Tools of Defense #2 Flashcards
Defense in depth
A security discipline that refers to having layers of protection in an IT infrastructure.
It’s intent is to provide redundancy in the event a security control fails or a vulnerability is exploited.
Policies, Procedures, & Awareness:
Published policies, implemented security procedures, and trained employees.
PERIMETER
INTERNAL NETWORK
HOST
APPLICATION
DATA
PERIMETER
A firewall to prevent unauthorized access to the network.
INTERNAL NETWORK
Software or hardware tools that scan the network for attackers and traffic that shouldn’t be there.
HOST
The Individual computers on the network, running antivirus.
APPLICATION
Correct configurations, securely written code, and access privileges.
DATA
Encrypting confidential data, or password protecting databases.
Social Engineering Indicators (SEI)
A feature of KnowBe4’s simulated phishing campaigns that shows a user the red flags they missed when clicking on a link in a simulated phishing campaign.
Artificial Intelligence Driven Agent (AIDA)
A tool that uses AI to automatically create integrated campaigns that send emails, text, and voicemail to an employee, simulating a multi-vector social engineering attack.