August 2014
Beginner
214 pages
5h 50m
English
Valerie Thomas Securicon, Lorton, VA, USA
Performing a simulated phishing assessment can be an intimidating process. This chapter walks through an assessment step by step to take the mystery out of the process. Various tools and techniques are discussed, enabling the reader to select the best tool and approach for their organization. Although tools and techniques are a large part of the process, other elements must be coordinated to perform a successful assessment. This chapter also discusses the planning and coordination elements of a simulated phishing assessment.
Keywords
Phishing
Simulated phishing assessment
Attacks
Coordination
Reporting
Simulated ...