Drill #5 Flashcards
firewall
software to block unauthorized network access and only permits authorized communications/requests.
cloud computing
the practice of using remote servers on the Internet to store, manage, and process data
security awareness training (SAT)
Any training to get users to make smarter security decisions and help their organization manage the ongoing problem of social engineering.
Kevin Mitnick
known as the “World’s Most Wanted Hacker.” Today, Kevin’s positioned as “The World’s Most Famous Hacker.”
part owner and the Chief Hacking Officer of KnowBe4.
learning management system (LMS)
A system for managing and delivering training courses.
return on investment (ROI)
amount of return on an investment relative to cost.
Shareable Content Object Reference Model (SCORM)
technical standard that governs how learning content and LMS communicate with each other
Six Steps to Successful Security Awareness Training
Step 1:
Have a policy, and have each employee read and sign it.
Step 2:
Have all employees take mandatory SAT (online)
Step 3:
Make SAT part of the onboarding process
Step 4:
Regularly test employees
Step 5:
Have employees who fail phishing tests face consequences and remedial training; reward employees with low failure rates.
Step 6:
Send regular security hints and tips to all employees.
7 reasons why an organization would outsource security awareness training
Reduce costs Access to talent Geographic reach and scalability Compliance Mitigate risk Business Focus Leverage the cost of technology
Defense in depth
having layers of IT security protection in an IT infrastructure and organization
so that security is not dependent on any single layer
- Policies, Procedures, and Awareness
- Perimeter
- Internal Network
- Host
- Application
- Data
social engineering indicators (SEI)
A feature of KnowBe4’s simulated phishing campaigns that shows a user the red flags they missed when clicking on a link in a simulated phishing campaign.
Artificial Intelligence Driven Agent (AIDA)
AI tool that sends a multi-vector social engineering attack