7.4 Summary - UA

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
2 hours 25 minutes
Difficulty
Beginner
CEU/CPE
3
Video Transcription
00:00
Okay, So what do we learn? This module? Well, we learned all about defending herself against these attacks.
00:06
We learned the number. One thing to do is don't play again. Strange USB devices
00:11
we learned There's other other methods that typically organizations do like blocking USB ports or disabling ports.
00:18
Then we talked a bit about analyzing devices and how it's a good idea to use a computer you don't care about, because it may be destroyed if it's USB kill, attack and how to use a people no local connection or connection the Internet and use a device with no personal information.
00:37
Then we learned after examining devices, it's a good idea toe wipe these machines.
00:42
Then we talked about Red Team deployments and how effective that could be to educate employees and creating a culture of vigilance.
00:49
And now, folks, uh, next up is the summary, so you've almost made it to the end. But first we're gonna do a few questions is to test your knowledge.
01:00
Okay, so first question which the falling is a way to protect yourself from a USB drop attack?
01:04
Is it a plug in the device into your personal machine without Internet connection to examine it
01:11
because it be plugging the device into a friend's machine without Internet connection to examine it,
01:15
is it. See? Don't plug in any unknown USB devices. Or is it d? Don't plug in any unknown USB devices unless it's a manufacturing. Recognize
01:25
and have all these choices, See? Is going to be the best answer. Absolutely. Do not plug in. Any unknown device is not even in your friend's computer.
01:34
Okay, question. To which of the following is a purpose of a Red team deployment in the USB drop attack? Is it a to keep employees vigilant of attacks? Is it be to educate employees on how these attacks work? Is it C t improved compliance of no USB device policies?
01:51
Or is it d all the above? Well is D. All of those things are the correct answer.
01:57
All righty. So let's get into the summary