Chapter 11

Creating Simulated Phishing Attacks

Valerie Thomas    Securicon, Lorton, VA, USA

Abstract

Performing a simulated phishing assessment can be an intimidating process. This chapter walks through an assessment step by step to take the mystery out of the process. Various tools and techniques are discussed, enabling the reader to select the best tool and approach for their organization. Although tools and techniques are a large part of the process, other elements must be coordinated to perform a successful assessment. This chapter also discusses the planning and coordination elements of a simulated phishing assessment.

Keywords

Phishing

Simulated phishing assessment

Attacks

Coordination

Reporting

Simulated Phishing Attacks

Simulated ...

Get Building an Information Security Awareness Program now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.