CC - Mike Chapels Notes
CC - Mike Chapels Notes
Breakdown of Exam
Integrity Concerns
● Unauthorized Modification
○ Attackers make changes
without permission (can be
internal=employees or
external
■ Follow the Rules of
Least Privilege to
prevent unauthorized
modification
● Impersonation
○ Attackers pretend to be
someone else
■ User education
protects against
Impersonation
● Man-in-the-Middle (MITM)
○ Attackers place the
themselves in the middle of
communication sessions
○ Intercepts network traffic as
Published using Google Docs users are logging in to their Report abuse Learn more
system and assumes their
role.
○ Impersonation on an
Updated automatically every 5
CC- Mike Chapels Notes electronic/digital level. minutes
■ Encryption prevents
man-in-the-middle
attacks
● Replay
○ Attackers eavesdrop on
logins and reuse the
captured credentials
■ Encryption prevents
Replay attacks
_____
Availability Concerns
● Denial of Service (DoS)
○ When a malicious individual
bombards a system with an
overwhelming amount of
traffic.
○ The idea to is to send so
many requests to a server
that it is unable to answer
any requests from legitimate
users
■ Firewalls block
unauthorized
connections to
protect against
Denial of Service
attacks
● Power Outages
■ Having redundant
power sources and
back-up generators
protect against power
outages
● Hardware Failures
○ Failure of servers, hard
drives, network gear etc
■ Redundant
components protect
against hardware
failure
■ Building systems that
have a built-in
redundancy, so that if
one component fails,
the other will take
over
● Destruction
■ Backup data centers
protect against
destruction
(ex=cloud)
● Service Outages
○ Service outage may occur
due to programming errors,
failure of underlying
equipment, and many more
reasons
■ Building systems that
are resilient in the
fact of errors and
Published using Google Docs hardware failures Report abuse Learn more
protect against
service outages
_____
Updated automatically every 5
CC- Mike Chapels Notes minutes
Authentication & Authorization
1) Identification
● Identification involves
making a claim of identity
(Can be false)
○ Electronic
identification
commonly uses
usernames
2) Authentication
● Authentication requires
proving a claim of identity
○ Electronic
authentication
commonly
uses passwords
3) Authorization
● Authorization ensures that
an action is allowed
○ Electronic
authorization
commonly takes the
form of access
control lists
■ Access
Control Lists
also provides
Accounting
functionality
●
Accounting
allows
to
track
and
maintain
logs of
user
activity
● Can
track
systems
and
web
browsing
history
Authentication + Authorization +
Accounting = AAA
_____
Password Security
Password Managers
● Secured password vaults often
protected by biometric mechanisms
(ex=fingerprints)
● Facilitates the use of strong, unique
passwords
● Stores passwords
_____
Non-repudiation
● Prevents someone from denying the
truth
○ Physical signatures can
provide non-repudiation on
contracts, receipts etc
○ Digital signatures use
encryption to provide non-
repudiation
○ Other methods can be
biometric security controls,
Video-surveillance etc
_____
Published using Google Docs Report abuse Learn more
Privacy
1) Internal Risks
● Risks that arise from within
the organization
○ Internal control
prevents internal
risks
2) External Risks
● Risks that arise outside the
organization
○ Build controls that
reduce the chance of
attack/risks being
successful (ex= multi
factor authentication,
Published using Google Docs or social engineering Report abuse Learn more
awareness
campaigns)
Updated automatically every 5
CC- Mike Chapels Notes 3) Multiparty Risks
minutes
● Risks that affect more than
one organization
● Intellectual property
theft poses a risk to
knowledge-based
organizations
● If attackers are able to alter,
delete or steal this
information, it would cause
significant damage to the
organization and its
customers/counterparties
● Software license
agreements issues risk fines
and legal actions for
violation of license
agreements
_____
Risk Assessment
● Identifies and triages risks
Threat
● Are external forces that jeopardize
security
● Threat Vector
○ Threat Vectors are
methods used by
attackers to get to
their target (ex=
social engineering,
hacker toolkit, etc)
Vulnerabilities
● Are weaknesses in your security
controls
○ Examples : Missing patches,
Promiscuous Firewall rules,
other security
misconfiguration
______
Ranking of Risks
● We rank risks by likelihood and
impact
Likelihood
● Probability a risk will occur
Impact
● Amount of damage a risk will cause
Risk Profile
● Combination of risks that an
organization faces
_____
Inherent Risk
● Initial level of risk, before any
controls are put in place
Residual Risk
● Risk that is reduced and what is left
of it is known as the residual risk
Control Risk
● New risk that may have been
introduced by the controls applied to
mitigate risk
○ Example : Controls Applied
may be installing a firewall.
While that firewall may have
mitigated the inherent risk,
the risk of that firewall failing
is another newly introduced
risk
Risk Tolerance
● Is the level of risk an organization is
willing to accept
_____
Published using Google Docs Report abuse Learn more
Security Controls
● Are procedures and mechanisms
that reduce the likelihood or impact
Updated automatically every 5
CC- Mike Chapels Notes of a risk and help identify issues
minutes
Defense in Depth
● Uses overlapping security controls
● Different methods of security with a
common objective
Configuration Management
● Tracks the way specific devices are
set up
● Tracks both operating system
settings and the inventory of
software installed on a device
● Should also create Artifacts that
may be used to help understand
system configuration (Legend,
Diagrams, etc)
Baselines
● Provide a configuration snapshot
● Dual Net
Published using Google Docs ● You can use the snapshot to assess Report abuse Learn more
if the settings are outside of an
approved change management
process system
Updated automatically every 5
CC- Mike Chapels Notes ● Basically the default configuration minutes
setting set by an organization
Versioning/Version Controls
● Assigns each release of a piece of
software and an incrementing
version number that may be used to
identify any given copy
● These verison #s are written as
three part decimals, with the
○ First number representing
the major version of software
○ Second number
representing a major
updates
○ Third number representing
minor updates
Ex= IPhone IOS 14.1.2
_____
Security Governance
_____
Business Continuity
Redundancy
● The level of protection and against
the failure of a single component
1) High Availability
● Uses multiple systems to
protect against service
failure (Different from AWS
Cloud as in that it does not
just apply to AZs but rather
everything including multiple
firewalls etc)
2) Fault-Tolerance
● Makes a single system
resilient against technical
failures
Load Balancing
● Spreads demand across available
systems
Incident Response
NIST SP 800-61
● Assists organization mitigating the
potential business impact of
information security incidents
providing practical guidance.
_____
Incident Identification
Highest Priority
● The highest priority of a First
Responder must be containing
damage through isolation
_____
Disaster Recovery
_____
Backups
● Provides an organization with a fail-
safe way to recover their data in the
event of
○ Technology failure
○ Human error
○ Natural disaster
Backup Methods
1) Tape Backups
● Practice of periodically
copying data from a primary
storage device to a tape
cartridge
● Traditional method -
outdated
2) Disk-to-disk Backups
● Writes data from Primary
Disks to special disks that
are set aside for backup
purposes
● Backups that are sent to a
storage area network or a
network attached storage
are also fitting in this
category of backup
3) Cloud Backups
● AWS, Azure, GC
_____
CPTED
● Crime Prevention Through
Environmental Design
○ Basically giving principles to
design your crime prevention
mechanisms in a way that is
appropriate with your
environmental surroundings
CPTED Goals
1) Natural Surveillance
● Design your security in a
way that allows you to
observe the natural
surroundings of your facility
○ Windows, Open
Areas, Lightning
2) Natural Access Control
●
Narrowing the traffic to a
Published using Google Docs single point of entry Report abuse Learn more
○ Gates, etc
3) Natural Territory Reinforcement
● Making it visually and
Updated automatically every 5
CC- Mike Chapels Notes physically obvious that the minutes
area is closed to the public
○ Signs, Lightnings
_____
Visitor Management
● Visitor management procedures
protect against intrusions
Visitor Procedures
● Describe allowable visit purposes
● Explain visit approval authority
● Describe requirements for
unescorted access
● Explain role of visitor escorts
● All visitor access to secure areas
should be logged
● Visitors should be clearly identified
with distinctive badges
● Cameras add a degree of
monitoring in visitor areas
● Cameras should always be
disclosed
_____
Provisioning
● After onboarding, administrators
create authentication credentials
and grant appropriate authorization
Deprovisioning
● During the off-boarding process,
administrators disable accounts and
revoke authorizations at the
appropriate time.
● Prompt Termination (quickly
acting after off boarding) is critical
○ Prevents users from
accessing resources without
permission
○ More important if employee
leaves in unfavorable terms
_____
Authorization
● Final step in the Access Control
Published using Google Docs Process Report abuse Learn more
● Determines what an authenticated
user can do
Updated automatically every 5
CC- Mike Chapels Notes Principle of Least Privilege
minutes
● User should have the minimum set
of permission necessary to perform
their job
○ Protects against internal
risks as a malicious
employee’s damage will be
limited to their access
○ Protects against external risk
as if an account was hacked,
the damage they can do
would be limited to the
permissions on the stolen
account.
Network
● Connect computers together
● Can connect computers within an
office (LAN) or to the global internet
Internet Protocols
● Main function is to provide an
addressing scheme, known as
the IP address
● Routes information across networks
● Not just used on the internet
● Can be used at home or an office
● Deliver packets(chunks of
information) from source →
destination
● Serves as a Network Layer
Protocol
○ Supports Transport Layer
Protocols - which have a
higher set of responsibilities
TCP Three-Way
Handshake
1) Source SYN
sent to
request open
connection to
Destination
2) Destination
sends ACK +
request
(SYN) to
reciprocate a
open
connection
3) Source
acknowledges
and sends
ACK
_____
IP Addresses
● Uniquely identify systems on a
network
● Written in dotted quad
notation (ex- 192.168.1.100). Also
known as IPv4
○ Means 4 numbers separated
by periods
○ Each of these numbers may
range between 0-255
■ Why 255?
● Each number
is
represented
by 8-bit binary
numbers
● Those bits
can represent
2 to the
power of 8 =
256 possible
values
● But we start
at 0 so 256-
1=255
● No duplicates of IP addresses on
Internet-connected systems (Just
like your phone#)
● Allow duplicates if on private
networks
○ Your router or firewall takes
care of translating private IP
Addresses to public IP
addresses when you
communicate over the
internet
○ This translating process is
called NAT (Network
Address Translation)
● IP Addresses are divided into 2
parts
○ 1) Network Address
○ 2) Host Address
Typically,
Servers are configured with Static IP
Addresses
End-user devices are configured with
Dynamically-Changing IP Addresses
_____
Network Ports
● Like Apartment #s, guide traffic to
the correct final destination
● IP addresses uniquely identifies a
system while the Network Ports
uniquely identifies a particular
location of a system associated with
a specific application
● Think of it as
○ IP Addresses - Street # of an
Apartment
○ Network Ports- Unit # of an
Apartment
Important Port #s
Administrative Services
● Port 21 : File Transfer Protocol
(FTP)
■ Transfers data
between systems
Mail Services
● Port 25 : Simple Mail Transfer
Protocol (SMTP)
■ Exchange email
between servers
Web Services
● Port 80 : Hypertext Transfer
Protocol (HTTP)
■ For unencrypted web
communications
Wireless Encryption
● A best practice for network security
● Encryption hides the true content of
network traffic from those without
the decryption key
● Takes, Radio Waves, and makes it
secure
The Original approach to Security was:
Wired Equival7ent Privacy (WEP)
● This is now considered insecure
In Summary,
Important Commands
1) ping
● Checks whether a remote
system is responding or
accessible
● Works using the Internet
Control Message Protocol
(ICMP)
○ Basically sending a
request and
acknowledgement to
confirm a connection
○
Troublingshooting with
Ping:
■ You can ping
the remote
system:
● a) if
you
receive
a
response
: it is
not a
network
issue
and a
local
web
server
issue
● b) if
you
don’t
receive
a
response
: you
may
Published using Google Docs next Report abuse Learn more
ping
another
system located
Updated automatically every 5
CC- Mike Chapels Notes on the minutes
internet :
if that
responds
: this
will tell
you
your
internet
is
successful
and
the
issue
is with
the
web
server
or
network
connection
● c) if
you
ping
many
systems
on
internet
and
there
is no
response,
it is
likely
that
the
problem
is on
your
end
● d) You
can
ping a
system
on
your
Local
Network
: if that
responds,
there's
probably
an
issue
with
your
network’s
connection
to the
internet
● e) If a
Published using Google Docs Local Report abuse Learn more
Network
does
not
Updated automatically every 5
CC- Mike Chapels Notes respond minutes
:
Either
your
Local
network
is
down
or
there
is a
problem
with
your
computer
● f) Last
Resort
:
Repeat
process
on
another
computer
○ Some systems do
not respond to ping
requests
■ Example : A
firewall may
block ping
requests
2) hping
● Creates customized ping
requests
● A variant of the basic “ping”
command
● Allows you to interrogate a
system to see if it is present
on the network
● Old and not monitored but
still works
3) traceroute
● Determines the network
path between two systems
● If you want to know how
packets are traveling today
from my system Located in
Toronto to a LinkedIn.com
webserver, wherever that is
located
● Works only on Mac and
Linux
● In Windows, it is : tracert
4) pathping
● Windows only command
● Combines ping and
tracert functionality in a
single command
_____
Network Threats
Published using Google Docs Report abuse Learn more
Malware
● One of the most significant threats Updated automatically every 5
CC- Mike Chapels Notes to computer security minutes
● Short for Malicious Software
● Might steal information, damage
data or disrupt normal use of the
system
● Malwares have 2 components:
○ 1) Propagation Mechanism
■ Techniques the
malware uses to
spread from one
system to another
○ 2) Payload
■ Malicious actions
taken by malware
■ Any type of malware
can carry any type of
payload
Types of Malware
1) Virus
● Spreads after a user takes
some type of user action
○ Example : Opening
an email attachment,
Clicking a Link,
Inserting an infected
USB
● Viruses do not spread
unless someone gives them
a hand
● User education protects
against viruses
2) Worms
● Spread on their own by
exploiting vulnerabilities
● When a worm infects a
system, it will use it as it’s
base for spreading to other
parts of the Local Area
Network
● Worms spread because the
systems are vulnerable
● Patching protects against
worms
3) Trojan Horse
● Pretends to be a useful
legitimate software, with
hidden malicious effect
● When you run the software,
it may perform as expected
however will have
payloads behind the scene
● Application Control protects
against Trojan Horses
○ Application Controls
limit software that
can run on systems
Published using Google Docs to titles and versions Report abuse Learn more
_____
Botnets
Updated automatically every 5
CC- Mike Chapels Notes ● Are a collection of zombie
minutes
computers used for malicious
purposes
● A network of infected systems
● Steal computing power, network
bandwidth, and storage capacity
● A hacker creating a botnet begins
by
○ 1) Infecting a system with
malware through any
methods
○ 2) Once the malware takes
control of the system (hacker
gains control), he or she
joins/adds it to the
preconceived botnet
In Summary Botnets:
1) Infect Systems
2) Convert to bots
3) Infect others
4) Check in through Command and
Control Network
5) Get Instructions
6) Deliver payload
_____
Eavesdropping Attacks
● All eavesdropping attacks rely on a
compromised communication path
between a client and a server
○ Network Device Tapping
Published using Google Docs ○ DNS poisoning Report abuse Learn more
○ ARP poisoning
Man-in-the-browser Attacks
● Variation of Man-in-the-Middle
attack
● Exploit flaws in browsers and
browser plugins to gain access to
web communications
Replay Attack
● Uses previously captured data, such
as an encrypted authentication
token, to create a separate
connection to the server that’s
authenticated but does not involve
the real end user
● The attacker cannot see the actually
encoded credentials
● They can only see the encoded
version of them
● Prevent Replay Attacks by including
unique characteristics:
○ Token
○ Timestamp
SSL Stripping
● Tricks browsers into using
unencrypted communications
● A variation of eavesdropping attack
● A hacker who has the ability to view
a user’s encrypted web
communication exploits the
vulnerability to trick the users
browser into reverting to
unencrypted communications for
the world to see
● Strips the SSL or TLS protection
_____
Implementation of Attacks
_____
1) In-band Deployments
● IPS sits in the path of
network traffic
● It can block suspicious traffic
from entering the network
● Risk : It is a single point of
failure so it may disrupt the
entire network
Malware Prevention
● Antimalware software protects
against many different threats
● Antimalware software protects
against viruses, worms, Trojan
Horses and spyware
1) Signature Detection
● Watches for known
patterns of malware activity
2) Behavior Detection
● Watches for deviations from
normal patterns of activity
● This type of mechanism is
found in advanced malware
protection tools like the
Endpoint Detection and
Response (EDR)
■ Offer real-
time,
advanced
protection
■ Goes beyond
basic
signature
detection and
performs
deep
instrumentation
of endpoints
■ They analyze:
●
Memory
●
Processor
use
●
Registry
Entries
●
Network
Communications
■ Installed on
Endpoint
devices
■ Can perform
Sandboxing
●
Isolates
malicious
Published using Google Docs content Report abuse Learn more
_____
Port Scanners
Updated automatically every 5
CC- Mike Chapels Notes minutes
Vulnerability Assessment Tools
1) Port Scanner
● Looks for open network
ports
● Equivalent of rattling all
doorknobs looking for
unlocked doors
● nmap
○ Popular port
scanning tool
/command
2) Vulnerability Scanner
● Looks for known
vulnerabilities
● Scans deeper than Port
Scanner, actually looks at
what services are using
those ports
● Has a database for all
known vulnerability exploits
and tests server to see if it
contains any of those
vulnerabilities
● Nesssus
○ Popular vulnerability
scanner
3) Application Scanner
● Tests deep into application
security flaws
_____
Data Centers
● Have significant cooling
requirements
● Current Standard of Temperatures
○ Maintain data center air
temperatures between 64.6
F and 80.6 F = Expanded
Environmental Envelope
● Humidity is also important
○ Dewpoint says : Humidity
41.9 F and 50.0 F
■ This temperature
prevents
condensation and
static electricity
● HVAC is important (Heating,
Ventilation and Air Conditioning
Systems)
● Must also look out for fire, flooding,
electromagnetic interference
Security Zones
3 Special-Purpose Networks
1) Extranet
● Special intranet segments
that are accessible by
outside parties like business
Published using Google Docs partners Report abuse Learn more
2) Honeynet
● Decoy networks designed to
attract attackers
Updated automatically every 5
CC- Mike Chapels Notes 3) Ad Hoc Networks minutes
● Temporary networks that
may bypass security controls
East-West Traffic
● Network traffic between systems
located in data center
North-South Traffic
● Networks traffic between systems
in the data center and systems on
the Internet
_____
Switches
● Connect devices to the network
● Has many network ports
● Reside in wiring closets and
connect the computers in a building
together
● Ethernet jacks are at the other end
of network cables connected to
switches
● Wireless access points (WAPs)
connect to switches and create Wi-
Fi networks
○ The Physical APs itself has a
wired connection back to the
switch
● Switches can only create Local
Networks
● Layer 2 of OSI Model - Data Link
Layer
● Some switches can be in the Layer
3 of OSI Model - Network
Layer (can interpret IP Addresses)
○ For this to happen, they
must use Routers
Routers
● Connect networks to each other,
making intelligent packet routing
decisions
● Serves as a central aggregation
point for network traffic heading to
or from a large network
● Works as the air traffic controller of
the network
● Makes best path decisions for traffic
to follow
● Use Access Control Lists to limit
some traffic that are entering or
leaving a network, this type of
filtering does not pay attention to
Connection states and are called
Stateless Inspection
_____
Published using Google Docs Report abuse Learn more
Virtual LANs (VLANs)
● Separates systems on a network
into logical groups based upon
Updated automatically every 5
CC- Mike Chapels Notes function
minutes
● Extend broadcast domain
○ Users on the same VLAN
will be able to directly
contact each other as if they
were connected to the same
switch
● We use VLANs to create network
segmentation which reduces
security risk by liming the ability of
unrelated systems to communicate
with each other
● Micro Segmentation
○ Extreme segmentation
strategy
○ Temporary
Configuring VLANs
1) Enable VLAN trunking
● Allow switches in different
locations on the network to
carry the same VLANs
2) Configure VLANs for each switch
port
_____
Firewalls
● Often sit at the network perimeter
● Between Router and Internet
Switch
I
I
I
Switch —------------- Router —-------------
Firewall —------------- Internet
I
I
I
Switch
Most organizations
choose to use both network firewalls
VPNs
● Works by using encryption to create
a virtual tunnel between two
systems over the internet
● Everything on one tunnel is
encrypted and decrypted when it
exits
● VPNs require an endpoint that
accepts VPN connections
● Endpoints can be many things:
■ Firewalls
■ Router
■ Server
■ Dedicated VPN
Concentrators -
Used for High
Volume
SSL/TLS VPNs
● Works at the Application Layer over
TCP port 443
● Works on any system on a web
browser
● Port 443 = Almost bypass any
firewall
HTML5 VPNs
● Work entirely within the web
browser
● A remote access VPN
Always on VPN
● Connects automatically
● Takes control from the user
● Always protected by strong
encryption
_____
Supplicant(Sends credentials) →
Authenticator(Receives and passes it to
AS) → Authenticator Server (authenticates
and sends results to authenticator →
Authenticator → Supplicant → Access
NAC Roles
1) User and device authentication
(what we discussed above)
2) Role-based access
● Once authenticator learns
the identity of requested
user it places the user in the
network based upon that
user’s identity
3) Posture checking/Health Checking
● Before granting access, it
check for compliance
requirements
○ Validating current
signatures
○ Verifying for antivirus
presence
○ Ensuring proper
firewall configuration
○ If it Fails the posture
check
■ It will be
placed into a
quarantine
VLAN where
they will have
Published using Google Docs limited Report abuse Learn more
internet
access and
no access to
Updated automatically every 5
CC- Mike Chapels Notes internal minutes
resources
○ Posture checking is
done through an
Agent or Agentless
_____
Internet of Things
● Smart devices
Security of IOT
● Check for weak default passwords
● Make sure to regularly update and
patch
● Some have Automatic Updates and
some require Manual Websites
● If worried get Firmware Version
Control
○ Updates are applied in
orderly fashion
Cloud Computing
● Delivering computing resources to a
remote customer over a network
● Official Definition: A model for
enabling ubiquitous, convenient, on-
demand network access to shared
pool of configurable computing
resources (networks, servers,
storage, applications, services) that
can be rapidly provisioned and
released with menial management
Published using Google Docs effort or service provider interaction Report abuse Learn more
Cloud Service Categories
1) Software as a Service (SaaS)
Updated automatically every 5
CC- Mike Chapels Notes ● Customer purchases an
minutes
entire app
2) Infrastructure as a Service (IaaS)
● Customer purchase
servers/storage and create
their own IT solutions
3) Platform as a Service (PaaS)
● Customer purchases app
platform
Vendor Agreements
Data Security
Encryption
● Uses math to make data unreadable
to unauthorized individuals
● Transforms text from plaintext to
ciphertext
● Uses decryption algorithm key to
read message
Symmetric Encryption
● You encrypt and decrypt with the
same shared secret key
● It's like a password to a message
● You will keep needing more keys as
network populates
Asymmetric Encryption
● You encrypt and decrypt with
different keys from the same pair
2) SHA-1
● Produces a 160-bit hash
value
● Contains security flaws
● SHA-1 is no longer secure
3) SHA-2
● Replaced SHA-1
● Consists of a family of 6 has
functions
● Produces output of 224, 256,
384 and 512 bits
● Uses a mathematically
similar approach to SHA-1
and MD5
● SHA-2 is no longer secure
4) SHA-3
● Designed to replace SHA-2
● Uses a completely different
has generation approach
than SHA-2
● Produces hashes of user-
selected fixed strength
● Some people do not trust
SHA algorithms because
NSA created it
5) RIPEMD
● Created as an alternative to
Published using Google Docs government-sponsored hash Report abuse Learn more
functions
● Produces 128, 160, 256, and
320-bit hashes
Updated automatically every 5
CC- Mike Chapels Notes ● Contains flaws in the 128-bit minutes
version
● 160 bit is widely used. Even
in Bitcoin
Data Lifecycle
● Explains the different stages of data
in the cloud
Cycle
1) Create
2) Store
3) Use
4) Share
5) Archive
6) Destroy
● Must be done in a secured
manner
● Data Sanitization
Techniques
○ Clearing overwrites
sensitive information
to frustrate causal
analysis
○ Purging
○ Destroying,
shredding,
pulverization, melting
and burning
_____
Data Classification
● Assign information into categories,
known as classification, that
determine storage, handling, and
access requirements
Classification Levels
1) High, Medium, Low
2) Public vs Private
Labeling Requirements
● Requirement to identify sensitive
information
Logging establishes:
1) Accountability
● Who caused the event
● A.K.A Identity Attribution
2) Traceability
● Uncover all other related
events
3) Auditability
● Provide clear documentation
of the events
_____
Security Awareness and Training
Social Engineering
● Manipulating people into divulging
information or performing an action
that undermines security.
● Sda
○ Smishing and Spim
■ SMS and IM spam
○ Spoofing
■ Faking an identity
_____
Security Training
● Provides users with the knowledge
they need to protect the
organization’s security
Security Awareness
● Keeps the lessons learned during
security training top of mind for
employees. Reminder