主权项 |
1. A method for assessing security risks of users in computing networks, the method comprising:
generating, using a security system processor, an interaction item, wherein the interaction item comprises at least one of: a training item and a security item; transmitting, via a network, the interaction item to at least one end user device; receiving, at the security system via a network, feedback data associated with the interaction item, wherein the feedback includes at least one of: security item interaction data, training item interaction data, and technical information associated with the at least one end user device; comparing, using the security system processor, the feedback data to a plurality of security risk scoring metrics, where the plurality of security risk scoring metrics comprises at least one of:
a first set of metrics each assigning a weight to a different user action defined for at least one security item,a second set of metrics each assigning a weight to a different user action defined for at least one training item, anda third set of metrics each assigning weight to a different technical attribute defined for the technical information; calculating, using the security system processor, based on the comparing, a security risk score associated with the at least one end user device, the security risk score quantifying a security risk presented to the computing network by each user associated with the at least one end user device; and generating, using the security system processor, a subsequent interaction item based on the calculated security risk score, wherein the subsequent interaction item includes at least one of: a security item and a training item. |