Time
2 hours 25 minutes
Difficulty
Beginner
CEU/CPE
3

Video Transcription

00:00
Okay, So what do we learn? This module? Well, we learned all about defending herself against these attacks.
00:06
We learned the number. One thing to do is don't play again. Strange USB devices
00:11
we learned There's other other methods that typically organizations do like blocking USB ports or disabling ports.
00:18
Then we talked a bit about analyzing devices and how it's a good idea to use a computer you don't care about, because it may be destroyed if it's USB kill, attack and how to use a people no local connection or connection the Internet and use a device with no personal information.
00:37
Then we learned after examining devices, it's a good idea toe wipe these machines.
00:42
Then we talked about Red Team deployments and how effective that could be to educate employees and creating a culture of vigilance.
00:49
And now, folks, uh, next up is the summary, so you've almost made it to the end. But first we're gonna do a few questions is to test your knowledge.
01:00
Okay, so first question which the falling is a way to protect yourself from a USB drop attack?
01:04
Is it a plug in the device into your personal machine without Internet connection to examine it
01:11
because it be plugging the device into a friend's machine without Internet connection to examine it,
01:15
is it. See? Don't plug in any unknown USB devices. Or is it d? Don't plug in any unknown USB devices unless it's a manufacturing. Recognize
01:25
and have all these choices, See? Is going to be the best answer. Absolutely. Do not plug in. Any unknown device is not even in your friend's computer.
01:34
Okay, question. To which of the following is a purpose of a Red team deployment in the USB drop attack? Is it a to keep employees vigilant of attacks? Is it be to educate employees on how these attacks work? Is it C t improved compliance of no USB device policies?
01:51
Or is it d all the above? Well is D. All of those things are the correct answer.
01:57
All righty. So let's get into the summary

USB Drop Attack

Malicious devices are everywhere these days, whether you can see them or not.

Instructed By

Instructor Profile Image
Shawn Briere
Information Security Analyst
Instructor