Sign In to Follow Application
View All Documents & Correspondence

Cyberattack Simulation Training System

Abstract: A cyberattack simulation training system, comprising a computing assembly 101 to simulate a cyberattack, the assembly 101 comprises a touch-enabled display panel 102, a processing unit 103, and a keyboard 104 and a mouse 105, a holographic projection unit 106 displays details of the simulated cyberattack along with guidance regarding actions to be undertaken by the user to ensure safety from the cyberattack and alternatives of actions for the user to choose, a camera 107 connected with the computing assembly 101, records user’s interactions with the computing assembly 101 to determine user’s competence in handing the simulated cyberattack, a pneumatic pin 108 is provided under each key of the keyboard 104 selectively extended to prevent user from pressing unintended keys during a cyberattack simulation, multiple motorised pop-out balls 109 translate the mouse 105 and the corresponding cursor to guide the user with actions required to be taken during cyberattack.

Get Free WhatsApp Updates!
Notices, Deadlines & Correspondence

Patent Information

Application #
Filing Date
27 May 2025
Publication Number
25/2025
Publication Type
INA
Invention Field
COMPUTER SCIENCE
Status
Email
Parent Application

Applicants

Marwadi University
Rajkot - Morbi Road, Rajkot 360003 Gujarat, India.

Inventors

1. Dhruvish Rathod
Department of Computer Engineering, Marwadi University, Rajkot - Morbi Road, Rajkot 360003 Gujarat, India.
2. Jenish Dholariya
Department of Computer Engineering, Marwadi University, Rajkot - Morbi Road, Rajkot 360003 Gujarat, India.
3. Anand Gadhavi
Department of Computer Engineering, Marwadi University, Rajkot - Morbi Road, Rajkot 360003 Gujarat, India.
4. Prof. Parth Parmar
Department of Computer Engineering, Marwadi University, Rajkot - Morbi Road, Rajkot 360003 Gujarat, India.

Specification

Description:FIELD OF THE INVENTION

[0001] The present invention relates to a cyberattack simulation training system that is developed to enable users to engage in simulated cybersecurity scenarios to enhance their response and decision-making capabilities under cyberattack conditions, while also monitoring their stress and competence levels, for offering real-time guidance, and adapting the simulation accordingly.

BACKGROUND OF THE INVENTION

[0002] In everyday situations, people often rely on traditional methods to understand and respond to problems, especially in areas like cybersecurity. Learning about cyber threats usually involves reading printed guides, attending in-person workshops, or listening to instructions from trainers. These methods are mostly passive and don’t engage users actively. They often miss the urgency and complexity of real cyberattacks. Without interaction, feedback, or adaptive guidance, it's hard for users to build the confidence and skills needed to respond quickly and correctly. These conventional setups also fail to adjust based on the user’s decisions or stress levels. This gap between knowing what to do and actually doing the operation in a live situation leads to poor preparedness. Also, traditional learning lacks immersive experiences that reflect how cyberattacks truly unfold. As a result, users end up unprepared when facing fast-changing digital threats in real life.

[0003] Conventionally, cybersecurity training relied heavily on traditional methods such as printed manuals, classroom lectures, and instructor-led sessions. These approaches were predominantly passive, requiring learners to absorb information without active engagement or real-time feedback. While they provided foundational knowledge, they lacked the interactivity necessary to simulate real-world cyberattack scenarios effectively. So, organizations began incorporating computer-based training modules and simulations. These systems allowed for more dynamic learning experiences, offering users the opportunity to engage with simulated cyberattacks in a controlled environment. However, these systems often faced limitations such as lack of adaptability to individual learning paces, absence of real-time feedback, and insufficient personalization to cater to diverse user needs.

[0004] US11429713B1 discloses methods and systems disclosed herein generally relate to automated execution and evaluation of computer network training exercises, such as in a virtual environment. A server generates a training system having a virtual attack machine and a virtual target machine where the virtual target machine is operatively controlled by a trainee computer. The server then executes a simulated cyber-attack and monitors/collects actions and responses by the trainee. The server then executes an artificial intelligence model to evaluate the trainee's action and to identify a subsequent simulated cyber-attack (e.g., a next step to the simulated cyber-attack). The server may then train the artificial intelligence model using various machine-learning techniques using the collected data during the exercise.

[0005] US20160301716A1 discloses a cybersecurity training system uses lures and training actions to help train a user of an electronic device to recognize and act appropriately in situations that could compromise electronic device security. The system includes a library of cybersecurity training actions and a library of brand items. The system retrieves a template for a cybersecurity training action from the first library, automatically modifies the retrieved template to include a brand or branded content from the second library, and causes the cybersecurity training action according to the modified template instantiated with the branded content to be sent to the user's electronic device.

[0006] Conventionally, many systems have been developed that are capable of providing cyberattack simulation training. However, these existing systems are incapable of monitoring user stress levels and adjusting the simulation accordingly. Additionally, these existing systems also fail to enhance user engagement and interaction during the training process by not incorporating physical touch-based and sensory feedback means, resulting in poor user performance and no improvement in decision-making during the simulation.

[0007] In order to overcome the aforementioned drawbacks, there exists a need in the art to develop a system that requires to facilitate stress management and mental well-being during cyberattack simulations by monitoring user stress levels and adjusting the simulation or providing guidance on reducing stress, when necessary, thereby ensuring that the user remains engaged and able to complete the training effectively. In addition, the developed systema also needs to enhance user engagement and interaction during the training process by incorporating physical touch-based and sensory feedback means, which provide immediate feedback on users' actions and reinforce correct behaviours and responses, thus helps users stay on track and improves their decision-making as they progress through the simulation.

OBJECTS OF THE INVENTION

[0008] The principal object of the present invention is to overcome the disadvantages of the prior art.

[0009] An object of the present invention is to develop a system that provide an interactive simulation means that immerses users in realistic cyberattack scenarios, allowing them to engage in simulated events that enhance their understanding of cyber threats and improve their ability to respond appropriately to such threats.

[0010] Another object of the present invention is to develop a system that enables real-time assessment and feedback of user actions during the simulation, determining their level of competence in managing cyberattacks and offering suggestions and warnings based on their interactions, thereby improving their decision-making and safety preparedness.

[0011] Yet another object of the present invention is to develop a system that evaluates user performance during the cyberattack simulation and tailors the complexity and nature of the simulation in real time to optimize user training.

[0012] The foregoing and other objects, features, and advantages of the present invention will become readily apparent upon further review of the following detailed description of the preferred embodiment as illustrated in the accompanying drawings.

SUMMARY OF THE INVENTION

[0013] The present invention relates to a cyberattack simulation training system that facilitates an engaging experience by immersing individuals in realistic cyberattack simulations, where they actively participate in scenarios aimed at deepening their comprehension of cyber risks and sharpening their skills in handling such dangers effectively.

[0014] According to an embodiment of the present invention, a cyberattack simulation training system comprises of a computing assembly to simulate a cyberattack, the assembly comprises a touch-enabled display panel, a processing unit, and a keyboard and a mouse, a user interface is adapted to be installed with a computing unit to enable a user to input personal details and book a slot for training or monitoring, a simulation module configured with the processing unit, generates simulations of cyberattack via the computing assembly, a holographic projection unit connected with the processing unit displays details of the simulated cyberattack along with guidance regarding actions to be undertaken by the user to ensure safety from the cyberattack and alternatives of the actions for the user to choose, an artificial intelligence based camera connected with the computing assembly, records user’s interactions with the computing assembly to determine user’s competence in handing the simulated cyberattack to accordingly actuate the projection unit to project warnings and suggestions, a haptic feedback unit is installed in the keyboard and the mouse, provides haptic feedback to the user upon performing correct actions with regards to safety against cyberattack, a pneumatic pin is provided under each key of the keyboard selectively extended to prevent user from pressing unintended keys during a cyberattack simulation, and a plurality of motorised pop-out balls is provided underneath the mouse to translate the mouse and the corresponding cursor to guide the user with actions required to be taken during cyberattack.

[0015] According to another embodiment of the present invention, the system further comprises of a monitoring module is configured with the processing module determine a stress of the user during the simulation based on user’s interaction with the keyboard and the mouse, an eye-wearable frame is provided with an EEG (Electroencephalography) sensor embedded in the temple of the frame, to detect health parameters of the user during the simulation, to determine stress to halt the simulation and actuate the projection unit to project images containing guidance regarding reducing stress, the frame is wirelessly connected with the communication unit, a plurality of data transfer slots connected with the processing unit, to interface with memory units, a scanning module configured with the processing unit, scans the memory units to detected for malicious element, a communication unit provided in the computing assembly, to connect wirelessly with computing units to scan the computing units for malicious elements.

[0016] While the invention has been described and shown with particular reference to the preferred embodiment, it will be apparent that variations might be possible that would fall within the scope of the present invention.

BRIEF DESCRIPTION OF THE DRAWINGS

[0017] These and other features, aspects, and advantages of the present invention will become better understood with regard to the following description, appended claims, and accompanying drawings where:
Figure 1 illustrates a perspective view of a cyberattack simulation training system.

DETAILED DESCRIPTION OF THE INVENTION

[0018] The following description includes the preferred best mode of one embodiment of the present invention. It will be clear from this description of the invention that the invention is not limited to these illustrated embodiments but that the invention also includes a variety of modifications and embodiments thereto. Therefore, the present description should be seen as illustrative and not limiting. While the invention is susceptible to various modifications and alternative constructions, it should be understood, that there is no intention to limit the invention to the specific form disclosed, but, on the contrary, the invention is to cover all modifications, alternative constructions, and equivalents falling within the spirit and scope of the invention as defined in the claims.

[0019] In any embodiment described herein, the open-ended terms "comprising," "comprises,” and the like (which are synonymous with "including," "having” and "characterized by") may be replaced by the respective partially closed phrases "consisting essentially of," consists essentially of," and the like or the respective closed phrases "consisting of," "consists of, the like.

[0020] As used herein, the singular forms “a,” “an,” and “the” designate both the singular and the plural, unless expressly stated to designate the singular only.

[0021] The present invention relates to a cyberattack simulation training system that enable users to actively participate in realistic cyberattack scenarios that allow them to identify and respond to specific threats, thereby improving their understanding of cybersecurity vulnerabilities and enhancing their ability to take effective actions during actual cyber incidents.

[0022] Referring to Figure 1, a perspective view of a cyberattack simulation training system is illustrated, comprising a computing assembly 101 to simulate a cyberattack, the assembly 101 comprises a touch-enabled display panel 102, a processing unit 103, and a keyboard 104 and a mouse 105, a holographic projection unit 106 connected with the processing unit 103, an artificial intelligence-based camera 107 connected with the computing assembly 101, a pneumatic pin 108 is provided under each key of the keyboard 104, a plurality of motorised pop-out balls 109 is provided underneath the mouse 105, a plurality of data transfer slots 110 connected with the processing unit 103 and an eye-wearable frame 111 is provided with an EEG (Electroencephalography) sensor 112.

[0023] The system disclosed herein comprising a computing assembly 101 which is provided for the purpose of simulating a cyberattack, the assembly 101 comprising a touch-enabled display panel 102 operatively connected to a processing unit 103 configured to execute simulation processes. The assembly 101 further includes a keyboard 104 and a mouse 105 operably linked to the processing unit 103, enabling user interaction during the simulation. The components collectively facilitate the execution and visualization of cyberattack scenarios, thereby allowing controlled user engagement with the simulated environment for assessment or training purposes.

[0024] A user interface is adapted for integration with a computing unit to enable a user to enter personal information and schedule a session for either training or monitoring purposes. The interface is configured to facilitate secure data input and manage slot allocation, thereby ensuring organized and user-specific access to the simulation system.

[0025] As the session is scheduled, the processing unit 103 directs the display panel 102 to execute the simulation processes. The display panel 102 comprises an LED or LCD screen, a control board, a backlight arrangement, and input connectors. The LED/LCD screen serves as the main visual output, while the control board manages data input and image processing. The backlight arrangement, often made of LEDs, illuminates the screen, ensuring visibility. When information is sent to the display, the control board processes the data and directs the LED/LCD pixels to show specific colors, creating images or text. The backlight adjusts brightness for optimal clarity. This combined functionality enables the panel 102 to execute simulation processes.

[0026] A simulation module is operatively configured with the processing unit 103 and is structured to generate controlled and replicable cyberattack simulations through the computing assembly 101. The module is programmed to initiate, manage, and execute various cyber threat scenarios, each designed to emulate specific forms of malicious digital activity. Upon activation, the module utilizes the computational resources of the processing unit 103 to deliver real-time, scenario-based simulations that replicate the behaviour, characteristics, and progression of cyberattacks. These simulations are rendered via the computing assembly 101, thereby enabling comprehensive user interaction for the purposes of assessment, training, or response evaluation in a controlled digital environment.

[0027] A holographic projection unit 106 is operatively linked to the processing unit 103, wherein the projection unit 106 is specifically configured to display, in three-dimensional holographic form, comprehensive details of the simulated cyberattack. This includes a clear representation of the nature, progression, and potential impact of the cyberattack. In addition, the projection unit 106 also provide precise guidance to the user regarding the actions necessary to mitigate or prevent the cyberattack, ensuring user safety within the simulation environment. Furthermore, the unit is programmed to present alternative courses of action, thereby offering the user a range of options to consider and select from, enabling interactive decision-making in response to the simulated scenario.

[0028] The holographic projection unit 106 disclosed herein, comprises of multiple lens. After getting the actuation command from the microcontroller, a light source integrated in the projection unit 106 emits various combination of lights toward the lens which is further portrayed to project information about the simulated cyberattack, along with instructions on the actions the user should take to protect themselves from the attack, and provides alternative actions for the user to select from.

[0029] An artificial intelligence-based camera 107 is operatively connected to the computing assembly 101 and is configured to monitor and record the user’s interactions with the computing assembly 101 during the simulation. The camera 107 utilizes advanced AI protocols to assess the user's behaviour, actions, and responses while engaged in the simulated cyberattack scenario. This data is processed in real time to evaluate the user's competence in handling the cyberattack, enabling the system to adjust the simulation or provide feedback based on the user’s performance.

[0030] The artificial intelligence-based camera 107 utilizes image recognition and machine learning protocols to monitor and track the user's actions during the cyberattack simulation. The camera 107 captures detailed visual data, which is analyzed by AI models to detect specific patterns, such as user gestures, input accuracy, and response time. Based on the analysis, the AI evaluates the user’s proficiency in executing the required actions to handle the cyberattack scenario. The processing unit 103 processes this information to project warnings and suggestions via projection unit 106 and enhance the user’s learning experience.

[0031] A haptic feedback unit is installed within the keyboard 104 and the mouse 105, and is configured to provide tactile feedback to the user upon the successful completion of actions related to safety during the simulated cyberattack. This feedback unit is triggered in real time based on user inputs, delivering a physical sensation that reinforces correct actions taken by the user. The haptic feedback serves to confirm the appropriateness of the user’s responses, thus promoting correct behaviour and improving the overall training experience within the simulation.

[0032] The haptic feedback unit operates through sensors such as piezoelectric sensors, accelerometers, and force sensors embedded within the keyboard 104 and mouse 105, which detect the user’s actions, such as key presses or mouse 105 movements. Upon recognizing the execution of a correct action, the unit activates motors or vibration elements to deliver tactile sensations. These sensations vary in intensity and duration depending on the nature of the action performed. The feedback is generated instantaneously, providing immediate confirmation to the user, reinforcing correct behaviour, and enhancing the user’s engagement and learning experience during the cyberattack simulation.

[0033] A pneumatic pin 108 is installed under each key of the keyboard 104, configured to selectively extend or retract based on the user’s interaction with the keys during a cyberattack simulation. The pneumatic pin 108 are designed to prevent the user from inadvertently pressing unintended keys by physically blocking or restricting key movement unless a correct or intended key is pressed. This selective extension of the pin 108 ensures that only the desired keys is activated during the simulation, thereby minimizing errors and enhancing the user’s focus and accuracy in responding to the simulated cyberattack scenario.

[0034] The pin 108 are pneumatically actuated, wherein the pneumatic arrangement of the pin 108 comprises of a cylinder incorporated with an air piston and the air compressor, wherein the compressor controls discharging of compressed air into the cylinder via air valves which further leads to the extension/retraction of the piston. The piston is attached to the telescopic pin 108, wherein the extension/retraction of the piston corresponds to the extension/retraction of the pin 108. The actuated compressor allows extension of the pin 108 to prevent user from pressing unintended keys during the cyberattack simulation.

[0035] A plurality of motorized pop-out balls 109 (preferably 2 to 6 in numbers) is positioned underneath the mouse 105, and is configured to translate the movement of the mouse 105 and the corresponding cursor on the display. The motorized balls 109 are designed to provide physical guidance to the user by dynamically adjusting the position of the mouse 105, thereby directing the user towards the necessary actions required during a cyberattack simulation.

[0036] The motorized pop-out balls 109 are embedded within the base of the mouse 105, connected to motors that control their extension and retraction. As the user moves the mouse 105, the processing unit 103 detects the movement and activates the motors to adjust the position of the balls 109. The balls 109 extend or retract in response to the user's actions, guiding the mouse 105 in specific directions to ensure the cursor aligns with key areas or actions required during the simulation. This dynamic movement assists the user in executing precise actions based on the evolving cyberattack scenario.

[0037] A monitoring module is operatively integrated with the processing module, wherein the monitoring module is configured to assess the user's stress levels during the simulation. This assessment is conducted through the analysis of the user's interactions with the keyboard 104 and mouse 105, such as input speed, frequency, pressure, and movement patterns. The processing module processes this data in real time to determine variations in the user's behaviour indicative of stress. Based on these indicators, the processing unit 103 may adjust the simulation accordingly, providing adaptive responses or feedback to support the user’s engagement and well-being throughout the training process.

[0038] An eye-wearable frame 111 is provided, incorporating an Electroencephalography (EEG) sensor 112 embedded within the temple of the frame 111. The EEG sensor 112 is configured to monitor and record the user’s brain activity during the simulation, thereby enabling the detection of health parameters, including stress levels.

[0039] The EEG sensor 112 embedded in the temple of the eye-wearable frame 111 functions by detecting electrical activity generated by the user's brain. Electrodes within the sensor 112 measure fluctuations in brain wave patterns, which are then transmitted to the processing unit 103 for analysis. The processing unit 103 classifies the detected brainwave data to identify specific stress indicators, such as heightened frequency of beta waves, associated with anxiety or cognitive strain. If stress levels surpass a predefined threshold, the sensor 112 triggers the processing unit 103 to halt or modify the simulation, ensuring the user’s health and safety during the experience.

[0040] Upon detecting elevated stress levels through the EEG sensor 112, the processing unit 103 is configured to actuate the projection unit 106, which is programmed to display visual images containing guidance and recommendations aimed at reducing the user’s stress. These images may include relaxation techniques, breathing exercises, or other strategies designed to alleviate cognitive strain. The projection unit 106, under the control of the processing module, dynamically generates and presents this stress-reducing content in real time, providing the user with actionable instructions to manage stress effectively and restore optimal focus and performance within the simulation.

[0041] The frame 111 is wirelessly connected to the communication unit, enabling seamless data transfer between the EEG sensor 112 embedded in the frame 111 and the processing unit 103. This wireless connection facilitates real-time monitoring of the user’s brain activity, allowing the processing unit 103 to continuously assess stress levels and adjust the simulation accordingly. The communication unit ensures that the EEG sensor 112 data is transmitted efficiently, providing timely feedback to the processing unit 103 for the activation of the projection unit 106 or any necessary adjustments to the simulation based on the user’s mental state.

[0042] A plurality of data transfer slots 110 is connected to the processing unit 103, designed to interface with various memory units. A scanning module that is integrated with the processing unit 103, scans the connected memory units for the presence of malicious elements. The scanning module operates by analyzing the data stored within the memory units, identifying potential threats or malicious code, and flagging such elements for further action. This process ensures the proper functioning of the operation by detecting and preventing harmful data from interfering with the simulation or other processes, thus safeguarding the simulation environment and maintaining smooth execution without disruption from potential threats.

[0043] A communication unit is provided within the computing assembly 101 to wirelessly connect with external computing units, enabling the scanning of those units for malicious elements. The communication unit facilitates the detection of harmful data, such as viruses or malware, by establishing a connection and allowing for the examination of the computing units for potential threats. This ensures that the computing units remain free from malicious interference during the process, preserving the integrity and security of the operations.

[0044] In an embodiment of the present invention, in the training mode, the projection unit 106 will present interactive "What will happen next?" scenarios to the user. Upon the user’s action, such as clicking a website link, the projection unit 106 will display the potential risks associated with that action, providing detailed information on how these risks might compromise the file, system, or data. This interactive approach educates the user on the consequences of their actions, helping them understand the potential threats and the importance of making informed decisions to safeguard against cyber risks.

[0045] Moreover, a battery is associated with the system for powering up electrical and electronically operated components associated with the system and supplying a voltage to the components. The battery used herein is preferably a Lithium-ion battery which is a rechargeable unit that demands power supply after getting drained. The battery stores the electric current derived from an external source in the form of chemical energy, which when required by the electronic component of the system, derives the required power from the battery for proper functioning of the system.

[0046] The present invention works best in the following manner, where the computing assembly 101 as disclosed in the invention simulates the cyberattack. The assembly 101 comprises the touch-enabled display panel 102, the processing unit 103, and the keyboard 104 and the mouse 105. The user interface is adapted to be installed with the computing unit to enable the user to input personal details and book the slot for training or monitoring. Thereafter the simulation module configured with the processing unit 103, generates simulations of cyberattack via the computing assembly 101. The holographic projection unit 106 connected with the processing unit 103 displays details of the simulated cyberattack along with guidance regarding actions to be undertaken by the user to ensure safety from the cyberattack and alternatives of the actions for the user to choose. Synchronously, the artificial intelligence-based camera 107 records user’s interactions with the computing assembly 101 to determine user’s competence in handing the simulated cyberattack. And at the same time the projection unit 106 project warnings and suggestions. Also, the haptic feedback unit provides haptic feedback to the user upon performing correct actions with regards to safety against cyberattack. The pneumatic pin 108 is provided under each key of the keyboard 104 selectively extended to prevent user from pressing unintended keys during the cyberattack simulation. Plurality of motorised pop-out balls 109 is provided underneath the mouse 105 to translate the mouse 105 and the corresponding cursor to guide the user with actions required to be taken during cyberattack.

[0047] In continuation, the monitoring module determines the stress of the user during the simulation based on user’s interaction with the keyboard 104 and the mouse 105. The eye-wearable frame 111 is provided with the EEG (Electroencephalography) sensor 112 to detect health parameters of the user during the simulation, to determine stress to halt the simulation and actuate the projection unit 106 to project images containing guidance regarding reducing stress. The frame 111 is wirelessly connected with the communication unit. Plurality of data transfer slots 110 connected with the processing unit 103, to interface with memory units. Further the scanning module configured with the processing unit 103, scans the memory units to detected for malicious element. Furthermore, the communication unit provided in the computing assembly 101, connect wirelessly with computing units to scan the computing units for malicious elements.

[0048] Although the field of the invention has been described herein with limited reference to specific embodiments, this description is not meant to be construed in a limiting sense. Various modifications of the disclosed embodiments, as well as alternate embodiments of the invention, will become apparent to persons skilled in the art upon reference to the description of the invention. , Claims:1) A cyberattack simulation training system, comprising:

i) a computing assembly 101 to simulate a cyberattack, wherein the assembly 101 comprises a touch-enabled display panel 102, a processing unit 103, and a keyboard 104 and a mouse 105;
ii) a simulation module configured with the processing unit 103, generates simulations of cyberattack via the computing assembly 101;
iii) a holographic projection unit 106 connected with the processing unit 103 displays details of the simulated cyberattack along with guidance regarding actions to be undertaken by the user to ensure safety from the cyberattack and alternatives of actions for the user to choose;
iv) an artificial intelligence-based camera 107 connected with the computing assembly 101, records user’s interactions with the computing assembly 101 to determine user’s competence in handing the simulated cyberattack to accordingly actuate the projection unit 106 to project warnings and suggestions;
v) a pneumatic pin 108 is provided under each key of the keyboard 104 selectively extended to prevent user from pressing unintended keys during a cyberattack simulation; and
vi) a plurality of motorised pop-out balls 109 is provided underneath the mouse 105 to translate the mouse 105 and the corresponding cursor to guide the user with actions required to be taken during cyberattack.

2) The system as claimed in claim 1, wherein a user interface is adapted to be installed with a computing unit to enable a user to input personal details and book a slot for training or monitoring.

3) The system as claimed in claim 1, wherein a plurality of data transfer slots 110 connected with the processing unit 103, to interface with memory units, wherein a scanning module configured with the processing unit 103, scans the memory units to detected for malicious element.

4) The system as claimed in claim 1, wherein a communication unit provided in the computing assembly 101, to connect wirelessly with computing units to scan the computing units for malicious elements.

5) The system as claimed in claim 1, wherein a monitoring module is configured with the processing module determine a stress of the user during the simulation based on user’s interaction with the keyboard 104 and the mouse 105.

6) The system as claimed in claim 1, wherein a haptic feedback unit is installed in the keyboard 104 and the mouse 105, provides haptic feedback to the user upon performing correct actions with regards to safety against cyberattack.

7) The system as claimed in claim 1, wherein an eye-wearable frame 111 is provided with an EEG (Electroencephalography) sensor 112 embedded in the temple of the frame 111, to detect health parameters of the user during the simulation, to determine stress to halt the simulation and actuate the projection unit 106 to project images containing guidance regarding reducing stress.

8) The system as claimed in claim 1, wherein the frame 111 is wirelessly connected with the communication unit.

Documents

Application Documents

# Name Date
1 202521050671-STATEMENT OF UNDERTAKING (FORM 3) [27-05-2025(online)].pdf 2025-05-27
2 202521050671-REQUEST FOR EXAMINATION (FORM-18) [27-05-2025(online)].pdf 2025-05-27
3 202521050671-REQUEST FOR EARLY PUBLICATION(FORM-9) [27-05-2025(online)].pdf 2025-05-27
4 202521050671-PROOF OF RIGHT [27-05-2025(online)].pdf 2025-05-27
5 202521050671-POWER OF AUTHORITY [27-05-2025(online)].pdf 2025-05-27
6 202521050671-FORM-9 [27-05-2025(online)].pdf 2025-05-27
7 202521050671-FORM FOR SMALL ENTITY(FORM-28) [27-05-2025(online)].pdf 2025-05-27
8 202521050671-FORM 18 [27-05-2025(online)].pdf 2025-05-27
9 202521050671-FORM 1 [27-05-2025(online)].pdf 2025-05-27
10 202521050671-FIGURE OF ABSTRACT [27-05-2025(online)].pdf 2025-05-27
11 202521050671-EVIDENCE FOR REGISTRATION UNDER SSI(FORM-28) [27-05-2025(online)].pdf 2025-05-27
12 202521050671-EVIDENCE FOR REGISTRATION UNDER SSI [27-05-2025(online)].pdf 2025-05-27
13 202521050671-EDUCATIONAL INSTITUTION(S) [27-05-2025(online)].pdf 2025-05-27
14 202521050671-DRAWINGS [27-05-2025(online)].pdf 2025-05-27
15 202521050671-DECLARATION OF INVENTORSHIP (FORM 5) [27-05-2025(online)].pdf 2025-05-27
16 202521050671-COMPLETE SPECIFICATION [27-05-2025(online)].pdf 2025-05-27
17 Abstract.jpg 2025-06-12