Tools of Defense #1 Flashcards

1
Q

Firewall

A

Hardware or software designed to block unauthorized network access while permitting authorized communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Cloud computing

A

The practice of using remote servers on the Internet to store, manage, and process data, rather than a local server or a personal computer.

Cloud servers get all the latest software and security updates, making them less vulnerable to attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

SAT

A

Security Awareness Training

Any training that raises the awareness of a user to potential threats, and how to avoid them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kevin Mitnick

A

In the mid-nineties, he was known as the “World’s Most Wanted Hacker.” Today, Kevin’s positioned as “The World’s Most Famous Hacker.” Kevin is a very successful Fortune 500 security consultant, part owner and the Chief Hacking Officer of KnowBe4.

Based on his 30+ years of first-hand experience with hacking and social engineering, KnowBe4 created KMSAT, which stands for “Kevin Mitnick Security Awareness Training.”

Kevin’s main contribution to KnowBe4 is his experience!

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

LMS

A

Learning Management System

A system for the administration, documentation, tracking, reporting, and delivery of e-learning education courses or training programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

ROI

A

Return on Investment

Measures the amount of return on an investment relative to the investor’s cost.

In IT security, ROI is measure as “reduction in risk,” not as concrete as financial gain. Without proper security awareness training (SAT), a company can experience a loss of reputation, productivity, and revenue.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

SCORM

A

Sharable Content Object Reference Model

A technical standard that governs how online learning content and learning management systems (LMS) communicate with each other.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The Six Steps to Successful Security Awareness Training (SAT)

A

Step 1: Have a security policy, and have each employee read and sign it.

Step 2: Have all employees take mandatory SAT (online), with a clear deadline and reasons why they’re taking the training.

Step 3: Make SAT part of the onboarding process (the process of integrating new hires in a company).

Step 4: Regularly test employees to reinforce the SAT’s application.

Step 5: Have employees who fail phishing tests meet privately with a supervisor or HR; reward employees with low failure rates.

Step 6: Send regular security hints and tips via email to all employees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

7 reasons why an organization would outsource security awareness training

A
  1. Reduce costs
  2. Access to talent
  3. Geographic reach and scalability
  4. Compliance
  5. Mitigate risk
  6. Business focus
  7. Leverage the cost of technology
How well did you know this?
1
Not at all
2
3
4
5
Perfectly