Summary
This chapter discussed the various aspects of security awareness training and programs, security testing, and monitoring tools and techniques. You also learned how to evaluate incident management policies and practices, and we discussed how to evaluate evidence collection and the forensics process.
The following are some key takeaways from this chapter:
- In a social engineering attack, an intruder attempts to obtain sensitive information from users through their social and psychological skills. They manipulate people into divulging confidential information such as passwords. This kind of attack can best be restricted and addressed by educating users through frequent security awareness training.
- Digital evidence can be used in legal proceedings, provided it has been preserved in its original state. Evidence loses its integrity if the chain of custody is not maintained.
- The chain of custody refers to the process of identifying, preserving, analyzing, and presenting...