Podcast
Questions and Answers
What is one of the primary goals of information security awareness?
What is one of the primary goals of information security awareness?
Which type of malware is NOT discussed in the session agenda?
Which type of malware is NOT discussed in the session agenda?
What was highlighted as a top security concern in 2015?
What was highlighted as a top security concern in 2015?
Which of the following is considered a human-based attack?
Which of the following is considered a human-based attack?
Signup and view all the answers
Which of the following is NOT a security tip mentioned in the session?
Which of the following is NOT a security tip mentioned in the session?
Signup and view all the answers
What does 'clearing your screen' refer to in the context of security tips?
What does 'clearing your screen' refer to in the context of security tips?
Signup and view all the answers
Which security measure is recommended for protecting mobile devices?
Which security measure is recommended for protecting mobile devices?
Signup and view all the answers
What is a key component of incident reporting?
What is a key component of incident reporting?
Signup and view all the answers
What does 'business continuity' refer to in the context of information security?
What does 'business continuity' refer to in the context of information security?
Signup and view all the answers
What should you do to protect sensitive data?
What should you do to protect sensitive data?
Signup and view all the answers
Which action should you take when stepping away from your workstation?
Which action should you take when stepping away from your workstation?
Signup and view all the answers
Why is it important to keep your operating system and applications updated?
Why is it important to keep your operating system and applications updated?
Signup and view all the answers
What is a recommended practice when using strong passwords?
What is a recommended practice when using strong passwords?
Signup and view all the answers
What should you avoid when charging your smartphone?
What should you avoid when charging your smartphone?
Signup and view all the answers
What percentage of information security is attributed to behavior rather than technology?
What percentage of information security is attributed to behavior rather than technology?
Signup and view all the answers
What security measure should be taken for a strong password?
What security measure should be taken for a strong password?
Signup and view all the answers
Which statement is true regarding social networking security?
Which statement is true regarding social networking security?
Signup and view all the answers
What is one recommended action for email security?
What is one recommended action for email security?
Signup and view all the answers
What does the Web of Trust (WOT) help users determine?
What does the Web of Trust (WOT) help users determine?
Signup and view all the answers
Which of the following is a suggestion for mobile phone security?
Which of the following is a suggestion for mobile phone security?
Signup and view all the answers
What is a best practice for physical security at a workstation?
What is a best practice for physical security at a workstation?
Signup and view all the answers
What should you do with sensitive documents after use?
What should you do with sensitive documents after use?
Signup and view all the answers
Which of the following is NOT a recommended practice for mobile security?
Which of the following is NOT a recommended practice for mobile security?
Signup and view all the answers
Which characteristic is essential for a password phrase?
Which characteristic is essential for a password phrase?
Signup and view all the answers
What precaution should be taken regarding third-party applications in social networking?
What precaution should be taken regarding third-party applications in social networking?
Signup and view all the answers
What is the first step in incident reporting?
What is the first step in incident reporting?
Signup and view all the answers
What is an example of a successful phishing attack?
What is an example of a successful phishing attack?
Signup and view all the answers
What does the acronym IRC stand for in incident reporting?
What does the acronym IRC stand for in incident reporting?
Signup and view all the answers
Which of the following reflects a countermeasure to information security risks?
Which of the following reflects a countermeasure to information security risks?
Signup and view all the answers
What is one common misconception about digital information?
What is one common misconception about digital information?
Signup and view all the answers
What is a key characteristic of digital information?
What is a key characteristic of digital information?
Signup and view all the answers
Which of the following is a type of social engineering attack?
Which of the following is a type of social engineering attack?
Signup and view all the answers
In the case of a phishing email detected, what is the typical content of the email?
In the case of a phishing email detected, what is the typical content of the email?
Signup and view all the answers
What should be avoided when dealing with potential security incidents?
What should be avoided when dealing with potential security incidents?
Signup and view all the answers
What is a characteristic of phishing emails?
What is a characteristic of phishing emails?
Signup and view all the answers
Which department usually addresses an incident after it has been reported?
Which department usually addresses an incident after it has been reported?
Signup and view all the answers
What does APT stand for in information security?
What does APT stand for in information security?
Signup and view all the answers
What does successfully falling for phishing lead to?
What does successfully falling for phishing lead to?
Signup and view all the answers
The first line of defense against social engineering attacks is:
The first line of defense against social engineering attacks is:
Signup and view all the answers
Which method is NOT considered a form of information gathering for phishing?
Which method is NOT considered a form of information gathering for phishing?
Signup and view all the answers
What should be reported as a potential sign of an APT attack?
What should be reported as a potential sign of an APT attack?
Signup and view all the answers
Which of the following is NOT a human-based social engineering attack method?
Which of the following is NOT a human-based social engineering attack method?
Signup and view all the answers
What is a common tactic of an attacker who conducts a phishing campaign?
What is a common tactic of an attacker who conducts a phishing campaign?
Signup and view all the answers
Which of the following is a countermeasure against APTs?
Which of the following is a countermeasure against APTs?
Signup and view all the answers
Which of the following tactics is used in dumpster diving?
Which of the following tactics is used in dumpster diving?
Signup and view all the answers
Study Notes
Information Security Goals
- Maintain an appropriate level of knowledge and skills among employees and managers
- Ensure business continuity if information security incidents occur
Types of Malware
- A type of social engineering attack where unauthorized personnel gain access to the network undetected for a long time to steal data
- Often uses social engineering to gain access to the network via legitimate means
- Establishes a backdoor once access is achieved
- Countermeasures include reporting odd user behavior, keeping aware of social engineering attempts, and understanding information/credentials disclosure compromises the entire information system
Top Security Breaches of 2015
- Not mentioned in provided material
Social Engineering
-
Human based attacks:
- Information gathering (Social media vectors)
- Shoulder surfing
- Dumpster diving
- Impersonation
- Phishing
-
Computer based attacks:
- Online Scams
Incident Reporting
- Report, fix, follow-up
- Repair and Support unit (RSU)
- Incident Reporting Coordinator (IRC)
- Concerns about business line
###Security Tips & Counter-measures
-
HTTPs:
- Protect by encrypting information sent between computer and website
-
WOT:
- Shows a colored traffic light to indicate the trustworthiness of websites
-
Social networking security:
- Limit the amount of personal information you post
- Be cautious of third-party applications
- Use strong passwords
- Check privacy policies
-
Password security:
- At least 8 characters
- Mix of upper and lowercase characters
- Mix of alpha and numeric characters
- Don't use dictionary words
- Change passwords frequently
- Don't share or reuse passwords
- Use different passwords for different accounts
- Don't write down passwords
- Use password phrases
-
Clear desk & clear screen:
- Clear away paperwork
- Use shredders when disposing of sensitive documents
- Lock desks and filing cabinets
- Lock away portable devices such as tablets
- Lock your workstation when you leave
- Make sure no documents are left in the printer
- Treat mass storage devices (CDROM, DVDs, USB drives) as sensitive and secure
- them in a locked drawer
-
Email Security
- Never open an attachment from an unknown sender
- Make sure the email references the attachment
- Don't hesitate to contact the sender of an email that contains an attachment
- Never send anyone your personal data (name, address, phone number, password, account numbers)
- In case of suspicion, contact the IT department or the information security officer
-
Mobile threat & security:
- Number of malicious installation packages and new malicious programs detected (Q3 2014 – Q1 2015)
- Never plug in your phone to the PC
- Download applications only from trusted sources
- Install antimalware controls
- Never store business-related documents on your phone
- Always change the factory pin code (0000)
- Always use a screen lock
- Install locking features
- Use secure messaging applications
- Secure personal email
-
How to protect your PC:
- Always back up sensitive data
- Always lock your workstation when away from your desk
- Ensure that antivirus definitions are updated regularly
- Reboot your system after applying new updates
- Use a strong password and try not to be confused with passwords used for personal accounts
- Never charge smartphones from the PC
- Never insert a USB or any storage device into your PC
Conclusion
- Security is 20% technical and 80% behavior
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on the fundamentals of information security including malware types, social engineering attacks, and incident reporting. This quiz covers key concepts that are vital for maintaining a secure environment in any organization.