Jump to navigation Jump to search
|NIST SP 800-53 Rev. 4||AT-2|
Train users to be aware of access or manipulation attempts by an adversary to reduce the risk of successful spearphishing, social engineering, and other techniques that involve user interaction.
Techniques Addressed by Mitigation
|Data from Information Repositories||Develop and publish policies that define acceptable information to be stored in repositories.|
|Spearphishing Attachment||Users can be trained to identify social engineering techniques and spearphishing emails.|
|User Execution||Use user training as a way to bring awareness to common phishing and spearphishing techniques and how to raise suspicion for potentially malicious events.|