Examine types of cyber threats.

Examination should include, but not be limited to

  • attacks on authentication (e.g., password, biometrics, subscriber identification module [SIM] hacking)
  • phishing attacks (e.g., spear phishing, whaling, business email compromise [BEC])
  • malicious email attachments
  • hacking, spamming, malvertising
  • cross-site scripting attacks (XSS)
  • malware (e.g., viruses, worms, ransomware)
  • competitor-sponsored hacking
  • nation-state-sponsored hacking.

Process/Skill Questions:

Thinking

  • What could be done to minimize cyber threats?
  • What are clues to a cyber threat?

Communication

  • How can professionals communicate the importance of identifying cyber threats?
  • Who should be contacted when a cyber threat has been identified?

Leadership

  • What can a leader do to educate others about the dangers of cyber threats?
  • How can a leader educate others on appropriate actions to take when faced with a cyber threat?

Management

  • What management strategies can be used to identify cyber threats?
  • What management strategies can be used to decrease the chance of a cyberattack?