VPN server, or firewall.In one embodiment, a plurality of servers 106 may be in the path betweenany two communicating servers 106.

Referring to FIG. 1B, a cloud computing environment is depicted. A couldcomputing environment may provide client 102 with one or more resourcesprovided by a network environment. The could computing environment mayinclude one or more clients 102 a-102 n, in communication with the cloud108 over one or more networks 104. Clients 102 may include, e.g., thickclients, thin clients, and zero clients. A thick client may provide atleast some functionality even when disconnected from the cloud 108 orservers 106. A thin client or zero client may depend on the connectionto the cloud 108 or server 106 to provide functionality. A zero clientmay depend on the cloud 108 or other networks 104 or servers 106 toretrieve operating system data for the client device 102. The cloud 108may include back end platforms, e.g., servers 106, storage, server farmsor data centers.

The cloud 108 may be public, private, or hybrid. Public clouds mayinclude public servers 106 that are maintained by third parties to theclients 102 or the owners of the clients. The servers 106 may be locatedoff-site in remote geographical locations as disclosed above orotherwise. Public clouds may be connected to the servers 106 over apublic network. Private clouds may include private servers 106 that arephysically maintained by clients 102 or owners of clients. Privateclouds may be connected to the servers 106 over a private network 104.Hybrid clouds 109 may include both the private and public networks 104and servers 106.

The cloud 108 may also include a cloud based delivery, e.g. Software asa Service (SaaS) 110, Platform as a Service (PaaS) 112, andInfrastructure as a Service (IaaS) 114. IaaS may refer to a user rentingthe user of infrastructure resources that are needed during a specifiedtime period. IaaS provides may offer storage, networking, servers orvirtualization resources from large pools, allowing the users to quicklyscale up by accessing more resources as needed. Examples of IaaS includeAmazon Web Services (AWS) provided by Amazon, Inc. of Seattle, Wash.,Rackspace Cloud provided by Rackspace Inc. of San Antonio, Tex., GoogleCompute Engine provided by Google Inc. of Mountain View, Calif., orRightScale provided by RightScale, Inc. of Santa Barbara, Calif. PaaSproviders may offer functionality provided by IaaS, including, e.g.,storage, networking, servers or virtualization, as well as additionalresources, e.g., the operating system, middleware, or runtime resources.Examples of PaaS include Windows Azure provided by Microsoft Corporationof Redmond, Wash., Google App Engine provided by Google Inc., and Herokuprovided by Heroku, Inc. of San Francisco Calif. SaaS providers mayoffer the resources that PaaS provides, including storage, networking,servers, virtualization, operating system, middleware, or runtimeresources. In some embodiments, SaaS providers may offer additionalresources including, e.g., data and application resources. Examples ofSaaS include Google Apps provided by Google Inc., Salesforce provided bySalesforce.com Inc. of San Francisco, Calif., or Office365 provided byMicrosoft Corporation. Examples of SaaS may also include storageproviders, e.g. Dropbox provided by Dropbox Inc. of San Francisco,Calif., Microsoft OneDrive provided by Microsoft Corporation, GoogleDrive provided by Google Inc., or Apple iCloud provided by Apple Inc. ofCupertino, Calif.

Clients 102 may access IaaS resources with one or more IaaS standards,including, e.g., Amazon Elastic Compute Cloud (EC2), Open CloudComputing Interface (OCCI), Cloud Infrastructure Management Interface(CIMI), or OpenStack standards. Some IaaS standards may allow clientsaccess to resources over HTTP, and may use Representational StateTransfer (REST) protocol or Simple Object Access Protocol (SOAP).Clients 102 may access PaaS resources with different PaaS interfaces.Some PaaS interfaces use HTTP packages, standard Java APIs, JavaMailAPI, Java Data Objects (JDO), Java Persistence API (JPA), Python APIs,web integration APIs for different programming languages including,e.g., Rack for Ruby, WSGI for Python, or PSGI for Perl, or other APIsthat may be built on REST, HTTP, XML, or other protocols. Clients 102may access SaaS resources through the use of web-based user interfaces,provided by a web browser (e.g. Google Chrome, Microsoft InternetExplorer, or Mozilla Firefox provided by Mozilla Foundation of MountainView, Calif.). Clients 102 may also access SaaS resources throughsmartphone or tablet applications, including e.g., Salesforce SalesCloud, or Google Drive App. Clients 102 may also access SaaS resourcesthrough the client operating system, including e g Windows file systemfor Dropbox.

In some embodiments, access to IaaS, PaaS, or SaaS resources may beauthenticated. For example, a server or authentication server mayauthenticate a user via security certificates, HTTPS, or API keys. APIkeys may include various encryption standards such as, e.g., AdvancedEncryption Standard (AES). Data resources may be sent over TransportLayer Security (Us) or Secure Sockets Layer (SSL).

The client 102 and server 106 may be deployed as and/or executed on anytype and form of computing device, e.g., a computer, network device orappliance capable of communicating on any type and form of network andperforming the operations described herein.

FIGS. 1C and 1D depict block diagrams of a computing device 100 usefulfor practicing an embodiment of the client 102 or a server 106. As shownin FIGS. 1C and 1D, each computing device 100 includes a centralprocessing unit 121, and a main memory unit 122. As shown in FIG. 1C, acomputing device 100 may include a storage device 128, an installationdevice 116, a network interface 118, and I/O controller 123, displaydevices 124 a-124 n, a keyboard 126 and a pointing device 127, e.g., amouse. The storage device 128 may include, without limitation, anoperating system, software, and a software of a simulated phishingattack system 120. As shown in FIG. 1D, each computing device 100 mayalso include additional optional elements, e.g., a memory port 103, abridge 170, one or more input/output devices 130 a-130 n (generallyreferred to using reference numeral 130), and a cache memory 140 incommunication with the central processing unit 121.

The central processing unit 121 is any logic circuitry that responds toand processes instructions fetched from the main memory unit 122. Inmany embodiments, the central processing unit 121 is provided by amicroprocessor unit, e.g.: those manufactured by Intel Corporation ofMountain View, Calif.; those manufactured by Motorola Corporation ofSchaumburg, Ill.; the ARM processor and TEGRA system on a chip (SoC)manufactured by Nvidia of Santa Clara, Calif.; the POWER7 processor,those manufactured by International Business Machines of White Plains,N.Y.; or those manufactured by Advanced Micro Devices of Sunnyvale,Calif. The computing device 100 may be based on any of these processors,or any other processor capable of operating as described herein. Thecentral processing unit 121 may utilize instruction level parallelism,thread level parallelism, different levels of cache, and multi-coreprocessors. A multi-core processor may include two or more processingunits on a single computing component. Examples of multi-core processorsinclude the AMD PHENOM IIX2, INTER CORE i5 and INTEL CORE i7.

Main memory unit 122 may include on or more memory chips capable ofstoring data and allowing any storage location to be directly accessedby the microprocessor 121. Main memory unit 122 may be volatile andfaster than storage 128 memory. Main memory units 122 may be DynamicRandom-Access Memory (DRAM) or any variants, including staticRandom-Access Memory (SRAM), Burst SRAM or SynchBurst SRAM (BSRAM), FastPage Mode DRAM (FPM DRAM), Enhanced DRAM (EDRAM), Extended Data OutputRAM (EDO RAM), Extended Data Output DRAM (EDO DRAM), Burst Extended DataOutput DRAM (BEDO DRAM), Single Data Rate Synchronous DRAM (SDR SDRAM),Double Data Rate SDRAM (DDR SDRAM), Direct Rambus DRAM (DRDRAM), orExtreme Data Rate DRAM (XDR DRAM). In some embodiments, the main memory122 or the storage 128 may be non-volatile; e.g., non-volatile readaccess memory (NVRAM), flash memory non-volatile static RAM (nvSRAM),Ferroelectric RAM (FeRAM), Magnetoresistive RAM (MRAM), Phase-changememory (PRAM), conductive-bridging RAM (CBRAM),Silicon-Oxide-Nitride-Oxide-Silicon (SONOS), Resistive RAM (RRAM),Racetrack, Nano-RAM (NRAM), or Millipede memory. The main memory 122 maybe based on any of the above described memory chips, or any otheravailable memory chips capable of operating as described herein. In theembodiment shown in FIG. 1C, the processor 121 communicates with mainmemory 122 via a system bus 150 (described in more detail below). FIG.1D depicts an embodiment of a computing device 100 in which theprocessor communicates directly with main memory 122 via a memory port103. For example, in FIG. 1D the main memory 122 may be DRDRAM.

FIG. 1D depicts and embodiment in which the main processor 121communicates directly with cache memory 140 via a secondary bus,sometimes referred to as a backside bus. In other embodiments, the mainprocessor 121 communicates with cache memory 140 using the system bus150. Cache memory 140 typically has a faster response time than mainmemory 122 and is typically provided by SRAM, BSRAM, or EDRAM. In theembodiment shown in FIG. 1D, the processor 121 communicates with variousI/O devices 130 via a local system bus 150. Various buses may be used toconnect the central processing unit 121 to any of the I/O devices 130,including a PCI bus, a PCI-X bus, or a PCI-Express bus, or a NuBus. Forembodiments in which the I/O device is a video display 124, theprocessor 121 may use an Advanced Graphic Port (AGP) to communicate withthe display 124 or the I/O controller 123 for the display 124. FIG. 1Ddepicts and embodiment of a computer 100 in which the main processor 121communicates directly with I/O device 130 b or other processors 121′ viaHYPERTRANSPORT, RAPIDIO, or INFINIBAND communications technology. FIG.1D also depicts an embodiment in which local busses and directcommunication are mixed: the processor 121 communicates with I/O device130 a using a local interconnect bus while communicating with I/O device130 b directly.

A wide variety of I/O devices 130 a-130 n may be present in thecomputing device 100. Input devices may include keyboards, mice,trackpads, trackballs, touchpads, touch mice, multi-touch touchpads andtouch mice, microphones, multi-array microphones, drawing tablets,cameras, single-lens reflex cameras (SLR), digital SLR (DSLR), CMOSsensors, accelerometers, infrared optical sensors, pressure sensors,magnetometer sensors, angular rate sensors, depth sensors, proximitysensors, ambient light sensors, gyroscopic sensors, or other sensors.Output devices may include video displays, graphical displays, speakers,headphones, inkjet printers, laser printers, and 3D printers.

Devices 130 a-130 n may include a combination of multiple input oroutput devices, including, e.g., Microsoft KINECT, Nintendo Wiimote forthe WII, Nintendo WII U GAMEPAD, or Apple iPhone. Some devices 130 a-130n allow gesture recognition inputs through combining some of the inputsand outputs. Some devices 130 a-130 n provide for facial recognitionwhich may be utilized as an input for different purposes includingauthentication and other commands. Some devices 130 a-130 n provide forvoice recognition and inputs, including, e.g., Microsoft KINECT, SIRIfor iPhone by Apple, Google Now or Google Voice Search, and Alexa byAmazon.

Additional devices 130 a-130 n have both input and output capabilities,including, e.g., haptic feedback devices, touchscreen displays, ormulti-touch displays. Touchscreen, multi-touch displays, touchpads,touch mice, or other touch sensing devices may use differenttechnologies to sense touch, including, e.g., capacitive, surfacecapacitive, projected capacitive touch (PCT), in-cell capacitive,resistive, infrared, waveguide, dispersive signal touch (DST), in-celloptical, surface acoustic wave (SAW), bending wave touch (BWT), orforce-based sensing technologies. Some multi-touch devices may allow twoor more contact points with the surface, allowing advanced functionalityincluding, e.g., pinch, spread, rotate, scroll, or other gestures. Sometouchscreen devices, including, e.g., Microsoft PIXELSENSE orMulti-Touch Collaboration Wall, may have larger surfaces, such as on atable-top or on a wall, and may also interact with other electronicdevices. Some I/O devices 130 a-130 n, display devices 124 a-124 n orgroup of devices may be augmented reality devices. The I/O devices maybe controlled by an I/O controller 123 as shown in FIG. 1C. The I/Ocontroller may control one or more I/O devices, such as, e.g., akeyboard 126 and a pointing device 127, e.g., a mouse or optical pen.Furthermore, an I/O device may also provide storage and/or aninstallation medium 116 for the computing device 100. In still otherembodiments, the computing device 100 may provide USB connections (notshown) to receive handheld USB storage devices. In further embodiments,a I/O device 130 may be a bridge between the system bus 150 and anexternal communication bus, e.g. a USB bus, a SCSI bus, a FireWire bus,an Ethernet bus, a Gigabit Ethernet bus, a Fibre Channel bus, or aThunderbolt bus.

In some embodiments, display devices 124 a-124 n may be connected to I/Ocontroller 123. Display devices may include, e.g., liquid crystaldisplays (LCD), thin film transistor LCD (TFT-LCD), blue phase LCD,electronic papers (e-ink) displays, flexile displays, light emittingdiode displays (LED), digital light processing (DLP) displays, liquidcrystal on silicon (LCOS) displays, organic light-emitting diode (OLED)displays, active-matrix organic light-emitting diode (AMOLED) displays,liquid crystal laser displays, time-multiplexed optical shutter (TMOS)displays, or 3D displays. Examples of 3D displays may use, e.g.stereoscopy, polarization filters, active shutters, or auto stereoscopy.Display devices 124 a-124 n may also be a head-mounted display (HMD). Insome embodiments, display devices 124 a-124 n or the corresponding I/Ocontrollers 123 may be controlled through or have hardware support forOPENGL or DIRECTX API or other graphics libraries.

In some embodiments, the computing device 100 may include or connect tomultiple display devices 124 a-124 n, which each may be of the same ordifferent type and/or form. As such, any of the I/O devices 130 a-130 nand/or the I/O controller 123 may include any type and/or form ofsuitable hardware, software, or combination of hardware and software tosupport, enable or provide for the connection and use of multipledisplay devices 124 a-124 n by the computing device 100. For example,the computing device 100 may include any type and/or form of videoadapter, video card, driver, and/or library to interface, communicate,connect or otherwise use the display devices 124 a-124 n. In oneembodiment, a video adapter may include multiple connectors to interfaceto multiple display devices 124 a-124 n. In other embodiments, thecomputing device 100 may include multiple video adapters, with eachvideo adapter connected to one or more of the display devices 124 a-124n. In some embodiments, any portion of the operating system of thecomputing device 100 may be configured for using multiple displays 124a-124 n. In other embodiments, one or more of the display devices 124a-124 n may be provided by one or more other computing devices 100 a or100 b connected to the computing device 100, via the network 104. Insome embodiments software may be designed and constructed to use anothercomputer's display device as a second display device 124 a for thecomputing device 100. For example, in one embodiment, an Apple iPad mayconnect to a computing device 100 and use the display of the device 100as an additional display screen that may be used as an extended desktop.One ordinarily skilled in the art will recognize and appreciate thevarious ways and embodiments that a computing device 100 may beconfigured to have multiple display devices 124 a-124 n.

Referring again to FIG. 1C, the computing device 100 may comprise astorage device 128 (e.g. one or more hard disk drives or redundantarrays of independent disks) for storing an operating system or otherrelated software, and for storing application software programs such asany program related to the software 120. Examples of storage device 128include, e.g., hard disk drive (HDD); optical drive including CD drive,DVD drive, or BLU-RAY drive; solid-state drive (SSD); USB flash drive;or any other device suitable for storing data. Some storage devices mayinclude multiple volatile and non-volatile memories, including, e.g.,solid state hybrid drives that combine hard disks with solid statecache. Some storage device 128 may be non-volatile, mutable, orread-only. Some storage device 128 may be internal and connect to thecomputing device 100 via a bus 150. Some storage device 128 may beexternal and connect to the computing device 100 via a I/O device 130that provides an external bus. Some storage device 128 may connect tothe computing device 100 via the network interface 118 over a network104, including, e.g., the Remote Disk for MACBOOK AIR by Apple. Someclient devices 100 may not require a non-volatile storage device 128 andmay be thin clients or zero clients 102. Some storage device 128 mayalso be used as an installation device 116, and may be suitable forinstalling software and programs. Additionally, the operating system andthe software can be run from a bootable medium, for example, a bootableCD, e.g. KNOPPIX, a bootable CD for GNU/Linux that is available as aGNU/Linux distribution from knoppix.net.

Client device 100 may also install software or application from anapplication distribution platform. Examples of application distributionplatforms include the App Store for iOS provided by Apple, Inc., the MacApp Store provided by Apple, Inc., GOOGLE PLAY for Android OS providedby Google Inc., Chrome Webstore for CHROME OS provided by Google Inc.,and Amazon Appstore for Android OS and KINDLE FIRE provided byAmazon.com, Inc. An application distribution platform may facilitateinstallation of software on a client device 102. An applicationdistribution platform may include a repository of applications on aserver 106 or a cloud 108, which the clients 102 a-102 n may access overa network 104. An application distribution platform may includeapplication developed and provided by various developers. A user of aclient device 102 may select, purchase and/or download an applicationvia the application distribution platform.

Furthermore, the computing device 100 may include a network interface118 to interface to the network 104 through a variety of connectionsincluding, but not limited to, standard telephone lines LAN or WAN links(e.g., 802.11, T1, T3, Gigabit Ethernet, Infiniband), broadbandconnections (e.g., ISDN, Frame Relay, ATM, Gigabit Ethernet,Ethernet-over-SONET, ADSL, VDSL, BPON, GPON, fiber optical includingFiOS), wireless connections, or some combination of any or all of theabove. Connections can be established using a variety of communicationprotocols (e.g., TCP/IP, Ethernet, ARCNET, SONET, SDH, Fiber DistributedData Interface (FDDI), IEEE 802.11a/b/g/n/ac CDMA, GSM, WiMax and directasynchronous connections). In one embodiment, the computing device 100communicates with other computing devices 100′ via any type and/or formof gateway or tunneling protocol e.g. Secure Socket Layer (SSL) orTransport Layer Security (TLS), or the Citrix Gateway Protocolmanufactured by Citrix Systems, Inc. The network interface 118 maycomprise a built-in network adapter, network interface card, PCMCIAnetwork card, EXPRESSCARD network card, card bus network adapter,wireless network adapter, USB network adapter, modem or any other devicesuitable for interfacing the computing device 100 to any type of networkcapable of communication and performing the operations described herein.

A computing device 100 of the sort depicted in FIGS. 1B and 1C mayoperate under the control of an operating system, which controlsscheduling of tasks and access to system resources. The computing device100 can be running any operating system such as any of the versions ofthe MICROSOFT WINDOWS operating systems, the different releases of theUnix and Linux operating systems, any version of the MAC OS forMacintosh computers, any embedded operating system, any real-timeoperating system, any open source operating system, any proprietaryoperating system, any operating systems for mobile computing devices, orany other operating system capable of running on the computing deviceand performing the operations described herein. Typical operatingsystems include, but are not limited to: WINDOWS 2000, WINDOWS Server2012, WINDOWS CE, WINDOWS Phone, WINDOWS XP, WINDOWS VISTA, and WINDOWS7, WINDOWS RT, WINDOWS 8 and WINDOW 10, all of which are manufactured byMicrosoft Corporation of Redmond, Wash.; MAC OS and iOS, manufactured byApple, Inc.; and Linux, a freely-available operating system, e.g. LinuxMint distribution (“distro”) or Ubuntu, distributed by Canonical Ltd. ofLondon, United Kingdom; or Unix or other Unix-like derivative operatingsystems; and Android, designed by Google Inc., among others. Someoperating systems, including, e.g., the CHROME OS by Google Inc., may beused on zero clients or thin clients, including, e.g., CHROMEBOOKS.

The computer system 100 can be any workstation, telephone, desktopcomputer, laptop or notebook computer, netbook, ULTRABOOK, tablet,server, handheld computer, mobile telephone, smartphone or otherportable telecommunications device, media playing device, a gamingsystem, mobile computing device, or any other type and/or form ofcomputing, telecommunications or media device that is capable ofcommunication. The computer system 100 has sufficient processor powerand memory capacity to perform the operations described herein. In someembodiments, the computing device 100 may have different processors,operating systems, and input devices consistent with the device. TheSamsung GALAXY smartphones, e.g., operate under the control of Androidoperating system developed by Google, Inc. GALAXY smartphones receiveinput via a touch interface.

In some embodiments, the computing device 100 is a gaming system. Forexample, the computer system 100 may comprise a PLAYSTATION 3, orPERSONAL PLAYSTATION PORTABLE (PSP), or a PLAYSTATION VITA devicemanufactured by the Sony Corporation of Tokyo, Japan, or a NINTENDO DS,NINTENDO 3DS, NINTENDO WII, or a NINTENDO WII U device manufactured byNintendo Co., Ltd., of Kyoto, Japan, or an XBOX 360 device manufacturedby Microsoft Corporation.

In some embodiments, the computing device 100 is a digital audio playersuch as the Apple IPOD, IPOD Touch, and IPOD NANO lines of devices,manufactured by Apple Computer of Cupertino, Calif. Some digital audioplayers may have other functionality, including, e.g., a gaming systemor any functionality made available by an application from a digitalapplication distribution platform. For example, the IPOD Touch mayaccess the Apple App Store. In some embodiments, the computing device100 is a portable media player or digital audio player supporting fileformats including, but not limited to, MP3, WAV, M4A/AAC, WMA ProtectedAAC, AIFF, Audible audiobook, Apple Lossless audio file formats and.mov, .m4v, and .mp4 MPEG-4 (H.264/MPEG-4 AVC) video file formats.

In some embodiments, the computing device 100 is a tablet e.g. the IPADline of devices by Apple; GALAXY TAB family of devices by Samsung; orKINDLE FIRE, by Amazon.com, Inc. of Seattle, Wash. In other embodiments,the computing device 100 is an eBook reader, e.g. the KINDLE family ofdevices by Amazon.com, or NOOK family of devices by Barnes & Noble, Inc.of New York City, N.Y.

In some embodiments, the communications device 102 includes acombination of devices, e.g. a smartphone combined with a digital audioplayer or portable media player. For example, one of these embodimentsis a smartphone, e.g. the iPhone family of smartphones manufactured byApple, Inc.; a Samsung GALAXY family of smartphones manufactured bySamsung, Inc; or a Motorola DROID family of smartphones. In yet anotherembodiment, the communications device 102 is a laptop or desktopcomputer equipped with a web browser and a microphone and speakersystem, e.g. a telephony headset. In these embodiments, thecommunications devices 102 are web-enabled and can receive and initiatephone calls. In some embodiments, a laptop or desktop computer is alsoequipped with a webcam or other video capture device that enables videochat and video call.

In some embodiments, the status of one or more machines 102, 106 in thenetwork 104 is monitored, generally as part of network management. Inone of these embodiments, the status of a machine may include anidentification of load information (e.g., the number of processes on themachine, CPU and memory utilization), of port information (e.g., thenumber of available communication ports and the port addresses), or ofsession status (e.g., the duration and type of processes, and whether aprocess is active or idle). In another of these embodiments, thisinformation may be identified by a plurality of metrics, and theplurality of metrics can be applied at least in part towards decisionsin load distribution, network traffic management, and network failurerecovery as well as any aspects of operations of the present solutiondescribed herein. Aspects of the operating environments and componentsdescribed above will become apparent in the context of the systems andmethods disclosed herein.

B. Artificial Intelligence Network and Environment

An intelligent agent is any system or device that perceives itsenvironment and takes actions to maximize its chances of success at somegoal. The term artificial intelligence is used when a machine mimicscognitive functions such as learning and problem solving. One of thetools used for artificial intelligence is neural networks. Neuralnetworks are modeled after the neurons in the human brain, where atrained algorithm determines an output response for input signals. Themain categories of neural networks are feedforward neural networks,where the signal passes only in one direction, and recurrent neuralnetworks, which allow feedback and short-term memory of previous inputevents.

A wide variety of platforms has allowed different aspects of AI todevelop. Advances in deep artificial neural networks and distributedcomputing have led to a proliferation of software libraries, includingDeeplearning4j, which is open-source software released under ApacheLicense 2.0 and supported commercially by Skymind of San Francisco,Calif., and TensorFlow, an artificial intelligence system which isopen-source released under Apache License 2.0, developed by Google, Inc.

Deep learning comprises an artificial neural network that is composed ofmany hidden layers between the inputs and outputs. The system moves fromlayer to layer to compile enough information to formulate the correctoutput for a given input. In artificial intelligence models for naturallanguage processing, words can be represented (also described asembedded) as vectors. Vector space models (VSMs) represent or embedwords in a continuous vector space where semantically similar words aremapped to nearby points (are embedded nearby each other). Two differentapproaches that leverage VSMs are count-based methods and predictivemethods. Count-based methods compute the statistics of how often someword co-occurs with its neighbor words in a large text corpus, and thenmaps these count-statistics down to a small, dense vector for each word.Predictive models directly try to predict a word from its neighbors interms of learned small, dense, embedding vectors.

Neural probabilistic language models are traditionally trained using themaximum likelihood (ML) principle to maximize the probability of thenext word given previous words (or context) based on the compatibilityof the next word with the context. The model is trained by maximizingits log-likelihood on a training set. The objective is maximized whenthe model assigns high probabilities to the words which are desired (thereal words) and low probabilities to words that are not appropriate (thenoise words).

A framework is provided that allows a model builder to express a machinelearning algorithm symbolically, wherein the machine learning algorithmis modeled as a computation graph. This can interface with a set ofPython classes and methods that provide an API interface, resulting inre-targetable systems that can run on different hardware.

The learned values from the recurrent neural network may also beserialized on disk for doing the inference step at a later time. Theselearned values are stored in multidimensional arrays that also containshape and type information while in memory. The TensorFlow softwarelibraries call these multidimensional arrays tensors.

C. Systems and Methods for Creating, Controlling and Executing SimulatedPhishing Campaigns Using Artificial Intelligence.

The following describes systems and methods of creating, controlling andexecuting simulated phishing campaigns using artificial intelligence.

A system can be configured to send multiple simulated phishing emails,text messages, phone calls (e.g. via VoIP) and Internet basedcommunications, varying the quantity, frequency, type, sophistication,content, timing, and combination of messages using machine learningalgorithms or other forms of artificial intelligence. Such a system maybe referred to as an artificial intelligence driven agent system, orAIDA system, or simply a system. The set of phishing emails, textmessages, and/or phone calls may be referred to as a simulated phishingcampaign. In some implementations, some or all messages (email, textmessages, VoIP calls, Internet based communications) in a simulatedphishing campaign after the first simulated phishing message may be usedto direct the user to open the first simulated phishing message, or toopen the latest simulated phishing message. In some implementations,simulated phishing messages of a campaign may be intended to lure theuser to perform a different requested action, such as selecting ahyperlink in an email or text message, or returning a voice call.

In some implementations, the system may adaptively learn the best method(e.g., set of steps) and/or the best combination of messages to get theuser to perform the requested action, such as interacting with ahyperlink or opening a file. The learning process implemented by thesystem can be trained by observing the behavior of other users in thesame company or in the same industry, by observing the behavior of allother users of the system, or by observing the behavior of a subset ofother users in the system based on one or more attributes of the subsetof other users meeting one or more selected criteria.

The system can record when and how the action was performed and canproduce reports about the actions. The reports can track the number ofusers the simulated messages were sent to, whether messages weresuccessfully delivered, whether a user performed a requested action,when a requested action was performed, and a combination and timing ofmessages that induced a user to perform a requested action. In someimplementations, the system may provide training on why a user shouldnot have performed a requested action at the time that the user performsthe requested action.

An AIDA system may use information from many sources to create, train,and refine artificial intelligence models to create simulated phishingmessages for users. As examples, an AIDA system may extract informationfrom the past efficiency of templates that have been used to phishusers. An AIDA system may extract information that was made public dueto a data breach. An AIDA system may extract information from past usercommunications with a security awareness system. An AIDA system may useinformation from user profiling, for example language, gender, politicalaffiliation, interests and career information. An AIDA system may useinformation found on social media. An AIDA system may use informationfrom logs from previous simulated phishing campaigns, including allactions performed on a user and all user actions performed. An AIDAsystem may use information from event logs, for example Windows eventlogs. An AIDA system may use information from learning management system(LMS) analysis, which may inform the AIDA systems as to exactly whattraining a user has had, where the user performed well and where theuser struggled with the training that the user completed, and what theuser should know. An AIDA system may use information from companyprofiling activities, for example email exposure check results,applications used, software as a service (SaaS) services used, etc. AnAIDA system may use information from industry profiles corresponding toan industry that a user's company is associated with.

In some embodiments, an AIDA system is capable of performing riskanalysis of users, groups of users, or a company. For example, an AIDAsystem may be able to perform a risk profile of a user with respect towire transfer fraud, or IP theft. In some embodiments, an AIDA systemcan track events in a company and/or for a user in a company to identifyone or more risk points. In some embodiments, an AIDA system can trackinformation that a given user is exposed to in order to identify a riskpoint. For example, employees in a company that regularly deal with wiretransfers may be likely to be at a higher risk for wire transfer fraud,and people that are exposed to sensitive information may be at a higherrisk for leaking intellectual property.

In some embodiments, an AIDA campaign duration is limited to a fixedperiod of time, for example a fixed number of days. In some embodiments,an AIDA campaign will terminate once a certain percentage of users failthe campaign. In some embodiments, an AIDA campaign will terminate if acertain percentage of users fail the campaign in a first period of time.In some embodiments, an AIDA campaign stops for a specific user oncethat user fails a simulated phishing test as part of the campaign.

Referring to FIG. 2A in a general overview, FIG. 2A depicts some of thearchitecture of an implementation of a system 200 capable of creating,controlling and executing simulated phishing campaigns using artificialintelligence. In some implementations, the system 200 includes a server106 and a client 102 and a network 104 allowing communication betweenthese system components. The server 106 may include an AIDA system 215,a simulated phishing campaign manager 251, a trusted domains storage255A, an untrusted domains storage 255B, and a simulated phishing emailsstorage 256. The AIDA system 215 may include a system monitoring module270, a campaign controller 250, a company administrator console 295, anda security awareness system server 280. The simulated phishing campaignmanager 251 may include a user interface manager 252 and a simulatedphishing message generator 253. The simulated phishing message generator253 may include a virtual machine 254. The client 102 may include acommunications module 234, a user interface 235, a display 236, amessaging application 237, an executing application 238, a storage fortrusted domains 245A, and a storage for untrusted domains 245B.

The server 106 may be a part of a cluster of servers 106. In someembodiments, tasks performed by server 106 may be performed by aplurality of servers. These tasks may be allocated among the pluralityof servers by an application, service, daemon, routine, or otherexecutable logic for task allocation. The server 106 may include aprocessor and memory. Some or all of server 106 may be hosted on cloud108, for example by Amazon Web Services (AWS).

Each of the server 106, the AIDA system 215, and the simulated phishingcampaign manager 251, and any components or modules thereof, maycomprise a program, service, task, script, library, application, or anytype and form of executable instructions or code executable on one ormore processors. Any of the server 106, the AIDA system 215, and/or thesimulated phishing campaign manager 152 may be combined into one or moremodules, applications, programs, services, tasks, scripts, libraries,applications, or executable code.

The simulated phishing campaign manager 251 includes a simulatedphishing message generator 253, which may be implemented as or contain avirtual machine 254. Responsive to a user input, the simulated phishingcampaign manager 251 generates a campaign for a simulated phishingattack, including one or more selected phishing message templates, oneor more selected landing page templates, and one or more selectedtargeted user groups, in addition to other user input.

The simulated phishing campaign manager 251 may manage various aspectsof a traditional simulated phishing attack campaign, for example asimulated phishing attack campaign that does not use an artificialintelligence driven agent (AIDA). For example, the simulated phishingcampaign manager 251 may process input from the server 106 and/or mayprovide access as needed to various applications, modules, and othersoftware components of server 106 to other various applications,modules, and other software components of server 106. The simulatedphishing campaign manager 251 may monitor and control timing of variousaspects of a simulated phishing attack campaign, may process requestsfor access to simulated attack campaign results, and/or may performother tasks related to the management of a simulated phishing attackcampaign.

In some embodiments, the simulated phishing campaign module 251 may beintegrated with or coupled to memory 122. In some embodiments, thememory may include any type and form of storage, such as a database orfile system. The memory 122 may store data such as parameters andscripts corresponding to the choices made by a server 106 through asimulated phishing campaign manager 251, e.g. as described above for aparticular simulated phishing attack.

In an implementation, the simulated phishing campaign manager 251includes a simulated phishing message generator 253. The simulatedphishing message generator 253 may be integrated with or coupled to thememory 122 so as to provide the simulated phishing message generator 253access to parameters associated with messaging choices made for aparticular simulated campaign by e.g. the server 106. The simulatedphishing message generator 264 may be integrated with or coupled tomemory or a memory store or otherwise a storage, such as a database,containing simulated phishing emails 256. The simulated phishing messagegenerator 253 may be an application, service, daemon, routine, or otherexecutable logic for generating messages. The messages generated by thesimulated phishing message generator 253 may be of any appropriateformat. For example, they may be email messages, test or SMS messages,messages used by particular messaging applications such as, e.g.WhatsApp™, or any other type of message. Message types to be used in aparticular attack may be selected by e.g. a server 106 using a simulatedphishing campaign manager 251. The messages may be generated in anyappropriate manner, e.g. by running an instance of an application thatgenerates the desired message type, such as running e.g. a Gmail™application, Microsoft Outlook™, WhatsApp™, a text messagingapplication, or any other appropriate application. The messages may begenerated by running a messaging application on e.g. a virtual machine254, or may simply be run on an operating system of the server 106, ormay be run in any other appropriate environment. The messages may begenerated to be formatted consistent with specific messaging platforms,for example Outlook 365, Outlook Web Access (OWA), Webmail, iOS, Gmailclient, and so on.

In some embodiments, the simulated phishing message generator 253 can beconfigured to generate messages having the ability to traverse users whointeract with the messages to a specific landing page.

In some embodiments, the simulated phishing message generator 253 can beconfigured to generate a simulated phishing email. The email can appearto be delivered from a trusted email address, such as the email addressof an executive of the company at which the targeted user is employed.In addition, the email can have a “Subject:” field that is intended tocause the user to take an action, such as initiating a wire transfer. Insome embodiments, the simulated phishing message generator 253 cangenerate one or more simulated phishing emails which are stored in thesimulated phishing emails storage 256. In some embodiments, thesimulated phishing message generator 253 can generate multiple instancesof the email which may be delivered to multiple users, such as a subsetof all of the employees of the company. In some embodiments, thesimulated phishing message generator 253 can generate multiple instancesof the email which may be delivered to a user group. For example, theserver 106 can select any number of employees who should be targeted bya simulated attack, can create a user group and store this user group inthe memory 122. The simulated phishing message generator 253 canretrieve this information from the memory 122 and can generate a set ofemails similar to the email, each addressed to a respective targetidentified in the information stored in the memory 122. That is, thesimulated phishing message generator 253 can generate the emails suchthat the “From:” and “Subject:” fields of each email are identical,while the “To:” field is adjusted according to the desired targets.

In an implementation, a simulated phishing campaign manager 251 may bee.g., another name for a system administrator, such as a securitymanager, a third-party security consultant, a risk assessor, or anyother party that uses the simulated phishing campaign manager 251installed on a server. The server 106 may wish to direct a simulatedphishing attack by interacting with the simulated phishing campaignmanager 251 installed on the server. The simulated phishing campaignmanager 251 may be, for example, a desktop computer, a laptop computer,a mobile device, or any other suitable computing device. The simulatedphishing campaign manager 251 may be e.g., an application on a devicethat allows for a user of the device to interact with the server 106 fore.g. purposes of creating, configuring, tailoring and/or executing asimulated phishing attack and/or viewing and/or processing and/oranalyzing the results of a phishing attack.

In an implementation, the simulated phishing campaign manager 251, whenexecuted, causes a graphical user interface to be displayed to theserver 106. In other embodiments, the simulated phishing campaignmanager 251 allows for user input through a non-graphical userinterface, such as a user interface that accepts text or vocal inputwithout displaying an interactive image. A graphical user interface maybe displayed on a screen of a mobile phone, or a monitor connected to adesktop or laptop computer, or may be displayed on any other display.The user may interact with e.g. the graphical user interface on thedevice by typing, clicking a mouse, tapping, speaking, or any othermethod of interacting with a user interface. The graphical userinterface on the device may be a web-based user interface provided by aweb browser (e.g. Google Chrome, Microsoft Internet Explorer, or MozillaFirefox provided by Mozilla Foundation of Mountain View, Calif.), or maybe an application installed on a user device capable of opening anetwork connection to simulated phishing campaign manager 251, or may beany other type of interface.

In an implementation, the simulated phishing campaign manager 251 and/orserver 106 may make choices concerning how a simulated phishing attackis to be carried out. For example, a graphical user interface run by thesimulated phishing campaign manager 251 may be displayed to the server106. An administrator, via the server 106, may input parameters for theattack that affect how it will be carried out. For example, via theserver 106 an administrator may make choices as to which users toinclude as potential targets in the attack, the method of determiningwhich users are to be selected as targets of the attack, the timing ofvarious aspects of the attack, whether to use an attack template thatincludes values for one or a plurality of failure indicators, howresponses from targeted users should be uniquely identified, and otherchoices. These choices may be made by selecting options displayed on agraphical user interface from dropdown menus, being presented withchoices through a simulated attack wizard, or in any other appropriatemanner.

In an implementation, the simulated phishing campaign manager 251 mayallow the server 106, such as via application programming interfaces(APIs), to access and/or change settings of an account maintained withany party involved with the attack, such as, for example, a third partysecurity service provider, or may allow the server 106 to access and/orchange settings of an account maintained with a third party securityservice provider, such as one that e.g. manages an exploit server, viewbills and/or make payments to a third party security service provider,to perform these functions with other third parties involved in theattack, or provide any other functions that would be appropriate forfacilitating communications between the server 106 and any other partiesinvolved in the attack.

The system 200 also includes the client 102. A client may be a target ofany simulated phishing attack. For example, the client may be anemployee, member, or independent contractor working for an organizationthat is performing a security checkup or conducts ongoing simulatedphishing attacks to maintain security. The client 102 may be any deviceused by the client. The client does not need to own the device for it tobe considered a client device 102. The client 102 may be any computingdevice, such as a desktop computer, a laptop, a mobile device, or anyother computing device. In some embodiments, the client 102 may be aserver or set of servers accessed by the client. For example, the clientmay be the employee or a member of an organization. The client mayaccess a server that is e.g. owned or managed or otherwise associatedwith the organization. Such a server may be a client 102.

In some implementations, client 102 may include a communications module234. This may be a library, application programming interface (API), aset of scripts, or any other code that may facilitate communicationsbetween the client 102 and any of the server 106, a third-party server,or any other server. In some embodiments, the communications module 234determines when to transmit information from the client 102 to theexternal servers via a network 104. In some embodiments, the informationtransmitted by the communications module 264 may correspond to amessage, such as an email, generated by the messaging application 237.

In some embodiments, the client 102 may include a user interface 235such as a keyboard, a mouse, a touch screen, or other appropriate userinterface. This may be a user interface that is e.g. connected directlyto a client 102, such as, for example, a keyboard connected to a mobiledevice, or may be connected indirectly to a client 102, such as, forexample, a user interface of a client device used to access a serverclient 102. The client may include a display 236, such as a screen, amonitor connected to the device in any manner, or any other appropriatedisplay.

In an implementation, the client 102 may include a messaging application237. The messaging application 237 may be any application capable ofviewing, editing, and/or sending messages. For example, the messagingapplication 237 may be an instance of an application that allows viewingof a desired message type, such as any web browser, a Gmail™application, Microsoft Outlook™, WhatsApp™, a text messagingapplication, or any other appropriate application. In some embodiments,the messaging application 237 can be configured to display simulatedphishing attack emails. Furthermore, the messaging application 237 canbe configured to allow the target to generate reply messages orforwarded messages in response to the messages displayed by themessaging application 237.

The client 102 may include storage for trusted domains 245A anduntrusted domains 245B. Each of the client 102, messaging application237, executing application 238, client service 242, and user console 243may comprise a program, service, task, script, library, application orany type and form of executable instructions or code executable on oneor more processors. Any of the client 102, messaging application 237,executing application 238, client service 242, and/or user console 243may be combined into one or more modules, applications, programs,services, tasks, scripts, libraries, applications, or executable code.

The client 102 receives messages sent by the server 106 based upon thecampaign created and executed by the simulated phishing campaign manager251 and/or by the AIDA system 215. The client 102 is able to receive thesimulated phishing messages via the messaging application 237, displaythe received messages for the user using the display 236, and is able toaccept user interaction via the user interface 235 responsive to thedisplayed message. In some embodiments, if the user interacts with thesimulated phishing message, the client traverses to a landing pageselected for the phishing campaign.

Referring to FIG. 2B, in a general overview, FIG. 2B depicts some of thearchitecture of an implementation of an AIDA system 215 capable ofcreating, controlling and executing simulated phishing campaigns usingartificial intelligence. The AIDA system 215 may include a systemmonitoring module 270, a campaign controller 250, a companyadministrator console 295, and a security awareness system server 280.The system monitoring module 270 may include metrics management 271,error tracking 272, and warning count tracking 273. The companyadministrator console 295 may include metrics generator 296, phish-pronepercentage calculator 297, and dashboard generator 298. Securityawareness system server 280 may include security awareness systemadministrator 288, LDAP 289, active directory 290, a display 291, and anadministrator console 292. Security awareness system server 280 mayinclude a training modules storage 281, a landing domains storage 282, alanding pages storage 283, an accounts storage 284, a users storage 285,a groups storage 286, and a memberships storage 287. Campaign controller250 may include a serving module 230, a continuously block 231, a modelretraining module 232, and a new campaign monitor 233. Campaigncontroller 250 may include workers 260, email workers 261, and websiteworkers 263. Campaign controller 250 may include a text to speech engine240, an action queue 266, and incoming email queue 264, and an outgoingemail queue 265. Campaign controller 250 may include a campaigns storage201, a campaign recipients storage 202, a template details storage 203,a templates storage 204, a “call from” phone numbers storage 205, acampaign groups storage 206, a tagging storage 207, a tags storage 208,a models storage 216, one or more campaign recipient actions tablestorages 220 a . . . 220 n, a VoIP content storage 241, and an emaildatabase 262.

Any of the AIDA system 215, the system monitoring module 270, thecampaign controller 250, company administrator console 295, a securityawareness system server 280, the metrics management 271, error tracking272, and warning count tracking 273 may comprise one or more a program,service, task, script, library, application, or any type and form ofexecutable instructions or code executable on one or more processors.

In some embodiments, the system monitoring module or system monitor 270keeps track of the health of functional blocks of the system 200. Insome embodiments, the system monitoring module monitors the delays,queues, loads, and other parameters of the system 200, such that thesecurity awareness system administrator 288 can keep track of the system200. In some embodiments, the system monitoring module 270 includesmetrics management 271, which keeps track of any performance metrics forany functional block or module in the system. In some embodiments,metrics management 271 keeps track of the number of messages processedin a given unit of time. In some embodiments, metrics management 271keeps track of how many instances of each functional block are in use ata given time. In some embodiments, metrics management 271 keeps track ofhow many of each type of messages were sent. In some embodiments,metrics management 271 keeps track of how many actions were stored inthe one or more actions table(s). In some embodiments, metricsmanagement 271 keeps track of how many messages or different types wereput into different queues. In some embodiments, the system monitoringmodule 270 includes error tracking 272. In some embodiments, errortracking 272 keeps track of actions in a queue which are not processed.In some embodiments, error tracking 272 keeps track of user emailaddresses that are incorrect. In some embodiments, error tracking 272raises an error if the system monitoring module 270 cannot access one ormore databases. In some embodiments, the system monitoring module 270includes warning count tracking 273. In some embodiments, warning counttracking 273 keeps track of the number of warnings that have occurred ina period of time.

The data identified, monitored, obtained or processed by the systemmonitoring module may be stored in any type and form of database, filesor logs. In some embodiments, such data may be stored in a time seriestype or based database. In some embodiments, the data for the systemmonitoring module may be stored in an open source time series databasethat is optimized for fast, high-availability storage and retrieval oftime series data. An example of an open-source time series database isINFLUXDB, which is written in programming language GO and is provided byInfluxData of San Francisco, Calif. In some embodiments, the time seriesdatabase is hosted in the cloud. In some embodiments, the time seriesdatabase is local to the server 106.

The data that is stored by the system monitoring module may beprocessed, analyzed and displayed via a tool and/or user interface. Thetool and/or user interface may allow and/or provide for a systemadministrator to query and alert on metrics and create a manageddashboard to visually display the data and metrics. In some embodiments,the time series data that is accessed by the system monitoring module isanalyzed and visually displayed using an open source software platformto allow a security system administrator 288 to query and alert onmetrics and to create dashboards to visually display time series data.An example of an open source software platform for time series analyticsand visualization is Grafana, which is provided by GrafanaLabs (formerlyknown as Raintank) of New York, N.Y. In some embodiments, the analyticsand visualization platform is hosted in the cloud. In some embodiments,the analytics and visualization platform is hosted locally on the server106. In some embodiments, the analytics and visualization platform is anopen source platform. In some embodiments, the analytics andvisualization platform is proprietary to the security awareness systemprovider. In some embodiments, the system monitoring module 270retrieves the time series data in one or more folders on the server 106.In some embodiments, the system monitoring module 270 uses plug-ins toretrieve the time series data. In some embodiments, the systemmonitoring modules uses an API to enable a loading mechanism to retrievethe data.

In some embodiments, more than one instance of the system monitoringmodule 270 may exist. In some embodiments, there exists one or moreinstance of the system monitoring module 270 to monitor one or moremodel managers 370. In some embodiments, there exists one or moreinstance of the system monitoring module 270 to monitor the operation ofone or more campaign controllers 250. In some embodiments, one or moreinstance of the system monitoring module 270 monitors both the modelcreation and the operation of the campaign controller 250. In someembodiments, one or more instance of the system monitoring module 270keeps track of the health of one or more workers 260, one or more emailworkers, 261, one or more serving modules 230, one or more modelcontrollers 320, and one or more Q&A workers 315.

AIDA system 215 may include a company administrator console 295. Thecompany administrator console 295 enables an administrator of an accountto create an AIDA simulated phishing campaign (also referred to as anAIDA campaign) using a user interface, such as graphical user interfaceor command line interface, and/or an application programming interface(API). In some embodiments, the company administrator, via the companyadministrator console 295, inputs the date and time that they want theAIDA campaign to start. In some embodiments, the company administratorinputs the time zone for the AIDA campaign. In some embodiments, thecompany administrator selects whether or not the AIDA campaign shouldallow text messages. In some embodiments, the company administratorselects whether or not the AIDA campaign should allow VoIP calls. Insome embodiments, the company administrator selects the user groups thatare to be included in the AIDA campaign. In some embodiments, thecompany administrator can select from one or more pre-existing usergroups. In some embodiments, the company administrator can select fromone or more users to create a new user group.

In some embodiments, the company administrator console 295 includesmetrics generator 296 which tracks metrics about what happened in theAIDA campaign. In some embodiments, metrics generator 296 tracks thenumber of users of the AIDA campaign. In some embodiments, metricsgenerator 296 tracks the number of VoIP calls made in the AIDA campaign.In some embodiments, metrics generator 296 tracks the number of textmessages sent in the AIDA campaign. In some embodiments, metricsgenerator 296 tracks the number of emails sent in the AIDA campaign. Insome embodiments, metrics generator 296 tracks the number of userinteractions with links in the AIDA campaign.

In some embodiments, the company administrator console 295 includes ametric generator or calculator 296, such as a phish-prone percentagecalculator 297. The metric generator may establish, generate orcalculate any type and form of metrics and/or statistics related to anyof the data for any simulated phishing campaigns, any data processed,identified or provided by the campaign controller and/or and data storedin any of the models, and/or any data stored in any of the databasesdescribed herein. The metric generator may establish, generate orcalculate any type and form of metrics and/or statistics related to anyof the data stored in, with or associated with any of the following forexample: campaign recipient actions 220, campaigns 201, campaignrecipients 202, template details 203, templates 204, “call from” phonenumbers 205, campaign groups 206, tagging 207, tags 208, trainingmodules 281, landing domains 282, landing pages 283, accounts 284, users285, groups 286, memberships 287, trusted domains 245 and 255, untrusteddomains 245 and 255, simulated phishing emails 256, any of the models216, metagraph 361, Q&A pairs 350, approved Q&A pairs 351, neurons 363,training Q&A pairs 352, Testing Q&A pairs 353, all configuration superparameters 363, groups 286, memberships 287, accounts 284 and users 285.The metrics and/or statistics may include any type and form of average,mean, summation, percentages, count and/or function of any one or moredata items or combination of data items including over any time periodor frequency or temporal parameters.

In some embodiments, phish-prone percentage calculator 297 calculates aphish-prone percentage as the percentage of users that interacted with alink in the AIDA campaign out of the total number of users that receivedmessages as part of the campaign. In some embodiments, phish-pronepercentage calculator 297 calculates a phish-prone percentage as thepercentage of messages for which a user interacted with a link in themessage as part of the AIDA campaign out of the total number of messagessent in the AIDA campaign. In some embodiments, phish-prone percentagecalculator 297 calculates the phish-prone percentage across all of thecampaigns that have been executed for the company. In some embodiments,phish-prone percentage calculator 297 calculates the phish-pronepercentage for the most recent AIDA campaign for the company.

In some embodiments, the company administrator console 295 includesdashboard generator 298. In some embodiments, dashboard generator 298displays an overview page which displays information about an AIDAcampaign. In some embodiments, dashboard generator 298 generates adisplay of the number of times a user interacts with a link in asimulated phishing message that is part of an AIDA campaign over a giventime period after the start of the AIDA campaign. In some embodiments,dashboard generator 298 generates a display of the number of times auser has interacted with a link in each of the first number of timeperiods after the start of an AIDA campaign. In some embodiments, thetime period is one hour. In some embodiments, dashboard generator 298displays a circle with a size that is proportionate to the number ofinteractions with a simulated phishing message in a time period, whereinthe greater the number of user interactions with links in simulatedphishing messages, the larger the size of the circle that is displayed.In some embodiments, dashboard generator 298 displays the status of theAIDA campaign as one of stopped, started, paused, ongoing, discontinued,completed, finished, cancelled, restarted, or aborted. In someembodiments, dashboard generator 298 displays the date and time that anAIDA campaign was created on. In some embodiments, dashboard generator298 displays the date an AIDA campaign was started on. In someembodiments, dashboard generator 298 displays the end date of an AIDAcampaign. In some embodiments, if the campaign is one of stopped,paused, ongoing, discontinued, cancelled, restarted, or aborted, the enddate is displayed as “Not Finished”. In some embodiments, the companyadministrator can highlight a specific recipient and see all the actionsperformed on that recipient (e.g. messages sent to the recipient, whatdetail page was used, when the message was sent, etc.) and all theactions that the recipient performed (e.g. clicked on a link in a textmessage, responded to an email, etc.). For example, if there is a recordin the one or more campaign recipient actions table(s) indicating thatthe campaign controller 250 sent them an email, then the companyadministrator can click on this action and the company administratorconsole 295 displays a copy of the detail page of the template that wasused to generate the email that the user received.

In some embodiments, dashboard generator 298 displays information aboutthe browser, agent or platform that the user uses to view the messagesof a campaign. In some embodiments, dashboard generator 298 displaysinformation about multiple user's browsers, agents, or platforms in apie chart format.

In some embodiments, dashboard generator 298 displays a user page whichdisplays an AIDA campaign report which individually shows actionsassociated with each of the recipients of the AIDA campaign. In someembodiments, dashboard generator 298 displays one or more metrics of thecampaigns across one or more tabs, and when a company administratorclicks on one of the tabs, more detailed information is shown to thecompany administrator. In one embodiment, dashboard generator 298generates one or more tabs for AIDA campaign recipients, emails sent,emails delivered, emails opened, emails clicked, emails bounced, SMSmessages sent, SMS messages clicked, SMS message errors, phone callsmade, and phone call errors. In one embodiment, when the companyadministrator selects the recipients tab, the dashboard generatordisplays a list of the email addresses of all of the recipients of theAIDA campaign and an indication of whether or not they failed thecampaign.

Referring briefly to FIGS. 2C, 2D and 2E are examples of user interfacesand/or dashboards for displaying metrics and statistics about simulatedphishing campaigns. An administrator can click on any of the tabs of theexample user interfaces to see any of the following information,including any details for the same: EMAILS DELIVERED, EMAIL S OPENED,EMAILS CLICKED, EMAILS BOUNCED, SMS SENT, SMS CLICKED, SMS ERRORS, PHONECALLS MADE, PHONE CALL ERRORS. The administrator can see for each usereach email the user received, if the user clicked on a link in the emailand/or each SMS sent, and/or each phone call placed. If theadministrators clicks or hovers over any of the information indicatorsin the user interface of FIGS. 2C-2E, the system will provide moreinformation on the cause of the error or issue.

AIDA system 215 may include a security awareness system 280 running onone or more servers, sometimes also referred to as security awarenesssystem server. The security awareness system 280 may comprises one ormore applications, programs, services, processes, libraries or any typeand form of executable instructions executable on one or more computingdevices. Security awareness system 280 provides a user interface for thesecurity awareness system administrator 288 through the administratorconsole 292. In some embodiments, the administrator console 292 providesan interface for the security awareness system administrator 288 to makeupdates on one or more of the campaign controllers 250 and the workers260 to enable the use of a specific version of a model. In someembodiments, the administrator console 292 on the security awarenesssystem 280 provides an interface for security awareness systemadministrator 288 to add new versions of template detail pages for oneor more templates. In some embodiments, the administrator console 292 onthe security awareness system 280 provides an interface for securityawareness system administrator 288 to specify the usage percentage forone or more template detail pages of a template, such that each templatedetail page gets used a specified percentage of the time. In someembodiments, the usage percentages for specific template detail pagesand/or specific versions of template detail pages are calculated usingcount values for records that have the same template detail ID. Eachtime the template detail ID gets used, the percentage that each versionof the template detail page has been used is calculated using the countvalues. The version of the template detail ID page that is the greatestamount less than the target usage percentage gets used in creating themessage. In some embodiments, when the security system administrator 288adds one of a new template detail page and a new version of a templatedetail page, the count values of records with the same template detailID are set to zero.

In some embodiments, the security awareness system 280 includes display291. The display 291 may provide a user interface and/or dashboard toshow or display any results from execution of simulated phishingcampaigns and allow a user to review any such results. In someembodiments, display 291 is used to display system information providedby the system monitoring module 270. In some embodiments, the displayprovides an administrator console interface or user interface from whicha user can edit, create, and/or manage one or more of the following:accounts, phishing templates, landing pages, landing domains, templates,such as AIDA or training templates, training modules and any of theother components, modules, functions of any of the system describedherein.

In some embodiments, the security awareness system 280 includes anactive directory 290 and LDAP 289 and/or interfaces to an activedirectory 290 running or operating on one or more other devices using anLDAP (Lightweight Directory Access Protocol) protocol 289. In someembodiments, LDAP 289 is the protocol used to communicate with activedirectory 290. In some embodiments, LDAP 289 is a service thatimplements LDAP and provides services to access LDAP based systems, suchas the active directory. In some embodiments, the server of the securityawareness system implements or provides the active directory. In someembodiments, another server implements or provides the active directory.The security awareness system interfaces or accesses the activedirectory 290 to identify, obtain and/or extract user information, suchas email address, first and last name, location, manager information andany other information about the user stored in the active directory. Anyinformation stored or provided by the active directory 290 may be usedby the campaign controller for creating, managing or executing simulatedphishing campaigns. In some embodiments, the campaign controlleraccesses or interfaces to the active directory 290, such as via LDAP. Insome embodiments, the campaign controller communicates or interfaceswith the security awareness system to obtain the user information fromthe active directory 290. In some embodiments, users may be imported oradded manually, such as if an active directory is not used.

In some embodiments, the security awareness system 280 includes astorage for training modules 281. In some embodiments, the securityawareness system 280 includes a storage for landing domains 282. Thesecurity awareness system may store any of the training modules and/orlanding domains in any type and form of database, including cloud basedstorage or local storage.

In some embodiments, the security awareness system 280 includes astorage for landing pages 283. A landing page may comprise a uniformresource locator or domains constructed to identify or point back to aserver or system maintained or known by the server 280 and/or campaigncontroller. In some embodiments, the URL or domain identifies a trackingservice or server of the system used for tracking. In some embodiments,the URL or domain is constructed to mimic, masquerade, disguise orsimulate a domain or URL they are not. In some embodiments, the datastructure for the landing page information stored for each landing pagein the landing pages storage 283 includes one or more of a landing pageID, the HTML content of the landing page, the title of the landing page,one or more identifiers of the landing page, the account (company) IDthat the landing page is to be used for, the landing page category ID,the date and time the landing page was created at, and the date and timethe landing page was updated at. The categories identified by thecategory ID for the landing pages can be any predetermined categoryprovided by the system or user generated or specified categories. Thelanding page categories may be used to group landing pages based oncommon traits or attributes. Some examples of categories include but arenot limited to: point of failure video training, phishing for sensitiveinformation, and error pages. The categories may be based on a type ofcampaigns, templates, models, personas, companies, groups of users orattributes of any of the foregoing. In some embodiments, landing pagesmay be assigned to one category, while in other embodiments, landingpages may be assigned to multiple categories.

In some embodiments, the security awareness system 280 includes astorage for accounts 284. In some embodiments, the data structure forthe account information stored for each account in accounts storage 284includes one or more of an account ID, a company name, a companyaddress, a company phish-prone percentage, an industry ID, a companysize, the business hours for the company, the days of the week that thecompany operates, the region of the company, and the time zone of thecompany. In some embodiments, the account storage 284 is a relationaldatabase. In some embodiments, the account storage relational database284 has a relationship with users storage 285, wherein the relationshiplinks one or more user records from users storage 285 to an account ID.In some embodiments, account storage relational database 284 has arelationship with groups storage 286, wherein the relationship links oneor more group records from groups storage 286 to an account ID. In someembodiments, the account storage relational database 284 has arelationship with campaigns storage 201, wherein the relationship linksone or more campaign records from campaigns storage 201 to an accountID.

In some embodiments, the security awareness system 280 includes astorage for users 285. In some embodiments, the data structure of theuser information stored for each user in users storage 285 includes oneor more of a user ID, a user email address, the account ID associatedwith a user, a user's name, a user's job title, a user's phone number, auser's mobile phone number, a user's location, what time zone a user isin, a user's division, a user's manager's name, a user's manager's emailaddress, a user's employee number, a user's gender, and the date andtime that a user's record was created and/or updated.

In some embodiments, the security awareness system 280 includes astorage for groups 286. In some embodiments, the data structure of thegroup information stored for each group in groups storage 286 includesone or more of a group ID, an account ID associated with a group, a nameof the group, and a date and time that the group record was createdand/or updated. In some embodiments, groups storage 286 is a relationaldatabase. In some embodiments, groups storage relational database 286has a relationship with users storage 285, wherein the relationshiplinks one or more users from users storage 285 to a group ID.

In some embodiments, the security awareness system 280 includes astorage for memberships 287. In some embodiments, membership storage 287is a relational database which links users to groups. In someembodiments, the data structure of the membership information stored inmemberships storage 287 includes one or more of a membership ID, a userID, a group IP, and a date and time that a membership record was createdand/or updated. In some embodiments, memberships storage 287 lists whichusers are in which groups. In some embodiments, a user can be inmultiple groups.

AIDA system 215 may include one or more campaign controllers 250. Insome embodiments, the campaign controller includes a serving module 230.The campaign controller includes, is configured with or implemented tohave any of the instructions, function and/or logic to perform theoperations and functionality of the campaign controller describedherein, such as creating, managing and executing a simulated phishingcampaign In some implementations, the serving module is the intelligentengine or brain of campaign controller 250 that receives and processesinput related to a campaign and provides output regarding the operation,instruction or functions for a campaign The serving module 230 usesinformation, such as from any of the storage or databases describedherein, to design a customized AIDA simulated phishing campaign for agiven user, such as a campaign that is likely to have the highestprobability of getting that specific user to interact with a link. Theserving module may use information about any results from executingsimulated phishing campaigns for that user and/or other users.

In some embodiments, design choices for an AIDA campaign include choiceof model, choice of template including detail pages that will get used,when to start the campaign, duration of the campaign, frequency or howoften to test a campaign recipient, type(s) of communications ormessages (e.g., email, text, VoIP, etc.) of the campaign and a timing ofthe campaign. In some embodiments, the choice of a template for a givenuser may be made based on user attributes, or it may be randomlyselected. In some embodiments, templates are available in advance, andeach template could have any number of emails, text or VoIP calls, inany order. In some embodiments, the detailed pages and steps in acampaign are pre-determined when a template is created. In someembodiments, a state machine progresses an AIDA campaign through eachstage of a template, performing actions that need to be performed withtiming that is associated with that template. For example, the stages ofa template may be “send an email”, followed by “send a text”, followedby “call”. The template gets worked through from front to back until auser action occurs which indicates that they have failed the test andneed to go for training. As soon as a user interacts with a link, theAIDA campaign for that user stops. A template may have any number ofsteps and any combination of different message types. In one embodiment,a template comprises one of each of an email, an SMS or text message,and a VoIP call.

In some embodiments, serving module 230 will provide to a campaigncontroller 250 combinations of data about the user and campaigncontroller 250 may use that data to further customize an AIDA campaignfor that user. In some embodiments, data may include information aboutthe back-off time to be used between messages, information aboutspecific detail pages related to a template for a model selected for theuser, and information representing specific wording of messages that aresent to the user. In some embodiments, serving module 230 knows whichmodel and version of the model to use for a given user in a givencampaign through reading information from template details storage 203.In some embodiments, serving module 230 periodically polls one or moremodel storages 216 in order to determine if a new model is available ora new version of a model is available. In some embodiments, servingmodule 230 will load the new model or the new version of the model tomemory so that the model can be used by campaign controller 250.Multiple models can be loaded at one time, and multiple versions of asingle model can be loaded at one time. In some embodiments, servingmodule 230 can view and access all models and all versions of allmodels.

In some embodiments, serving module 230 determines or selects a personamodel from models storage 216 with which to phish a given AIDA campaignrecipient for a given AIDA campaign. In some embodiments, serving moduledetermines or selects a persona model that meets one or more criteria orthreshold for a rate of success for a user or group of users. In someembodiments, serving module determines or selects a persona model thatis more likely or most likely, such as via machine learning, to cause auser or group of users to interact with a link of a simulated phishingcommunication or message. In some embodiments, serving module 230determines one or more templates and one or more detail pages within theone or more templates with which to phish a given AIDA campaignrecipient for a given AIDA campaign. In some embodiments, serving module230 determines one or more frequencies of an AIDA campaign and/or one ormore timings of an AIDA campaign with which to phish a given AIDAcampaign recipient for a given AIDA campaign. In one embodiment, servingmodule 230 determines one or more training modules for a user to undergoif the user fails a given AIDA campaign. In some embodiments, the modelcomprises a neural network that was created during a training process,combined with a metagraph which is a set of functions and parameters tocall. In some embodiments, a metagraph is stored in metagraph storage361. The metagraph stores may comprise a text file or a Protobuf file.In some embodiments, serving module 230 identifies, specifies orprovides the set of functions and/or parameters to call, to execute themodel.

In some embodiments, an AIDA campaign has a defined order in which totake actions for a campaign recipient, which is defined by a template. Atemplate may comprise any type and form of data structure, configurationand/or parameters, set of data, policies and/or rules for specifying howto create, execute and/or manage a simulated phishing campaign. Thetemplate may specify any of the design choices for the campaign,including but not limited to model, template, detail pages that will getused, when to start the campaign, duration of the campaign, frequency orhow often to communicate with a campaign recipient, type(s) ofcommunications or messages (e.g., email, text, VoIP, etc.) of thecampaign, order of communications/messages and a timing of the campaign,including any timing between communications/messages.

In some embodiments, campaign controller 250 may create a template foran AIDA campaign as the campaign is running based on a user's actions inresponse to an action sent to the user by campaign controller 250. Insome embodiments, campaign controller 250 may modify an existingtemplate during an AIDA campaign based on a user's actions in responseto an action sent to the user by campaign controller 250. In someembodiments, campaign controller 250 may change the order of actions inthe template based on a user's actions in response to an action sent tothe user by campaign controller 250. In some embodiments campaigncontroller 250 may change the content of messages described by thetemplate detail pages and to be sent to a user, based on a user'sactions in response to an action sent to the user by campaign controller250. In some embodiments campaign controller 250 may change the timingof messages sent to a user based on a user's actions in response to anaction sent to the user by campaign controller 250. In some embodiments,serving module 230 performs these functions on behalf of campaigncontroller 250. In some embodiments, campaign controller 250 makesdeterminations based on a user's actions in response to an action sentto the user by campaign controller 250 in addition to other informationthat the system knows or can obtain about the user.

In some embodiments, when a recipient in a campaign responds to amessage of the campaign, campaign controller 250 sends the recipient'sresponse to serving module 230. In some embodiments, the recipient'sresponse is capture as a string. In some embodiments, serving module 230receives the recipient's response as a string and parses the string intoindividual words and runs the individual words into a model in order todetermine an appropriate response that will encourage the recipient tointeract with a link in a message that was sent to them. In someembodiments, serving module 230 sends the string received from campaigncontroller 250 along with a metagraph containing a set of steps toprocess the string to a model. In some embodiments, serving module 230executes the metagraph using a TensorFlow SDK. In some embodiments, themetagraph is stored in metagraph storage 361. The SDK is a set of APIsand the order in which serving module 230 calls the APIs determines theprogram or order of actions to be executed. In some embodiments, servingmodule 230 parses the string into individual words and from the wordscreates vectors into a vocabulary array. In some embodiments, avocabulary array comprises a multidimensional array containing words. Insome embodiments, the vocabulary array is created using unique wordssourced from the questions and answers that were used to train themodel.

In some embodiments, serving module 230 passes an integer for every wordof the string received from campaign controller 250 to the model. Insome embodiments, serving module 230 sends a stop code after sending oneor more integers to the model. In some embodiments, in response toreceiving the inputs from serving module 230, the model returns toserving module 230 a series of integers. In some embodiments, servingmodule 230 translates the integers received from the model back intowords using the vocabulary array. In some embodiments, serving module230 reconstructs a string from the words from the vocabulary arraycorresponding to the integers, and sends the string to campaigncontroller 250. In some embodiments, campaign controller 250 uses thisstring to create a message to a campaign recipient.

In some embodiments, an appropriate response generated by serving module230 may include another copy of the link that was in a previous message.In some embodiments, an appropriate response generated by serving module230 may include a new link for the user to interact with. In someembodiments, serving module 230 generates an appropriate response to thecampaign recipient according to a model selected for the campaignrecipient for the current campaign.

In some embodiments, campaign controller 250 includes a model retrainingmodule 232 or model retrainer. The model retraining module 232periodically retrains one or more artificial intelligence models 216.The model retraining module 232 may initiate retraining for a modelafter the model has been used a number of times and there is history onhow effective the model has been. The model retraining module 232 mayinitiate retraining for a model because new information pertaining tothe model has been acquired by AIDA system 215. The model retrainingmodule 232 may initiate retraining for a model once it has received andstored sufficient recipient feedback to the model from AIDA campaigns.Once the model training module 232 has created a new version of a model,the new version of the model is stored in the appropriate model storage216. In some embodiments, testing such as A/B testing may be used inorder to determine if one version of a model is more effective than asecond version of the model.

In some embodiments, campaign controller 250 includes a storage forcampaigns 201. In some embodiments, the data structure of the campaigninformation stored for each campaign in campaign storage 201 includesone or more of a campaign ID, an account ID, a campaign name, a date andtime that the campaign is scheduled to start, a date and time that thecampaign started, a date and time that the campaign ended, a group toadd a user to if the user interacts with a link in a simulated phishingmessage, a number of delivered simulated phishing emails that weredelivered for this campaign, a number of simulated phishing emails thatbounced back, a number of simulated phishing emails that were opened, anumber of simulated phishing emails that a recipient interacted with, astatus of the campaign, a phish prone percentage, a time zone, a dataand time that the campaign was created and/or updated, whether or nottext and/or SMS messages are allowed for the campaign, and whether ornot VoIP calls are allowed for the campaign. In some embodiments,campaign storage 201 is a relational database. In some embodiments,campaigns storage relational database 201 has a relationship with groupsstorage 286 and recipients storage 202, wherein the relationship linksone or more recipients to a group, and one or more groups to a campaign.In some embodiments, when a new AIDA campaign is created by the securityawareness system server 280, new campaign monitor 233 creates a recordfor the campaign in campaigns storage 201 when the campaign is created,based on information provided in the company administrator console 295.Records in campaigns storage 201 are associated with accounts fromaccounts storage 284 which contains information about the company thecampaign is associated with, for example the industry that the companyis in. In some embodiments, the new campaign monitor 233 detects that anew campaign has been created by looking for records in campaign storage201 where one of the created at date and time, the start date and time,and the scheduled at data and time of the record is in the past andwhere the end date and time of the record is not indicated and/or is inthe future. In some embodiments, new campaign monitor 233 detects that anew campaign is running or executing by checking whether or not acorresponding process or a new process is executing or running inmemory. In some embodiments, when campaign controller 250 detects a newcampaign record in campaigns storage 201, campaign controller 250updates the campaign record in campaigns storage 201 with the actualcampaign start time, and creates one or more records in campaignrecipients storage 202, for each user that is a recipient for thecampaign. In some embodiments, the recipients comprise users that areselected for the campaign by the company administrator in the companyadministrator console 295. In some embodiments, the recipients compriseusers that are members of groups selected for the campaign by thecompany administrator in the company administrator console 295. The userrecord created in campaign recipients storage 202 is associated with thecampaign record in campaigns storage 201 for the campaign. In someembodiments, information about a user that is a recipient for a campaignis extracted from users storage 285 when the user record is created incampaign recipients storage 202, for example a user's email address andmobile phone number, what account the user is on, and what campaign theuser is in. In some embodiments, information about a user is uploaded bya company administrator when the user record is created in campaignrecipients storage 202. In some embodiments, information about a user iscreated based on a synchronization process with the account activedirectory 290 or using the LDAP service 289 to access an accountdirectory. In some embodiments, information about a user is created orobtained from an active directory service 290 or via an LDAP service289, or otherwise using LDAP to communicate with an active directory.

In some embodiments, the campaign controller 250 includes continuouslyblock 231. The continuously block may include any type and form ofexecutable instructions performing the functions and operationsdescribed herein. In some embodiments, the continuously block is acomponent or module of the campaign controller. In some embodiments, thecontinuously block is a set of functions, operations and instructions ofthe campaign controller. In some embodiments, the continuously block isa logical and executable construct for performing a set of functions. Aswith some or all of the other components of the AIDA system 215,multiple instances of continuously block 231 may be instantiatedsimultaneously for scalability and redundancy. In some embodiments, foreach active AIDA campaign, continuously block 231 dynamically creates alist of campaign recipients that have not interacted with a link (e.g.,all the users that are still actively in campaigns, since once a userclicks on a link the campaign ends for that user) based on the time ofthe last action for the recipient. In some embodiments, continuouslyblock 231 dynamically creates this list by running a SQL query thatjoins to campaigns storage 201, to campaign recipients storage 202, andto campaign recipient actions storage 220. In some embodiments,continuously block 231 retrieves a number of records from thedynamically created list of campaign recipients and checks the number ofrecords to determine if AIDA system 215 should perform an action for arecipient. In some embodiments, continuously block 231 continues toretrieve a number of recipient records to check to see if the recipientsshould have an action performed for them. If the recipient needs anaction to be performed, campaign controller 250 puts an action messageinto action queue 266 to perform the action for the recipient, and therecipient's action table 220 is updated with a new record for the actionthat has been put into the action queue 266. If all recipient actionshave been performed and all recipient records have been checked, in someimplementations continuously block 231 will sleep for a period of timeand then restart checking recipient records. In some embodiments, actionqueue 266 is an Amazon Simple Queue Service (SQS) queue.

In some embodiments, continuously block 231 may use a state machine todetermine if it is time to send a recipient an action. If a statemachine is used to track the state of each recipient, the state machineis updated when campaign controller 250 puts the action for therecipient into action queue 266. In some embodiments, the recipientmoves from one step in a template to a next step in a template when anaction is put into action queue 266 for the recipient. In someembodiments, the recipient moves from one step in a template to a nextstep in a template when an action is performed on a recipient. In someembodiments, when an action is put into action queue 266 for arecipient, the action is written into campaign recipient action storage220 as a new record. In some embodiments, when an action is performed ona recipient, the action is written into the campaign recipient actionstorage 220 as a new record.

In some embodiments, continuously block 231 examines campaign storage201 to find all actively running campaigns, and then examines campaignrecipients storage 202 for all recipients in actively running campaigns.In some embodiments, continuously block 231 looks at the date and timethe recipient was last processed for needed actions (LastCheckedAt). Insome embodiments, recipients are retrieved by continuously block 231 forprocessing based on their LastCheckedAt data and time, with therecipients with the oldest LastCheckedAt date and time being retrievedfirst. In some embodiments, when continuously block 231 retrieves therecord of a recipient in an actively running campaign to be reviewed,that recipient's campaign recipient record is marked so that no othercontinuously block 231 will retrieve the same recipient's record.

In some embodiments, after an action is performed for a recipient, thereis a minimum amount of time that must pass before a next action isperformed for this recipient. In some embodiments, the amount of timebetween when an action is performed for a recipient and when the nextaction is performed for a recipient may be bounded by a minimum valueand a maximum value. For example, AIDA system 215 may be configured suchthat at least one hour and not more than two and a half hours must passbetween consecutive actions performed for a recipient in an activecampaign. In some embodiments, the amount of time between when an actionis performed for a recipient and when the next action is performed for arecipient may be randomly chosen. In some embodiments, the amount oftime between when an action is performed for a recipient and when thenext action is performed for a recipient may be randomly chosen withinthe bounds of a minimum value and a maximum value.

In some embodiments, after an action is performed by campaign controller250 for a recipient of an active campaign, the LastCheckedAt data andtime is set to one hour past the time when the action is performed. Forexample, in some embodiments, if an action is performed by campaigncontroller 250 of a recipient of an active campaign on January 1^(st) at7:00 a.m., the LastCheckedAt data and time is set to January 1^(st) at8:00 a.m. In some embodiments, the LastCheckedAt data and time is storedin campaign recipients storage 202 in a record for the recipient.Continuously block 231 determines which recipients are due for a nextaction by looking for recipients, wherein the LastCheckedAt date andtime in the recipient record in the campaign recipients storage 202 isolder than the present time. When the LastCheckedAt date and time in therecipient record in campaign recipients storage 202 is older than thepresent time, then continuously block 231 checks when the last actionwas sent to the recipient. In some embodiments, continuously block 231determines when the last action was sent to the recipient by sorting therecords in the one or more campaign recipient actions table(s) indescending order in which they were created, and selecting the mostrecent record based on the time at which that record was created, whichis the LastSentAction date and time. Continuously block 231 thengenerates a random number representing a duration of time. In someembodiments, the random number is less than a preset maximum value forthe amount of time between when an action is performed for a recipientand when the next action is performed for a recipient. Continuouslyblock 231 adds the random number representing a duration in time to theLastSentAction date and time. If the sum of the LastSentAction data andtime plus the random number presenting a duration in time is older thanthe current time, then continuously block 231 determines that it is timefor the recipient to be sent an action. In some embodiments,continuously block 231 checks the one or more campaign recipient actionstable(s) in the campaign recipient actions storage 220 periodically tosee if any recipient needs to be sent an action.

If it is time to send a recipient a next action, then in someembodiments, campaign controller 250 moves to the next step in thatrecipient's template to determine what action to perform for thatrecipient. In some embodiments, campaign controller 250 determines anext action to perform for that recipient based on one or more of therecipient's responses to a previous action. In some embodiments, aftercampaign controller 250 puts an action to be sent to the recipient intoaction queue 266, continuously block 231 updates the LastCheckedAt dateand time for that recipient to the current time plus a minimum back-offtime before a next action can be sent to the recipient. In someembodiments, after the message is successfully delivered to therecipient, continuously block 231 updates the LastCheckedAt date andtime for that recipient to the current time plus a minimum back-off timebefore a next action can be sent to the recipient.

In some embodiments, campaign controller 250 may utilize theLastCheckedAt date and time field in the campaign recipient record for arecipient to cause the AIDA system to ignore the recipient for a periodof time and not send the recipient any actions. In some embodiments,campaign controller 250 retrieves the business hours start and businesshours end files from the accounts table for the account associated withthe recipient. If the current time is outside of business hours, then insome embodiments continuously block 231 will set the LastCheckedAt dateand time to the start of the next business day so that the user isn'tlooked at by campaign controller 250 until then. In some embodiments,campaign controller 250 determines statutory or mandatory holidays basedon a location or region of the recipient or the account associated withthe recipient, and continuously block 231 will set the LastCheckedAtdate and time to the start of the next working day after the statutoryor mandatory holiday. In some embodiments, campaign controller 250determines that the current date and time falls on a weekend, andcontinuously block 231 then sets the LastCheckedAt date and time to bethe start of the first day after the weekend. It can be seen how thecampaign controller 250 can use the LastCheckedAt date and time toinsert any desired back-off duration between actions of the campaign fora recipient.

In some embodiments, continuously block 231 uses business logic based onone of a recipient, an account associated with the recipient, anattribute associated with the recipient, an attribute associated withthe account associated with the recipient, and other informationpertaining to the recipient in order to determine which recipientrecords to examine such that continuously block 231 does not have tolook at all recipients that are in active campaigns on each review. Insome embodiments, artificial intelligence based timing models will beused to determine the best timing for a next action for a givenrecipient in a given campaign, rather than using a random back offperiod.

In some embodiments, campaign controller 250 includes storage forcampaign recipients 202. In some embodiments, security awareness systemserver 280 accesses recipient records in campaign recipients storage 202to determine all the users that are in an AIDA campaign. In someembodiments, campaign controller 250 can determine whether a user hasbeen a recipient in an AIDA campaign in the past by determining if arecipient record for the user exists in campaign recipients storage 202.Campaign controller 250 can determine which campaign or campaigns theuser was a recipient for by reading the campaign ID in each of therecipient records for the user in campaign recipients storage 202. Insome embodiments, the data structure of the campaign recipientsinformation stored for each campaign recipient in campaign recipientstorage 202 includes one or more of a recipient ID, a campaign ID, therecipients' user ID, the last time this recipient was processed forneeded actions (LastSentAction date and time), an indication of thefirst next time that a recipient should be considered ready to receive anext campaign action (LastCheckedAt date and time), the recipient'semail address, and the recipient's phone number. In some embodiments, ifthe user has not previously been part of an AIDA campaign, campaigncontroller 250 collects data including the attributes and features ofthe user from users storage 285. In some embodiments, the informationthat campaign controller 250 collects from users storage 285 includes auser's email address, a user's phone number, a user's mobile phonenumber, the account that the user is associated with (e.g. the companythat the user is associated with), and other information that that canbe accessed about the user from users storage 285. In some embodiments,if the user has not previously been part of an AIDA campaign, thencampaign controller 250 collects data including the attributes andfeatures of the account that the user is associated with from accountsstorage 284. In some embodiments, the information that campaigncontroller 250 collects from accounts storage 284 includes the industrythat the user's company is in, where the company is geographicallylocated, the company's phish-prone percentage, and other informationthat can be access about the user's company from accounts storage 284.In some embodiments, campaign controller 250 collects and curatesinformation about the user from one or more of the Internet, socialmedia feeds, and reliable databases. In some embodiments, a uniquerecord is created in campaign recipients storage 202 for a user forevery different campaign and the unique record is associated with thecampaign, such that there is more than one recipient record in campaignrecipients storage 202 for a user.

In some embodiments, some of the data structure in campaign recipientstorage 202 is filled in by one or more workers 260, such as when therecipient interacts with a simulated phishing message. A worker 260 mayinclude any type and form of executable instructions performing thefunctions and operations described herein. In some embodiments, theworker is a component or module of the campaign controller. In someembodiments, the worker is a set of functions, operations andinstructions of the campaign controller. In some embodiments, the workeris a logical and executable construct for performing a set of assignedfunctions. In some embodiments, a worker 260 will record the date andtime when a recipient opened an email message. In some embodiments, aworker 260 will record a date and time when a recipient interacted withany of the links in an email or a text. In some embodiments, a worker260 will record a date and time when an email was delivered to arecipient's email server. In some embodiments, a worker 260 will recorda date and time when an email template has been processed and is waitingin the outgoing email queue 265. In some embodiments, a worker 260 willrecord a date and time when an email is sent to a recipient. In someembodiments, a worker 260 will record a data and time when all templateswere delivered to this recipient. In some embodiments, the recipients'browser agent string, including one or more of a user agent, a platform,a browser, a browser version, and OS, and an IP address, will berecorded when the recipient clicks on a link in a simulated phishingmessage. In some embodiments, campaign recipients storage 202 is arelational database. In some embodiments, campaigns recipients storagerelational database 202 has a relationship with campaign recipientactions storage 220 a . . . 220 n.

In some embodiments, campaign controller 250 includes a storage fortemplate details 203. In some embodiments, the data structure of thetemplate details information stored for each template detail record intemplate details storage 203 includes one or more of a template ID,settings for a service that describes the input one or more VoIP calls,settings for one or more text or SMS messages, settings for one or moreemail messages, and an ordinal field which contains the order of acollection of detail records for the template. In some embodiments, thedata structure of the template details information stored for eachtemplate record in template details storage 203 includes a date and timethat the record was created and/or updated. In some embodiments, atemplate detail record in template detail storage 203 can associate atemplate detail page to a landing domain.

In some embodiments, the settings for a service that describes the inputfor one or more VoIP calls include a script string. The script stringmay include the voice script to use for a VoIP call. In someembodiments, the settings for a service that describes the input for oneor more VoIP calls includes a voice type to use to speak the script on avoice call. In some embodiments, the settings for a service thatdescribes the input for one or more VoIP calls includes a language touse for a VoIP call. In some embodiments, the settings for a servicethat describes the input for one or more VoIP calls includes a counterwhich indicates the number of times to repeat the VoIP call voicescript. In some embodiments, the settings for a service that describesthe input for one or more VoIP calls includes a location of an audiofile to be used for a VoIP call. In some embodiments, the audio file maybe an MPEG-1 audio layer 3 (MP3) file, an MPEG-1 audio layer 4 (MP4)file, a pulse-code modulation (PCM) file, a waveform audio file format(WAV) file, an audio interchange file format (AIFF) file, an advancedaudio coding (AAC) file, a windows media audio (WMA) file, a freelossless audio codec (FLAC) file, an Apple lossless audio codec (ALAC)file, a Window media audio (WMA) file, or any other audio file format.In some embodiments, the audio files that may be used as an input to oneor more VoIP calls are stored in VoIP content storage 241. In someembodiments, a text to speech (TTS) engine 240 may be used to generatean audio file for one or more VoIP calls. In some embodiments, the textto be used by the TTS comes from serving module 230 of campaigncontroller 250.

In some embodiments, the settings for a service that describes the inputfor one or more SMS messages, text messages, or emails messages includesa string. The string may identify, contain or provide the body of themessage. In some embodiments, the string comprises an identifier to filethat has the body of the message. In some embodiments, the stringcomprises an identifier or key to a record or data in a database thathas the body of the message In some embodiments, the string comprises anidentifier to file that will be attached with the message. In someembodiments, the settings for a service that describes the input for oneor more SMS messages, text messages, or emails messages includes astring which contains the subject of the message. In some embodiments,the settings for a service that describes the input for one or more SMSmessages, text messages, or emails messages includes a string whichindicates who or where the message is from. In some embodiments, thesettings for a service that describes the input for one or more SMSmessages, text messages, or emails messages includes a string whichindicates a reply to address for the message. In some embodiments, thesettings for a service that describes the input for one or more SMSmessages, text messages, or emails messages includes a string whichcontains the name to display to indicate who or where the message isfrom. In some embodiments, the settings for a service that describes theinput for one or more SMS messages, text messages, or emails messagesincludes a landing page ID which indicates the landing page to use forthis message. In some embodiments, the settings for a service thatdescribes the input for one or more SMS messages, text messages, oremails messages includes a landing domain ID which indicates the domainto use for a message. In some embodiments, the settings for a servicethat describes the input for one or more SMS messages, text messages, oremails messages includes a landing domain prefix or a landing domainsuffix to add before the domain or at the end of a URL and before aslug. In some embodiments, the settings for a service that describes theinput for one or more SMS messages, text messages, or emails messagesincludes a type which indicates whether the record is for an email, anSMS or text message, or a VoIP call.

In some embodiments, the service that provides SMS or text messages andVoIP calls is a cloud based communications platform as a service thatenables communications between mobile devices, applications, services,and systems, such as by providing a globally available cloud API. Anexample of a cloud communications platform as a service that can be usedto provide SMS or text messages and VoIP calls is Twilio of SanFrancisco, Calif. In some embodiments, workers 260 pass to a cloudcommunications platform one or more of a “call from” phone number, arecipient phone number to call to, and a URL to an audio file to beplayed on the call.

In some embodiments, campaign controller 250 includes a storage fortemplates 204. In some embodiments, the data structure of the templateinformation stored for each template record in template storage 204includes one or more of a template ID, a template name, a templatecategory ID, an indicator of whether or not the template is archived, anindication of the level of sophistication of the template, and a dateand time that the template was created and/or updated. In someembodiments, template storage 204 is a relational database. In someembodiments, template storage relational database 204 has a relationshipwith template details storage 203.

In some embodiments, campaign controller 250 includes a storage for“call from” phone numbers 205. In some embodiments, the data structureof the “call from” phone number information stored for “call from” phonenumber record in “call from” phone number storage 205 includes one ormore of a phone number ID, an abbreviation for one of the state, theprovince, the region, the county, and the jurisdiction. In someembodiments, the data structure of the “call from” phone numberinformation stored for “call from” phone number record in “call from”phone number storage 205 includes a city name that the phone number isassociated with. In some embodiments, the data structure of the “callfrom” phone number information stored for “call from” phone numberrecord in “call from” phone number storage 205 includes a country codeassociated with the phone number. In some embodiments, the datastructure of the “call from” phone number information stored for “callfrom” phone number record in “call from” phone number storage 205includes an area code associated with the phone number. In someembodiments, the data structure of the “call from” phone numberinformation stored for “call from” phone number record in “call from”phone number storage 205 includes a list of other phone number areacodes in the same area as the phone number. In some embodiments, thedata structure of the “call from” phone number information stored for“call from” phone number record in “call from” phone number storage 205includes the digits of the phone number. In some embodiments, the datastructure of the “call from” phone number information stored for “callfrom” phone number record in “call from” phone number storage 205includes an indication of whether or not the phone number can be used inan AIDA campaign. In some embodiments, the data structure of the “callfrom” phone number information stored for “call from” phone numberrecord in “call from” phone number storage 205 includes an indication ofwhether or not the phone number can send or receive text messages. Insome embodiments, the data structure of the “call from” phone numberinformation stored for “call from” phone number record in “call from”phone number storage 205 includes an indication of whether or not thephone number can be used to send or receive VoIP calls. In someembodiments, the data structure of the “call from” phone numberinformation stored for “call from” phone number record in “call from”phone number storage 205 includes an indication of whether the phonenumber is an international number. In some embodiments, the datastructure of the “call from” phone number information stored for “callfrom” phone number record in “call from” phone number storage 205includes a date and time that the record was created and/or updated at.In some embodiments, the AIDA system 215 chooses a “call from” number tosend a message to a recipient such that the area code of the “call from”number is the same as the area code of the recipient's phone number.

In some embodiments, campaign controller 250 includes a storage forcampaign groups 206. In some embodiments, the data structure of thecampaign groups information stored for each campaign group record incampaign groups storage 206 includes one or more of a campaign ID and agroup ID. In some embodiments, a record in campaign group storage 206 isused to associate campaign records with group records. In someembodiments, when campaign controller 250 creates a campaign, campaigncontroller 250 selects one or more groups that the campaign will be sentto, which establishes a relationship between the campaign and one ormore groups in groups storage 286. In some embodiments, groups in groupsstorage 286 are already established and are linked to accounts. In someembodiments, one account may have multiple established groups which arestored in groups storage 286. In one embodiment, groups in campaigngroups storage 206, together with memberships storage 287 and groupsstorage 287 are linked together through relational databases toestablish which groups are part of an AIDA campaign, and to establishwhich users are part of those groups. Groups in campaign groups storage206 are linked to a campaign ID, to a group ID, and then groups storage286 links users to groups based on memberships storage 287 which may bea relational database.

In some embodiments, campaign controller 250 includes storage tagging207 and storage for tags 208. In some embodiments, the data structure ofthe tagging information stored for each tagging record in taggingstorage 207 includes one or more of a record ID, a tag ID, a taggableID, a taggable type, a tagger ID, a tagger type, a context, and a dateand time that the record was created and/or updated. In someembodiments, taggings are used to categorize templates. In someembodiments, taggings in taggings storage 207 indicate an associationbetween a tag from tag storage 208 and a template from template storage204. The tags and/or tagging may be any type and form of data,identifier, string, etc. to help identify, group, associate or classifycertain elements or data, such as by attributes, categories, users andthe like. In some embodiments tags are used to categorize templates andmay be used to group templates, such as based off a model output or bycustomer. In some embodiments, the data structure of the tagsinformation stored for each tags record in tags storage 208 includes oneor more of a record ID, a tag name, and a taggings count. One example ofa tag is “fraud reporting”. In one embodiment, there may be one or moretemplates related to fraud reporting, and the one of more templatesrelated to fraud reporting are all assigned the same fraud reportingtag. Another example of a tag is “appointment reminders”.

In some embodiments, campaign controller 250 includes, stores and/ormanages one or more campaign recipient actions table(s) in one or morecampaign recipient actions storages 220 a . . . 220 n (220). In someembodiments, the data structure of the actions information stored foreach record in the one or more campaign recipient actions table(s)includes one or more of a record ID, a recipient ID, a template ID, atemplate detail ID, a template ordinal, a type of action, a landingdomain ID, and landing page ID, a landing domain, and attachment type,an attachment filename, a sophistication level, a “reply to” address, a“from” display name, a subject, an email system message ID, and emailsystem queue ID, one or more failure codes and one or more errormessages, information about the recipient's browser and user agent ifthe user clicks on a phish URL, a scheduled at date and time, a createdat date and time, and an updated at date and time. In some embodiments,when a template is chosen for an AIDA campaign for a given user, theassociation of the template with the user for the specific AIDA campaignin stored in the campaign recipients actions table in the template IDfield. In some embodiments, the one or more campaign recipient actionstable(s) store(s) actions for multiple users/recipients. In someembodiments, the template and where the campaign recipient is in thattemplate is a state that is saved by campaign controller 250 in thecampaign one or more recipient actions table(s). When a message getssent to a campaign recipient, that action gets recorded in a record inthe one or more campaign recipient actions table(s). That record in theone or more campaign recipient actions table(s) is later used bycampaign controller 250 to know that a step in the template has occurredand the campaign should proceed to the next step in the template.

In some embodiments, the campaign controller 250 queries, interfaces oruses records and/or data of the one or more campaign recipient actionstable(s) to determine next action(s) to perform or take. For example,when it is time for campaign controller 250 to perform the next actionfor a given recipient, campaign controller 250 looks in the one or morecampaign recipient actions table(s) to determine what the last actionwas, and then either looks in the template to determine what the nextstep is, or determines what the next step is using an AI model, and thencampaign controller 250 sends a message to action queue 266 to triggerthe next action for the campaign recipient. In some embodiments, themessage that campaign controller 250 puts into action queue 266 containsone or more of a recipient ID, a template ID, and a detail ID, which isthe ordinal value within the template, which refers to which detail pageto use. In some embodiments, campaign controller 250 reads the detail IDfrom the record of the last action for the recipient, stored in the oneor more campaign recipient actions table(s), in order to determine whatstep of the template the recipient is currently on. In some embodiments,the message that campaign controller 250 puts into action queue 266includes the type of the message to be sent to the recipient, whereinthe type is one of an email, an SMS or text message, and VoIP call, orand Internet based communication. In some embodiments, the type of themessage to be sent to the recipient is determined based on the template.

In some embodiments, the type of action is one of email, text, call,email delivered, email delivery failed, opened, email clicked, textclicked, reporting using a user interface, error sending text, and errormaking VoIP call. In some embodiments, when a user clicks the phish URL,one of more of the following information is stored in the action record:user agent, platform, browser, browser version, operating system,whether or not the user is using a mobile device, whether or not theuser is a bot, and an IP address.

In some embodiments, campaign controller 250 creates, manages and/orprocesses records and/or data in campaign recipient actions storage 220.In some embodiments, when campaign controller 250 performs an action ona campaign recipient, campaign controller 250 checks to see if thereexists one or more records for that recipient in the one or morecampaign recipient actions table(s) in campaign recipient actionsstorage 220. In some embodiments, if no record exists, then this meansthat this is a new recipient that has not participated in an AIDAcampaign before, and campaign controller 250 creates a new campaignrecipient actions table for this recipient, and/or creates a record inthe one or more campaign recipient actions table(s) for the action thatwas performed on this recipient.

In some embodiments, one or more records in the one or more campaignrecipient actions table(s) 220 identifies or tracks whether a campaignrecipient has been part of an AIDA campaign. In some embodiments, if aone or more campaign recipient actions table(s) 220 with one or morerecords for a campaign recipient exists, then the recipient has been inan AIDA campaign previously. In some embodiments, campaign controller250 extracts information for that recipient from the one or morecampaign recipient actions table(s) 220 in addition to extracting userattributes from users storage 285 and company attributes from accountsstorage 284, and campaign controller 250 passes this information toserving module 230.

In some embodiments, campaign controller 250 maintains records of anyactivity, events, issues, errors, user interactions, user actions, lackof user interactions, etc. (generally referred to activity or events)that have happened to, occurred with, caused by or associated with agiven user in all previous AIDA campaigns in the one or more campaignrecipient actions table(s) stored in campaign recipient actions storage220. In some embodiments, both actions and the result of actions getstored in one or more campaign recipient actions table(s). In someembodiments, any data associated with the activity or events is stored,such as but not limited to, data about the computing device, the user,user input, any applications, programs or tasks running on the computingdevice. In some embodiments, if the phone number for the user wasincorrect, this information gets stored in the one or more campaignrecipient actions table(s). In some embodiments, if the user opens anemail, this information gets stored in the one or more campaignrecipient actions table(s). In some embodiments, if the user clicks on alink in a message, this information gets stored in the one or morecampaign recipient actions table(s). In some embodiments, the amount oftime between sending an action to a recipient and the recipient'sresponse to the action gets stored in the one or more campaign recipientactions table(s). In some embodiments, campaign controller 250additionally maintains records of all non-AIDA campaigns and/or trainingprograms that the user has completed or been exposed to in the one ormore campaign recipient actions table(s) stored in campaign recipientactions storage 220. In some embodiments, one or more of campaigncontroller 250, serving module 230, workers 260, email workers 261,website workers 264, and security awareness system server 280 can accesscampaign recipient actions table(s) storage 220.

In some embodiments, while one or more AIDA campaigns are running,campaign controller 250 collects information for all users that arerecipients in an AIDA campaign and the information gets stored in theone or more campaign recipient actions table(s), in one or more campaignrecipient actions storages 220 a . . . 220 n. For every campaign, thereis a unique user recipient record in campaign recipients storage 202that is linked to each new action performed on that user for thecampaign. In some embodiments, there are multiple campaign recipientaction records in the one or more campaign recipient actions table(s).In some embodiments, records in the one or more campaign recipientactions table(s) are linked to a single record in campaign recipientsstorage 202. In some embodiments, when a user gets added to a new AIDAcampaign, a new campaign recipient record in campaign recipient storage202 will be created for the user that is only linked to the new AIDAcampaign. In some embodiments, if the user has already been in an AIDAcampaign, and therefore the user already has one or more records in oneor more campaign recipient actions table(s), the entries of the actionsfor a new AIDA campaign get stored in new records in the one or morecampaign recipient actions table(s), and the new records are linked tothe new campaign recipient record in campaign recipient storage 202,which is linked to the new AIDA campaign which is stored in a record incampaigns storage 201.

In some embodiments, the one or more campaign recipient actions table(s)are stored in campaign recipient actions storage 220. In someembodiments, the one or more campaign recipient actions table(s) arepersistent and maintained indefinitely or until a predetermined timeperiod. In some embodiments, the one or more campaign recipient actionstable(s) is/are stored forever and does not get deleted. In someembodiments, the one or more campaign recipient actions tables areretroactive and only contain actions from that past that have happened,and not actions that will happen in the future. In some embodiments,user actions that are stored in one or more campaign recipient actionstable(s) are also reported on the company administrator console 295 sothat the company administrator know what happened. In some embodiments,the data within the one or more campaign recipient actions table(s) canbe used by dashboard generator 298 in company administrator console 295to generate reports and visual data displays.

In some embodiments, campaign controller 250 includes one or moreworkers 260. In some embodiments, workers 260 receive messages fromactions queue 266 and perform the actions that the messages describe. Insome embodiments, when workers 260 receive a message from actions queue266, if the action described in the message is to send an email to arecipient, then workers 260 put the message directly into incoming emailqueue 264 for one or more email workers 261 to pick up and process.

In some embodiments, when workers 260 receive a message from the actionqueue 266, workers 260 do the task of building the message. In someembodiments, email workers 261 use the information in the message tofetch the detail page of the indicated template from email database 262,and using user specific information from users storage 285, emailworkers 261 will populate the detail page with the user specificinformation, and then email workers 261 will put the full composed emailinto cloud storage, and put the headers of the email into outgoing emailqueue 265, which sends emails via two or more mail servers. In someembodiments, the cloud storage is an S3 bucket provided by Amazon SimpleStorage Service (Amazon S3). In some embodiments, outgoing email queue265 is an Amazon Simple Queue Service (SQS) queue. In some embodiments,for scaling and redundancy, there are multiple workers 260, and thequeue service (for example, Amazon SQS) posts the message from actionqueue 266 to an available worker 260. In some embodiments, the queueservice spreads messages from actions queue 266 evenly across multipleworkers 260.

In some embodiments, workers 260 determine the recipient of the message,and look up the recipient in campaign recipient storage 202 to determinethe campaign the recipient is in, then workers 260 look up the campaignin campaigns storage 201, and then workers 260 look up the one or morerecords in the one or more campaign recipient actions table(s) todetermine the template to use, and then workers 260 look up the detailpage of the template using the detail ID.

In some embodiments, if the detail page of the template is a textmessage, the worker retrieves the data required to send the test messageto the recipient, for example the recipients mobile phone number, fromusers storage 285, and then workers 260 build the text message and sendit through the Twilio service. In some embodiments, if the detail pageof the template is an email, then workers 260 forward the messageexactly as they received it to incoming email queue 264 for emailworkers 261 so that they can build the email message for the recipient.In some embodiments, workers 260 have a template fetcher which buildsthe message, retrieving user specific information that is built into theemail message and incorporated into the detail page of the template.

In some embodiments, campaign controller 250 includes one or more emailworkers 261. In some embodiments, email workers 261 generate emailmessages. In some embodiments, email workers 261 interface with twoqueues; incoming email queue 264 and outgoing email queue 265. In someembodiments, incoming email queue 264 indicates that it is time to sendan email message. The message to do this action come to email workers261 from campaign controller 250 via workers 260. In some embodiments,the message to generate an email message contains the recipient ID, thetemplate ID, and the detail ID. In some embodiments, email workers 261compose the email, put the email body and the email headers together,and put the completed email address in outgoing email queue 265 until itgets processed. In some embodiments, email workers 261 only put theemail header in outgoing email queue 265 until it gets processed. Insome embodiments, once the email gets sent, campaign controller 250updates the one or more campaign recipient actions table(s) to reflectthat the AIDA system delivered the email to the recipient, and the emailheader is removed from the outgoing email queue 265. In someembodiments, email workers 261 have an email database 262 which containsa queue table, message headers, and a transient table where the state isstored.

In some embodiments, campaign controller 250 includes one or morewebsite workers 263. In some embodiments, when a recipient opens anemail, clicks on a link in an email or a text message, or otherwiseinteracts with the action sent to them, website worker 263 serves up thelanding page from landing page storage 283 to the recipient. In someembodiments, website workers 263 present the recipient with any trainingthat they must complete at the moment of failure. In some embodiments,when a recipient fails a simulated phishing test, website workers 263enroll the user in remedial training that will take place at some timein the future.

In some embodiments, website workers 263 track one or more of thefollowing information: which recipients interacted with a link, whatbrowsers the recipients were using when they interacted with a link,what the recipient's user agent was when they interacted with a link. Insome embodiments, website workers 263 record the recipient's actions inone or more campaign recipient actions table(s). In some embodiments,when campaign controller 250 wants to send a VoIP message, worker 260that receives that message from action queue 266 and asks website worker263 what message to send. In some embodiments, anything that the AIDAsystem 215 tracks and any actions taken by the recipients areautomatically sent to website workers 263. In some embodiments, if arecipient replies to a text message, the recipients response is storedby website workers 263. In some embodiments, if a user replies to anAIDA simulated phishing message, their reply gets delivered to a specialemail address that is connected to an AWS Simple Notification Service(SNS). In some embodiments, the SNS sends this reply email to an AWSLambda endpoint (AWS Lambda) which stores the reply email in an S3bucket. When the reply email gets stored in the S3 bucket, securityawareness system server 280 gets notified that there is a new emailreply which creates a record in the one or more campaign recipientactions table(s) which is/are monitored by campaign controller 250.

In some embodiments, landing pages are served to a recipient by websiteworkers 263 when a user interacts with a link in a message. In someembodiments, all the information about the recipient comes back tocampaign controller 250 through the URL that the recipient interactedwith, as this URL is created specifically for each recipient and it hasat least the recipient ID and the detail ID in it. In some embodiments,the information in the URL is encrypted.

D. Artificial Intelligence Models

Referring to FIG. 3 in a general overview, FIG. 3 depicts an embodimentof a system 300 used for creating, updating, and managing models, suchas artificial intelligence or machine learning models, for use in AIDAsimulated phishing campaigns. System 300 includes campaign controller250, security awareness system server 280, system monitoring module 270,and model manager 370. Artificial intelligence refers to computersystems which exhibit intelligent behavior, including the capacity tolearn, maintain a large storehouse of knowledge, use reasoning, applyanalytic abilities, discern relationships between facts, communicateideas to others and understand communications from others, and perceiveand make sense of the situation. Machine learning systems create newknowledge by finding previously unknown patterns in data, drivingsolutions by learning patterns in data.

Neural networks are computer systems designed, constructed andconfigured to simulate the human nervous system. The neural networkarchitecture consists of an input layer, which inputs data to thenetwork; an output layer, which produces the resulting guess from thenetwork; and a series of one or more hidden layers, which assist inpropagating. Such systems learn to do tasks or make decisions byconsidering examples. A neural network or artificial neural network isbased on a collection of connected units called neurons or artificialneurons. Each connection (synapse) between neurons can transmit a signalto another neuron. The receiving (postsynaptic) neuron can process thesignal(s) and then signal downstream neurons connected to the neuron.Neurons may have state, generally represented by real numbers, typicallybetween 0 and 1. Neurons and synapses may also have a weight that variesas learning proceeds, which can increase or decrease the strength of thesignal that it sends downstream. Further, neuron may have a thresholdsuch that only if the aggregate signal is below (or above) that level isthe downstream signal sent. Typically, neurons are organized in layers.Different layers may perform different kinds of transformations on theirinputs. Signals travel from the first (input), to the last (output)layer, possibly after traversing the layers multiple times. Inartificial networks with multiple hidden layers, the initial layersmight detect primitives (e.g. the pupil in an eye, the iris, eyelashes,etc.) and their output is fed forward to deeper layers who perform moreabstract generalizations (e.g. eye, mouth) . . . and so on until thefinal layers perform the complex object recognition (e.g. face).

Neural networks are trained with data, such as a series of data points.The networks guess which response should be given, and the guess iscompared against the correct of “best” guess for each data point. Iferrors occur, the neurons are adjusted, and the process repeats itself.Training a neural network model corresponds to selecting one model fromthe set of allowed models. A model may be established by selection of aneural network configured, programmed or trained in a certain way withcertain data.

In the context of the AIDA system, neural networks may be trained withdata related to simulated phishing campaigns to create or establishmodels that direct, identify or specify how to configure and/or executea simulate phishing campaign. As such, the training of neural networksapplies machine learning to data from and associated with results ofsimulated phishing campaigns to establish models for simulated phishingcampaigns. A model for a simulated phishing campaign may take as inputany type and form of information related to the simulated phishingcampaign, such as but not limited to attributes of user, attributes ofthe company of the users, date and temporal information, previousactions, user history, template information, previous types of messagescommunicated, timing information, etc. The model may output anyinformation for creating, executing and/or managing a simulated phishingcampaign, such as but not limited to a first action to perform, a nextaction to perform, a persona to use, a template to use, content of thetemplate, type of message/communication, timings ofmessage/communications, etc.

The AIDA system 215 uses information related to simulated phishingcommunications and campaigns to develop, establish and or train models.In some embodiments, the AIDA system uses question and answer pairsand/or information learned from past simulated phishing campaigns tocreate models which are able to target the greatest vulnerabilities of auser. In some embodiments, AIDA system 215 can combine redactedinformation across multiple companies (accounts) and determine thegreatest vulnerability of a specific industry, or a specific geographicregion, or of a specific population demographic, or of a specificorganizational level, as examples.

One type of artificial intelligence or machine learning model used byAIDA system 215 is a persona model. In one embodiment, persona modelsare stored in persona models storage, 210. A persona model is a personathat AIDA system 215 uses to communicate with users. The persona modelmay be a model configured, established or trained to represent a certaintype or category of person. The persona model may be a model configured,established or trained to represent a certain type of persona orpersonality. The persona model may be a model configured, established ortrained to represent a certain type or category of job, occupation orrole. In some embodiments, a persona model is a dental office assistant.In some embodiments, a persona model is a travel agent. In someembodiments, a personal model is a credit card company. In someembodiments, a persona model is a technical support representative. Insome embodiments, a persona model is a technical support representativefor Facebook, created by Facebook, Inc. of Menlo Park, Calif.

In one embodiment, models are created by model controller or manager320. In a general overview, model manager 370 includes storages forquestion and answer pairs (Q&A pairs) 350, storage for question andanswer pairs used for training (training Q&A pairs) 352, storage forquestions and answer pairs that are used for testing (testing Q&A pairs)353, and storage for question and answer pairs that are approved(approved Q&A pairs) 351. In some embodiments, model manager 370includes historical data exporter 301, and Q&A pairs exporter 302. Insome embodiments, model manager 370 includes model controller 320, Q&Aworkers 315, and AI tool 360. Model manager 370 may include storages forscenario descriptions 310, storages for metagraph 361, storages forneurons 363, and storages for AI configuration super parameters 362.

In some embodiments, model manager 370 includes worker interface 314.The worker interface may comprise any type and form of executableinstructions, such as an application, program, service, process, task orAPI, executable one or more processors, for interfacing and/orcommunications with one or more workers. The worker interface may bedesigned, constructed and/or configured to prompt, query, ask or requestinformation, input or to work on a task from one or more workers. Forexample, the worker interface may include or provide a user interfacethat provides information on a queue, a task and/or status of a task.The worker interface may be designed, constructed and/or configured toreceive and/or obtains information from one or more workers. Forexample, the worker interface may include or provide a user interfacethat receives information from a work, such as input, or results from orstatus of a task. In some implementations, the work interface isdesigned, constructed and/or configured to interface and/or communicatewith a user, such as a user performing a task of as worker. In someimplementations, the work interface is designed, constructed and/orconfigured to interface and/or communicate with a system, application,program, etc., that is to perform one or more tasks. For example, Insome embodiments, Q&A workers 315 may be a model, or may be an automatedsoftware agent. In some embodiments, worker interface 314 is a model, aprogram, a function, a module, an automated software agent or softwareinstructions operating on one or more processors that interfaces withone or more person. In some embodiments, worker interface 314 organizestask queues, job queues, tasks and/or jobs. In some embodiments, workerinterface 314 passes information to Q&A workers 315 and/or receivesinformation from Q&A workers 315. Worker interface 315 may invite,un-invite, select, or deselect Q&A workers 315.

In one embodiment, models are created by creating question and answerpairs. In some embodiments, a service such as Amazon Mechanical Turk(MTurk) is used to create question and answer pairs. In someembodiments, questions are recipient responses to messages sent to arecipient by AIDA system 215, and answers are the recipients responsesto AIDA system messages. In some embodiments, the question and answerpairs are stored in Q&A pairs storage 350. In some embodiments, only thequestion and answer pairs that have not yet been validated are stored inQ&A pairs storage 350. In some embodiments, the question and answerpairs are validated by Q&A workers 315 and then stored in approved Q&Apairs storage 351. In some embodiments, validated Q&A pairs in approvedQ&A pairs storage 351 are divided into two or more groups of Q&A pairs.In some embodiments, one or more group of Q&A pairs is used for trainingmodels and is stored in training Q&A pairs storage 352. In someembodiments, one or more group of Q&A pairs is used for testing modelsand is stored in testing Q&A pairs storage 353.

In some embodiments, Q&A workers 315 are MTurk workers. In someembodiments, a model is trained by feeding it a number of approvedquestions which represent example AIDA system messages that a specificmodel could send to a recipient, along with a number of approved answerswhich represent appropriate responses to the approved questions.

In some embodiments, model controller 320 creates jobs for Q&A workers315 to develop Q&A pairs. In some embodiments, the job requests give anexample of the messages that campaign controller 250 sends to a user, inaddition to examples of good Q&A pairs. In some embodiments, modelcontroller 320 additionally gives Q&A workers 315 examples of poor Q&Apairs. In some embodiments, while model controller 320 is utilizing Q&Aworkers 315 to create Q&A pairs, system monitoring module 270 maintainsa dashboard of all the jobs being performed by Q&A workers 315.

In some embodiments, a first task given to Q&A workers 315 by modelcontroller 320 is to create Q&A pairs, comprising user responses to anAIDA system message (questions) and the AIDA system responses to theuser responses (answers). In some embodiments, Q&A workers 315 are givena scenario description from scenario descriptions storage 310, whichincludes the original AIDA system message or messages, and Q&A workers315 are first asked to create replies or questions that the recipientmay ask the AIDA system, and then Q&A workers 315 are asked to create anappropriate answer that the system could respond to the recipientsreplies or questions with. In some embodiments, model controller 320informs Q&A workers 315 that the generated recipient responses (thequestions) should be representative of the way a user would respond ifthey received the AIDA system message that was detailed in the scenariodescription.

In some embodiments, model controller 320 informs Q&A workers 315 tocreate system replies to recipient responses (answers) that willencourage the recipient to interact with a link in a simulated phishingmessage. In some embodiments, model controller 320 informs Q&A workers315 to apply criteria to creating the system responses (answers) thatare created for the recipient responses (questions). In someembodiments, model controller 320 informs Q&A workers 315 to use propergrammar and spelling in the system responses (answers). In someembodiments, model controller 320 informs Q&A workers 315 to not useslang in the system responses (answers). In some embodiments, modelcontroller 320 informs Q&A workers 315 that the recipient responses tothe AIDA system messages (the questions) may incorporate slang, spellingmistakes, profanities, typical shorthand, and urban grammar.

In one embodiment, a sample AIDA system email message provided by modelcontroller 320 to Q&A workers 315 is:

-   -   This email is to confirm a password reset was just requested for        your account. If you did not request this, please visit the        following link:        http://secure.social-tech.com/accounts/password-reset-request/?uuid=9431edpoks&language=en&reset=reject    -   Otherwise you will be locked out of your SocialTech account.    -   Thank you,    -   SocialTech.

In one embodiment, an example of an AIDA system SMS or text messageprovided by model controller 320 to Q&A workers 315 is:

-   -   A password change was requested. We want to verify this is you.        If you did not request a password change please click this link        http://bit.ly/2hXJZd6 or you will be locked out of your        SocialTech account.

In some embodiments, the task given to Q&A workers 315 by modelcontroller 320 is to create Q&A pairs, where all the questions andanswers are to be different. In one embodiment, an example of acceptablequestion and answer pairs are as follows:

-   -   Question 1: I don't have a SocialTech account    -   Answer 1: Sorry, but someone requested a password reset on your        account.    -   Please click the link to verify or dispute this.    -   Question 2: When will I get locked out?    -   Answer 2: You have 8 hours to click the link to verify or        dispute the password reset, after which you will be locked out        of your Social Tech account.

In some embodiments, the goal of the system response (answer) to therecipient response (question) is to get the recipient to interact withor click on a link, therefore answers to questions which do not move theuser towards this action are not acceptable. In one example, if thesystem response (answer) created by Q&A worker 315 is that the recipientshould “Call customer service”, this response would not encourage therecipient to click on a link and therefore would not be acceptable.Similarly, system responses (answers) that are phrased in a way whichwould elicit further recipient responses (questions) or would encouragethe recipient to disregard the system message are not acceptable.

In some embodiments, once Q&A workers 315 have created Q&A pairs whichmay be stored in Q&A pairs storage 350, Q&A workers 315 are asked toreview and validate the created Q&A pairs to see if they are acceptable.In some embodiments, Q&A worker 315 responds to the appropriateness ofthe questions and the answers with a binary reply, for example one ofyes if the question or answer is acceptable and zero or no if thequestion or answer is not acceptable. In some embodiments, each Q&A pairis reviewed by more than Q&A worker 315. In some embodiments, the Q&Apairs are only considered approved if all of the Q&A workers 315 thatreview the Q&A pairs deem the questions and the answers to beacceptable. In some embodiments, the Q&A pairs that are consideredapproved are stored in approved Q&A pairs storage 351. In someembodiments, the Q&A pairs are considered approved by one or more or allof the Q&A workers 315 that reviewed the Q&A pairs are further reviewedby a trusted person before being stored in approved Q&A pairs storage351.

In some embodiments, model manager 370 includes Q&A pairs exporter 302.In some embodiments, Q&A pairs exporter 302 extracts question and answerpairs from approved Q&A pairs storage 351 and creates intermediatefiles. In some embodiments, the one or more intermediate files are usedfor the input into a data prep program which separates the Q&A pairsinto two groups. In some embodiments, one group is used forinitialization and/or training of a neural network for a model, and onegroup is used for testing the neural network for the model. The Q&Apairs in the first group are stored in training Q&A pairs storage 352,and the Q&A pairs in the second group are stored in testing Q&A pairsstorage 353. In some embodiments, training Q&A pairs storage 352 andtesting Q&A pairs storage 353 are MySQL databases which are hosted onAmazon AWS RDS.

In some embodiments, the Q&A pairs generation and validation process isdone for every model that is generated. In some embodiments, the Q&Apairs generation and validation process is fully automated. In someembodiments, some portions of the Q&A pairs generation and validationprocess are automated. In some embodiments, responses given byrecipients in AIDA campaigns are used as questions for the Q&A pairsgeneration and validation process.

In some embodiments, the models created by model manager 370 are storedin model storage 216. In some embodiments, model storage 216 is part ofcampaign controller 250. In some embodiments, model storage 216 is partof model manager 370. In some embodiments, model storage 216 is storedin memory 122 as part of AIDA system 215. In some embodiments, modelstorage 216 is stored in a cloud storage, for example an S3 bucket.

In some embodiments, the model manager 370 may create persona modelsthat are stored in person model storage 210. Persona models are createdto represent a specific role or entity as previously described. In someembodiments, model manager 370 may create classifications models thatare stored in classification model storage 209. Classification modelsare variants of persona models for groups or segments that share one ormore common attributes. Classification models are more tightly alignedwith the group or segment. In some embodiments, classification modelsmay be created for different industries. In some embodiments,classification models may be created for different demographics. In someembodiments, classification models may be created for differentorganizational levels within a company. For example, a classificationmodel for recipients at a director level may be created. Classificationmodels may be created for any user attribute or combination ofattributes that a group of users can be built around. Q&A pairs that arespecific to the segment are used to train and test the classificationmodel. In some embodiments, the questions for the questions and answerpairs are extracted from actual responses to messages sent to therecipients from campaign controller 250, wherein the recipients are partof a group of recipients that share one or more attributes.

In some embodiments, once the model is trained, Q&A pairs from testingQ&A pairs storage 353 are used to validate the model's behavior. In someembodiments, the answers that a trained model generates during a testingphase are reviewed by one or more Q&A workers 315 to determine howappropriate they are. In some embodiments, Q&A workers 315 use a rankingto represent how close the answers generated by the model are to theanswers of the testing Q&A pairs. In some embodiments, the answersgenerated by the model to the questions of the testing Q&A pairs aregraded on a Likert scale with 1 being the worst response and 5 being thebest response.

In some embodiments, model controller 320 determines model parameterswhen creating a model using a neural network. In some embodiments, modelcontroller 320 determines how many neurons will be in the model. In someembodiments, model controller 320 determines how many layers will be inthe model. In some embodiments, model controller 320 determines one ormore of an amount of backpropagation, a dimension, and a learning rate.In some embodiments, the model parameters determined by model controller320 when creating a model are referred to as AI configuration superparameters. In some embodiments, AI configuration super parameters arepart of a TensorFlow configuration. In some embodiments, AIconfiguration super parameters are set in Python code or as command lineparameters for a python program that trains a model. In someembodiments, the AI configuration super parameters are stored in AIconfiguration super parameters storage 362. In some embodiments, AIconfiguration super parameters are stored in a bash script format in AIconfiguration super parameters storage 362. In some embodiments, AIconfiguration super parameters are stored in project notes or a readmefile in AI configuration super parameters storage 362.

In some embodiments, a model that results from a training and testingprocess is stored as one of integer values or real values in a matrix inmodel storage 216. In some embodiments, the matrix aligns to a wordmatrix. In some embodiments, after the model is built, the model may befurther adjusted using a tuning process that adjusts the values of theneurons. In some embodiments, the values of the neurons may be stored inneuron storage 363. In some embodiments, the values of the neurons maybe stored with the model in model storage 216. In some embodiments, amodel that results from a training and testing process further comprisesa metagraph. In some embodiments, a metagraph is a list of operations toexecute, and which model inputs to pass to the list of operations. Insome embodiments, a metagraph is built by writing a python program thatcalls TensorFlow APIs to create an execution graph which is stored inmemory. In some embodiments, saving an execution graph to a memorycreates a metagraph. In some embodiments, a metagraph is a storedversion of the in-memory execution graph and is stored in metagraphstorage 361. In some embodiments the metagraph is used to execute stepsof a neural network. In some embodiments, the metagraph is stored withthe model in model storage 216. In some embodiments, serving module 230retrieves a model from model storage 216 and a corresponding metagraphfrom metagraph storage 361 and makes the model and the metagraphavailable to campaign controller 250.

In some embodiments, a model represents a persona. Models may beassociated with multiple campaigns, as more than one model may be usedin a campaign. Each model may have one or more versions. In someembodiments, AIDA system 215 includes a table which contains a list ofall models and the versions of the models that may be used. In someembodiments, a usage counter is maintained for every version of a model,and each time the version of the model is used in an AIDA campaign, theusage counter is incremented. In some embodiments, the model versionwith the lowest usage count is the next model to be used by a campaigncontroller. In some embodiments, a security awareness systemadministrator 288 may set a target use percentage for one or moreversion of a model. In some cases, campaign controller 250 will use aversion of a model for a campaign based on which version of a model isfarthest below its target use percentage.

In some embodiments, models are created which select a preferred, ordesired kind of training for a user based on recipient informationand/or recipient actions when they fail a phishing campaign. In someembodiments, training models are created based on a user's behavior inan AIDA campaign subsequent to completing specific training materials.In some embodiments, training models are created based on a user'sbehavior in an AIDA campaign after the user has failed a previoussimulated phishing campaign and has received training targeted towardsthe failure mode of the user.

In some embodiments, information from simulated phishing campaigns,information about users, information about accounts, and otherinformation can be used to create new models and to update existingmodels. For example, one or more neural networks may be trained usingresults of simulated phishing campaigns, information about users of thatsimulated phishing campaign and through training establish one or moremodels. This information may, for example, highlight behavioraldifferences between people which may be used by the classificationmodels to create segmentations of users into different groups based oncertain attributes, wherein each group gets targeting with a specificpersona model based on the likelihood that the specific persona modelwill increase the probability of the user interacting with a link. Insome embodiments, historical information is pulled from one or morecampaign recipient actions table(s) by historical data exporter 301 andformatted to be used to create a new model or update an existing modelto create a new version of an existing model.

Models may be created for segmentations of a population, for clusters ina population, and for any group of a population. For example, a neuralnetwork may be trained with data regarding a segment to establish amodel for that segment. In some embodiments, AIDA model controller 320creates one or more models for an individual company (account).

In some embodiments, for a user that has not been part of an AIDAsimulated phishing campaign, campaign controller 250 may redactinformation from users that are grouped according to similar attributesusing one or more classification models (e.g. users that are in the sameor similar industry, users that have similar seniority in a company,users that perform a similar role in an organization, users that havebeen with an organization for a similar length of time, users that arein similar geographic locations, etc.). The one or more classificationmodels built using redacted information from users with similarattributes may be used along with personal and generic information forthe new user to customize an AIDA campaign for that user, therebycreating an appropriate first AIDA campaign for a user that has noprevious AIDA campaign history.

In some embodiments, statistical models may be used for persona models,classification models, clustering models, timing models, or any othertype of model. In some embodiments, logistic regression models may beused for persona models, classification models, clustering models,timing models, or any other type of model. In some embodiments, k-meansmodels may be used for persona models, classification models, clusteringmodels, timing models, or any other type of model. In some embodiments,polynomial regression models may be used for persona models,classification models, clustering models, timing models, or any othertype of model. In some embodiments, models may be based on deep neuralnetworks, which can be used to create models including, for example,statistical models such as logistic regressions. In some embodiments, adeep neural network used is a sequence to sequence (seq2seq) deep neuralnetworks model (also known as neural machine translation).

In some embodiments, information about a user that has interacted with alink, such as one or more of a browser the user was using when theyperformed the action, whether the user performed the action on theirphone, a time of the action, an email client used, an IP address of theuser, a browser user agent, a user's operating system, and a browserversion may be used to create models, to choose a model for a specificuser, or as a feedback loop to include behavior in serving module 230which may inform things such as a next action in a template, a nexttemplate detail page, a next timing for sending a next message, etc.

In some embodiments, one or more historical data exporters 301 readsdata from one or more storages and creates files in the correct formatneeded by the model controller 320 to train new models, retrain existingmodels, or tune existing models. In some embodiments, one or morehistorical data exporter s301 reads data from campaigns storage 201. Insome embodiments, one or more historical data exporters 301 reads datafrom campaign recipients storage 202. In some embodiments, one or morehistorical data exporters 301 reads data from campaign recipient actionsstorage 220. In some embodiments, one or more historical data exporters301 reads data from scenario descriptions storage 310.

Referring to FIG. 4 in a general overview, FIG. 4 depicts animplementation of a method 400 for assessing vulnerabilities of anorganization to phishing. In a brief overview, the method 400 mayinclude identifying, by a campaign controller, an organization for whichto assess vulnerabilities to phishing (step 400). The method can includedetermining, by the campaign controller based at least on identificationof the organization, a plurality of models to use for executing one ormore simulated phishing campaigns directed towards a plurality of usersof the organization (step 420). The method can include executing, by thecampaign controller using the plurality of models, one or more simulatedphishing campaigns directed to the plurality of users of theorganization (step 440). The method can include storing, by the campaigncontroller, results of execution of the one or more simulated phishingcampaigns to a database (step 460). The method can also includedetermining, by a security awareness tool based on the results, one ormore vulnerabilities to phishing for the organization (step 480).

Referring again to FIG. 4, and in greater detail, the method 400 mayinclude identifying, by a campaign controller, an organization for whichto assess vulnerabilities to phishing (step 400). In some embodiments,the campaign controller identifies a plurality of attributes of theorganization. In some embodiments, the campaign controller identifies aplurality of attributes of a plurality of users. In some embodiments,the campaign controller identifies one or more attributes responsive toa questionnaire provided via a user interface, regarding implementationby the organization of a security awareness program. In someembodiments, the questionnaire is constructed based on at least resultsof previous simulated phishing campaigns of one or more organizations.

The method can include determining, by the campaign controller based atleast on identification of the organization, a plurality of models touse for executing one or more simulated phishing campaigns directedtowards a plurality of users of the organization (step 420). In someembodiments, the campaign controller determines the plurality of modelsbased on at least the plurality of attributes of the organization. Insome embodiments, the campaign controller determines the plurality ofmodels based on at least the plurality of attributes of the plurality ofusers. In some embodiments, the campaign controller selects one or moretemplates for each of the plurality of models, wherein the one or moretemplates identify one or more of the following: one or more types ofsimulated phishing communications, a type of exploit, type of data tocollect, an order of simulated phishing communications, a timing of orbetween simulated phishing communications, and content of one or moresimulated phishing communications.

The method can include executing, by the campaign controller using theplurality of models, one or more simulated phishing campaigns directedto the plurality of users of the organization (step 440). In someembodiments, the campaign controller executes the one or more simulatedphishing campaigns using the one or more templates. In some embodiments,the campaign controller communicates a plurality of simulated phishingcommunications of different types, wherein the types comprises one ofthe following: an email, a text or short message service (SMS) message,a phone call, a voice over internet protocol (VoIP) call, or an Internetbased message.

The method can include storing, by the campaign controller, results ofexecution of the one or more simulated phishing campaigns to a database(step 460). In some embodiments, results of execution of the one or moresimulated phishing campaigns are stored for each user in the simulatedphishing campaign. In some embodiments, results of execution of the oneor more simulated phishing campaigns are stored in a campaign recipientsactions table for each user. In some embodiments, the results ofexecution of the one or more simulated phishing campaigns are storedforever. In some embodiments, results of execution of one or moresimulated phishing campaigns are redacted such that information aboutone of a user that participated in the one or more campaigns and acompany of a user that participated in the one or more campaigns areremoved from the results of execution of the one or more simulatedphishing campaigns.

The method can also include determining, by a security awareness systembased on the results, one or more vulnerabilities to phishing for theorganization (step 480). In some embodiments, the campaign controllerdetermines as the one or more vulnerabilities a percentage of theplurality of users of the organization that are phish-prone. In someembodiments, the percentage of the plurality of users of theorganization that are phish-prone comprises a number of users of theorganization that interacted with a link of a simulated phishingcommunication. In some embodiments, the campaign controller determinesas the one or more vulnerabilities, one or more of the following thatcaused one or more users of the plurality of users to interact with alink of the simulated phishing communications: type of simulatedphishing communications, a type of exploit, content of simulatedphishing communications and timing of or between simulated phishingcommunications. In some embodiments, the campaign controller determinesmetrics from the results for one or more of the following: a type ofsimulated phishing communications, a type of exploit, content ofsimulated phishing communications and timing of or between simulatedphishing communications. In some embodiments, the security awarenesssystem identifies, based on the one or more vulnerabilities, one or moretraining modules for electronic based training of users of theorganization for security awareness. In some embodiments, the securityawareness system determines, based on at least the one or morevulnerabilities, configuration of a subsequent simulated phishingcampaign to execute for the organization. In some embodiments,vulnerability of an organization comprises the likelihood of anorganization to be phished in a phishing attack comprising at least oneof an email message, a short message system (SMS) or text message, aphone call, a VoIP call, and an Internet based message. In someembodiments, vulnerability of an organization comprises determining oneor more of specific models, templates, template detail pages, andtimings related to a simulated phishing campaign which contribute to thegreatest likelihood of an organization being phished. In someembodiments, the security awareness system may redact specific companyinformation and combine redacted information across multiple companiesin order to determine the greatest vulnerability of one or a specificindustry, a specific geographic region, a specific populationdemographic, a specific organizational level, and a specific tenure at acompany.

FIG. 5 depicts an example output of a system monitoring modulemonitoring the creation of one or more models. In some embodiments, thesystem monitors assignments for workers. In some examples, the systemmonitors one or more of assignments returned, assignments abandoned,assignments rejected, assignments accepted, assignments submitted, andassignments approved. In some embodiments, the system monitors one ormore of SQS events received, SQS event receive errors, and SQS eventreceive database errors. The system monitor may monitor one or more ofjob canceled checks, job canceled check errors, checking for new jobsand creating job runs. In some examples, the system may monitor one ormore of new hits needed, hits created, hits reviewable, review hitscreated, review hits reviewable, reviewables checks, reviewables checkerrors, review hits expired, review assignments approved, and answerssubmitted. In some embodiments, a system administrator may determine thetime period over which to display the monitored information. In someembodiments, a system administrator may determine the refresh rate ofthe monitored information.

FIG. 6 depicts an example input screen for a company administratorconsole to create an AIDA campaign. In some embodiments, the AIDAcampaign creation screen allows a company administrator to name acampaign. In some examples, a company administrator can set one or moreof the starting time, starting date, and time zone for the campaign. Insome embodiments, the company administrator to select and/or create usergroups for the campaign. The company administrator may choice whether toallow text messages and allow VoIP calls as part of the new AIDAcampaign.

FIG. 7 depicts a company administrator console dashboard showing anoverview summary of an AIDA campaign generated by a dashboard generator.In some embodiments, dashboard generator 298 generates a display of thenumber of times a user interacts with a link in a simulated phishingmessage that is part of an AIDA campaign over a given time period afterthe start of the AIDA campaign. In some embodiments, dashboard generator298 generates a display of the number of times a user has interactedwith a link in each of the first number of time periods after the startof an AIDA campaign. In some embodiments, the time period is one hour.In some embodiments, dashboard generator 298 displays a circle with asize that is proportionate to the number of interactions with asimulated phishing message in a time period, wherein the greater thenumber of user interactions with links in simulated phishing messages,the larger the size of the circle that is displayed. In someembodiments, dashboard generator 298 displays the status of the AIDAcampaign as one of stopped, started, paused, ongoing, discontinued,completed, finished, cancelled, restarted, or aborted. In someembodiments, dashboard generator 298 displays the date and time that anAIDA campaign was created on. In some embodiments, dashboard generator298 displays the date an AIDA campaign was started on. In someembodiments, dashboard generator 298 displays the end date of an AIDAcampaign. In some embodiments, if the campaign is one of stopped,paused, ongoing, discontinued, cancelled, restarted, or aborted, the enddate is displayed as “Not Finished”. In some embodiments, the companyadministrator can highlight a specific recipient and see all the actionsperformed on that recipient (e.g. messages sent to the recipient, whatdetail page was used, when the message was sent, etc.) and all theactions that the recipient performed (e.g. clicked on a link in a textmessage, responded to an email, etc.). For example, if there is a recordin one or more campaign recipient actions table(s) indicating that thecampaign controller 250 sent them an email, then the companyadministrator can click on this action and the company administratorconsole 295 displays a copy of the detail page of the template that wasused to generate the email that the user received. In some embodiments,dashboard generator 298 displays information about the browser, agent orplatform that the user uses to view the messages of a campaign. In someembodiments, dashboard generator 298 displays information about multipleuser's browsers, agents, or platforms in a pie chart format.

It should be understood that the systems described above may providemultiple ones of any or each of those components and these componentsmay be provided on either a standalone machine or, in some embodiments,on multiple machines in a distributed system. The systems and methodsdescribed above may be implemented as a method, apparatus or article ofmanufacture using programming and/or engineering techniques to producesoftware, firmware, hardware, or any combination thereof. In addition,the systems and methods described above may be provided as one or morecomputer-readable programs embodied on or in one or more articles ofmanufacture. The term “article of manufacture” as used herein isintended to encompass code or logic accessible from and embedded in oneor more computer-readable devices, firmware, programmable logic, memorydevices (e.g., EEPROMs, ROMs, PROMS, RAMS, SRAMs, etc.), hardware (e.g.,integrated circuit chip, Field Programmable Gate Array (FPGA),Application Specific Integrated Circuit (ASIC), etc.), electronicdevices, a computer readable non-volatile storage unit (e.g., CD-ROM,floppy disk, hard disk drive, etc.). The article of manufacture may beaccessible from a file server providing access to the computer-readableprograms via a network transmission line, wireless transmission media,signals propagating through space, radio waves, infrared signals, etc.The article of manufacture may be a flash memory card or a magnetictape. The article of manufacture includes hardware logic as well assoftware or programmable code embedded in a computer readable mediumthat is executed by a processor. In general, the computer-readableprograms may be implemented in any programming language, such as LISP,PERL, C, C++, C#, PROLOG, or in any byte code language such as JAVA. Thesoftware programs may be stored on or in one or more articles ofmanufacture as object code.

While various embodiments of the methods and systems have beendescribed, these embodiments are illustrative and in no way limit thescope of the described methods or systems. Those having skill in therelevant art can effect changes to form and details of the describedmethods and systems without departing from the broadest scope of thedescribed methods and systems. Thus, the scope of the methods andsystems described herein should not be limited by any of theillustrative embodiments and should be defined in accordance with theaccompanying claims and their equivalents.

What is claimed is:
 1. A method comprising: receiving, by one or moreprocessors, an identification of an entity; selecting, by the one ormore processors, based on at least identification of the entity, one ormore models from a plurality of models to use for the entity toconfigure one or more simulated phishing campaigns directed to usersassociated with the entity, the plurality of models comprising one of anartificial intelligence or machine learning model; executing, by the oneor more processors using the selected one or more models, one or moresimulated phishing campaigns configured using the one or more selectedmodels; and determining, by the one or more processors, one or morevulnerabilities of the entity based at least on results of execution ofthe one or more simulated phishing campaigns.
 2. The method of claim 1,further comprising receiving, by the one or more processors, via a userinterface the identification of the entity and one or more attributes ofthe entity.
 3. The method of claim 1, further comprising identifying, bythe one or more processors, the one or more attributes of the entity. 4.The method of claim 1, further comprising selecting, by the one or moreprocessors, the one or more models from the plurality of models usingthe one or more attributes of the entity.
 5. The method of claim 1,further comprising identifying, by the one or more processors, one ormore attributes of users associated with the entity.
 6. The method ofclaim 1, further comprising selecting, by the one or more processors,the one or more models from the plurality of models using the one ormore attributes of the users.
 7. The method of claim 1, where the one ormore models comprises a template selected from a plurality of templatesfor the simulated phishing campaign.
 8. The method of claim 1, furthercomprising determining as the one or more vulnerabilities a percentageof users that are phish-prone.
 9. The method of claim 8, wherein thepercentage of users that are phish-prone comprises a number of the usersthat interacted with a simulated phishing communication.
 10. The methodof claim 1, wherein the one or more vulnerabilities causing one or moreof the users of to interact with a simulated phishing communicationincludes one or more of the following: a type of the simulated phishingcommunication, a type of exploit used by the simulated phishingcommunication, content of the simulated phishing communication andtiming of or between simulated phishing communications.
 11. A systemcomprising: one or more processors, coupled to memory and configured to:receive an identification of an entity; selecting, based on at leastidentification of the entity, one or more models from a plurality ofmodels to use for the entity to configure one or more simulated phishingcampaigns directed to users associated with the entity, wherein theplurality of models comprises one of an artificial intelligence ormachine learning model; execute, using the selected one or more models,one or more simulated phishing campaigns configured using the one ormore selected models; and determine one or more vulnerabilities of theentity based at least on results of execution of the one or moresimulated phishing campaigns.
 12. The system of claim 11, wherein theone or more processors are further configured to receive via a userinterface the identification of the entity and one or more attributes ofthe entity.
 13. The system of claim 11, wherein the one or moreprocessors are further configured to identify one or more attributes ofthe entity.
 14. The system of claim 11, wherein the one or moreprocessors are further configured to select the one or more models fromthe plurality of models using the one or more attributes of the entity.15. The system of claim 11, wherein the one or more processors arefurther configured to identify one or more attributes of usersassociated with the entity.
 16. The system of claim 11, wherein the oneor more processors are further configured to select the one or moremodels from the plurality of models using the one or more attributes ofthe users.
 17. The system of claim 11, where the one or more modelscomprise a template selected from a plurality of templates for thesimulated phishing campaign.
 18. The system of claim 11, wherein the oneor more processors are further configured to determine as the one ormore vulnerabilities a percentage of users that are phish-prone.
 19. Thesystem of claim 18, wherein the percentage of users that are phish-pronecomprises a number of the users that interacted with a simulatedphishing communication.
 20. The system of claim 11, wherein the one ormore vulnerabilities causing one or more of the users of to interactwith a simulated phishing communication includes one or more of thefollowing: a type of the simulated phishing communication, a type ofexploit used by the simulated phishing communication, content of thesimulated phishing communication and timing of or between simulatedphishing communications.