Security Program Management and Oversight 5.6 Flashcards

1
Q

Phishing campaigns

A

users should be aware of how to identify phishing attacks and best practices to follow when a phishing email is seen

How to respond and how to report. Should be able to recognise.
Email filter should be able to prevent phishing emails making it through to the inbox,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Anomalous behavior recognition

A

Risk Behavior - Modifying Host file, Replacing a core OS file, Uploading sensitive files
Unexpected behavior - logging in from another country. increase in data transfers.
Unintentional behavior - Typing in the wrong domain name, misplacing usb drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

User training

A

Security awareness training. Before providing access, train your users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Policy or handbooks

A

Document all security requirements, provide access online in policy guidelines.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Situational awareness

A

Users should always be looking for threats.

Software attacks, Email links, attachments unusual URLs, text messages, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Insider threat

A

Multiple approvals for critical processes. Monitor files and systems as much as possible.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Password Management

A

Complexity requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

user guidance and training

A

Removable media and cables, unknown usb drives can contain malware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Social engineering

A

Extensive and ongoing training, attackers are very good. The users are your front line defence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly