Skip to Main Content
Building an Information Security Awareness Program
book

Building an Information Security Awareness Program

by Bill Gardner, Valerie Thomas
August 2014
Beginner content levelBeginner
214 pages
5h 50m
English
Syngress
Content preview from Building an Information Security Awareness Program
Chapter 11

Creating Simulated Phishing Attacks

Valerie Thomas    Securicon, Lorton, VA, USA

Abstract

Performing a simulated phishing assessment can be an intimidating process. This chapter walks through an assessment step by step to take the mystery out of the process. Various tools and techniques are discussed, enabling the reader to select the best tool and approach for their organization. Although tools and techniques are a large part of the process, other elements must be coordinated to perform a successful assessment. This chapter also discusses the planning and coordination elements of a simulated phishing assessment.

Keywords

Phishing

Simulated phishing assessment

Attacks

Coordination

Reporting

Simulated Phishing Attacks

Simulated ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Policy Development for Compliance

Information Security Policy Development for Compliance

Barry L. Williams

Publisher Resources

ISBN: 9780124199675