Security Awareness Flashcards

1
Q

What is Security Awareness?

A

Knowledge and understanding of security threats and mitigation measures

The goal is to equip individuals to recognize and respond to threats for data protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are Insider Threats?

A

Security risk from individuals within an organization

Sources include employees, former employees, contractors, or business partners.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the goal of Password Management?

A

Ensure strong, unique passwords; securely stored; reduces unauthorized access risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are Social Engineering Attacks?

A

Techniques that manipulate individuals into breaching security procedures

Prevention includes avoiding unauthorized media and recognizing phone scams.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of Policies in an organization?

A

Formal guidelines defining organization operations and decisions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Remote Work?

A

Performing job functions outside the office using technology.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Hybrid Work?

A

Combining in-office and remote work for flexibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What characterizes a Culture of Security?

A

Organizational mindset prioritizing security in daily tasks and decision-making

Characteristics include continuous education and proactive risk mitigation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are Behavior Indicators of Insider Threats?

A

Signs may include altered state or substance abuse, emotional distress, and lifestyle incongruences.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What should organizations do to support employees under Financial Struggles?

A

Have policies in place for handling scenarios like financial counseling or monitoring for unusual data access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a Password Manager?

A

Specialized tool, plugin, or extension used with web browsers to securely store and manage various usernames and passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the risks of Password Reuse?

A

Reusing passwords across multiple websites increases the risk of exposure if one site is breached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Name some advantages of Password Managers.

A
  • Securely store and manage multiple credentials
  • Prevent password reuse
  • Simplify password management
  • Encrypt stored passwords.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does Operational Security (OPSEC) protect?

A

Critical information from being used by adversaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the role of Organizational Change Management in creating a Culture of Security?

A

Recognizes the role of the human element in security and emphasizes staff engagement.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the Execution Phase of creating a Culture of Security involve?

A

Rolling out policies, conducting training, and adapting to evolving security threats.

17
Q

True or False: Training employees on recognizing phishing attempts is part of creating a proactive culture of security.

18
Q

Fill in the blank: Policies and handbooks should be reviewed at least _______.

19
Q

What are the security challenges faced in Remote and Hybrid Work Environments?

A
  • Increased risk due to lack of physical security controls
  • Data transmitted can be exposed
  • Weaker security controls on home and public networks.
20
Q

What is the importance of Employee Involvement in security?

A

Encourages open communication with management and collective responsibility in promoting a secure culture.

21
Q

What measures can be taken to address security challenges in remote work?

A
  • Establish comprehensive policies
  • Use secure connections like VPN
  • Implement multi-factor authentication.
22
Q

What should be included in a robust Insider Threat Program?

A
  • Training to recognize warning signs
  • Encouraging reporting of suspicious activities
  • Providing mental health support.
23
Q

What are common techniques used in Social Engineering?

A
  • Shoulder surfing
  • Eavesdropping
  • Piggybacking and tailgating.
24
Q

What is the goal of the Development Phase in creating a Culture of Security?

A

Developing specific and actionable security plans.