Types of Social Engineering
Defenses: - Verify requests through official channels. - Don’t click unknown links, open attachments, or plug in unverified USBs. - Use privacy filters to block shoulder surfing. - Challenge unknown people in restricted areas. - Shred sensitive documents; securely destroy old devices. - Encrypt hard drives/USBs; lock unattended devices. - Be cautious with calls/texts/emails that use urgency or fear. Multifactor Authentication (MFA)
Examples 1. Password + SMS code. 2. Password + app-based push notification. 3. Password + biometric (fingerprint/face scan). Benefit - Protects against stolen passwords. - Required for compliance and cyber insurance. Cyber Concerns for MFA
MFA isn't foolproof. Skilled attackers use social engineering to target employees, steal credentials, and launch MFA fatigue attacks. |
Virtual Private Network (VPN)
Benefits of VPNs
Public Wi-Fi Risks
Organization Approved Softwares
Best Practices - Verify with IT before installing. - Report unauthorized software immediately. - Review policies regularly. Cybersecurity Concerns of BYOD
Best Practices: - Always check your agency’s BYOD policy. - Encrypt personal devices (especially laptops/phones). - Keep OS/software updated and patched. - Separate work and personal data. - Participate in cybersecurity awareness training. |
Cheatography
https://cheatography.com
Awareness Module 4 Cheat Sheet (DRAFT) by gonax133
This cheat sheet summarizes the key concepts from Module 4 to help with quiz preparation.
This is a draft cheat sheet. It is a work in progress and is not finished yet.