Elearning cyber security employee onboarding

Profile photo for Sean Collins
Not Yet Rated
0:00
Elearning
19
1

Description

Previously submitted demo. Employee informational elearning narration for a cybersecurity team new hire.

Vocal Characteristics

Language

English

Voice Age

Middle Aged (35-54)

Accents

North American (General)

Transcript

Note: Transcripts are generated using speech recognition software and may contain errors.
I. T. Admin awareness training. The CSO team has created an informative security awareness training specifically for your role as an I. T. Administrator. The CSO team and I. P. G. Agencies value your involvement and support of cybersecurity. You are a key component in securing all of our digital assets. As you are aware. The IT admin role involves great privileges and comes with great responsibility. Your role has extensive privileges over the digital assets. Thus your involvement is key in all five functions of the N. I. S. T. Cybersecurity framework identify protect, detect, respond and recover. This training will focus on the protect detect respond and recover components of the N. I. S. T. Framework lesson one authentication and authorization authentication is the process whereby we validate the individual is in fact who they claim to be. And it's commonly the first line of defense in preventing unauthorized system access from those without a need to know because of your role. You may be targeted by social engineers. Since there is a greater likelihood for admins to have access to sensitive information credentials, database and source code, bad actors are always trying to compromise authentication and authorization methods and they do that through various attacks like brute forcing or password guessing which is an attempt to correlate a user id in a correct password against a system and typically this is against a live system like web platforms or user interfaces. Bad actors may do password cracking which is where a password hash or some representation of a password has been stolen or borrowed from a system allowing bad actors to evaluate or compare the password, hash or token against a library of other passwords, and hope to effectively get the complete password.