Information Safety Training
Office Security Assessment
- Timed Security Challenge: You have limited time to identify and address all information security violations within a realistic office environment.
- Security Violations: The office contains multiple security risks that must be identified:
- Unattended computers with unlocked screens
- Unsecured devices and exposed credentials
- Social engineering attempts and data exposure
- Physical security breaches and unauthorized access
- And other critical information security violations
Assessment Method
- Detection and Response: Systematically identify and address security violations:
- Visual Inspection: Scan the environment to identify security violations.
- Direct Action: Take immediate action to secure devices and address security breaches.
Performance Results
- Critical Assessment: Your performance is evaluated on a pass/fail basis:
- Successfully Addressed: Security risks that were properly identified and resolved.
- Missed Violations: Any unaddressed security violations result in training failure.