Creating Simulated Phishing Attacks
Valerie Thomas Securicon, Lorton, VA, USA
Abstract
Performing a simulated phishing assessment can be an intimidating process. This chapter walks through an assessment step by step to take the mystery out of the process. Various tools and techniques are discussed, enabling the reader to select the best tool and approach for their organization. Although tools and techniques are a large part of the process, other elements must be coordinated to perform a successful assessment. This chapter also discusses the planning and coordination elements of a simulated phishing assessment.
Keywords
Phishing
Simulated phishing assessment
Attacks
Coordination
Reporting
Simulated Phishing Attacks
Simulated ...
Get Building an Information Security Awareness Program now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.