Drill Flashcards
Phising
attempting to get sensitive info such as usernames, passwords, and credit card details
spear phishing
focused, targeted phishing attack on a specific person or organization, with the goal to penetrate their defenses
phishing attack surface:
The amount of emails showing on the internet.
Phish-prone Percentage:
that indicates the percentage of employees that are prone to click on phishing links. (A term coined by KnowBe4 )
Console:
A user interface that manages and controls software and/or hardware.
LMS (Learning Management System)
Is basically where e- learning content is housed, example Bridge
Ransomware
Vicious malware that locks users out of their devices until a sum of money is paid.
protected health information (PHI):
recorded info about a persons health status, including their health care coverage.
personally identifiable information (PII)
Information that can be used on its own or with other info to identify, contact, or locate a single person
PCI DSS (Payment Card Industry Data Security Standard):
A document published by Payment Card Industry.
botnet:
network of robots that live on infected computers, and are controlled by the bad guys.
security awareness training (SAT):
training that raises the awareness of a user to potential threats, and how to avoid them.
Kevin Mitnick:
The World’s Most Famous Hacker.” and Kevin’s main contribution to KnowBe4 is his experience!
The Six Steps to Successful Security Awareness Training (SAT)
Step 1: Have a security policy, and have each employee read and sign it.
Step 2: Have all employees take mandatory SAT (online), with a clear deadline and reasons why they’re taking the training.
Step 3: Make SAT part of the onboarding process (new hires in a company).
Step 4: Regularly test employees to reinforce the SAT its application.
Step 5: Employees who fails test to meet with HR
Step 6: Send regular hints and tips via email
7 reasons why an organization would outsource security awareness training:
- Reduce costs
- Access to talent
- Geographic reach and scalability
- Compliance
- Mitigate Risk
- Business Focus
- Leverage cost of technology.