2 hours 25 minutes
Okay, So what do we learn? This module? Well, we learned all about defending herself against these attacks.
We learned the number. One thing to do is don't play again. Strange USB devices
we learned There's other other methods that typically organizations do like blocking USB ports or disabling ports.
Then we talked a bit about analyzing devices and how it's a good idea to use a computer you don't care about, because it may be destroyed if it's USB kill, attack and how to use a people no local connection or connection the Internet and use a device with no personal information.
Then we learned after examining devices, it's a good idea toe wipe these machines.
Then we talked about Red Team deployments and how effective that could be to educate employees and creating a culture of vigilance.
And now, folks, uh, next up is the summary, so you've almost made it to the end. But first we're gonna do a few questions is to test your knowledge.
Okay, so first question which the falling is a way to protect yourself from a USB drop attack?
Is it a plug in the device into your personal machine without Internet connection to examine it
because it be plugging the device into a friend's machine without Internet connection to examine it,
is it. See? Don't plug in any unknown USB devices. Or is it d? Don't plug in any unknown USB devices unless it's a manufacturing. Recognize
and have all these choices, See? Is going to be the best answer. Absolutely. Do not plug in. Any unknown device is not even in your friend's computer.
Okay, question. To which of the following is a purpose of a Red team deployment in the USB drop attack? Is it a to keep employees vigilant of attacks? Is it be to educate employees on how these attacks work? Is it C t improved compliance of no USB device policies?
Or is it d all the above? Well is D. All of those things are the correct answer.
All righty. So let's get into the summary