3.2 Safe Device & Network Usage
Secure behavior extends beyond passwords. Everyday device and network usage decisions
can significantly reduce or increase organizational risk.
-
- Public Wi-Fi Risks:
Unsecured wireless networks expose users to multiple attack vectors.- Man-in-the-Middle (MitM):
Attackers position themselves between your device and the router,
silently intercepting or altering transmitted data. - Evil Twin:
A fake wireless network (e.g.,Starbucks_Free_WiFi)
created by an attacker to lure unsuspecting users. - Defense:
Always use a VPN (Virtual Private Network),
which creates an encrypted tunnel protecting your data on untrusted networks.
- Man-in-the-Middle (MitM):
- Public Wi-Fi Risks:
- Physical Security:
Many cyber incidents begin with physical access failures.- Tailgating:
An attacker follows an employee into a restricted area.
Politeness can be a vulnerability—do not hold secure doors
open for unknown individuals. - USB Drop Attacks:
Malicious USB drives labeled
“Payroll 2025” or “Executive Salaries”
are left in public areas. Curiosity leads users to plug them in,
resulting in system compromise.
- Tailgating: