Security Program Management and Oversight 5.6 Flashcards
Phishing campaigns
users should be aware of how to identify phishing attacks and best practices to follow when a phishing email is seen
How to respond and how to report. Should be able to recognise.
Email filter should be able to prevent phishing emails making it through to the inbox,
Anomalous behavior recognition
Risk Behavior - Modifying Host file, Replacing a core OS file, Uploading sensitive files
Unexpected behavior - logging in from another country. increase in data transfers.
Unintentional behavior - Typing in the wrong domain name, misplacing usb drives
User training
Security awareness training. Before providing access, train your users.
Policy or handbooks
Document all security requirements, provide access online in policy guidelines.
Situational awareness
Users should always be looking for threats.
Software attacks, Email links, attachments unusual URLs, text messages, etc.
Insider threat
Multiple approvals for critical processes. Monitor files and systems as much as possible.
Password Management
Complexity requirements.
user guidance and training
Removable media and cables, unknown usb drives can contain malware.
Social engineering
Extensive and ongoing training, attackers are very good. The users are your front line defence