Standard Users – UB Network

SCKIPT User Behaviour Matrix (Standard Users)
Source (UB)
Case Scenario (C)
Known Interactions (K)
Protection (P)
Threats (T)
UB4.
Network
UB4.C1 – Web Surfing
UB4.C1.K1 – Establish communications
UB4.C1.K2 – Use plugins on websites.
UB4.C1.K3 – Use distinct browsers
UB4.C1.K1.P1
Enforce Last version of TLS
Enforce Strong Cipher Suite algorithms
Enforce highest curve encryption methods
UB4.C1.K3.P1 – Restrict allowed browsers to navigate
UB4.C1.K1.T1 – Unencrypted or risk communications
– Low/risk Cipher Suite algorithms
– Low/risk Curve encryption established
– Old and vulnerable TLS Versions
UB4.C2 – Web Actions
UB4.C2.K1 – Click on Web Links
UB4.C2.K2 – Download Files
UB4.C2.K1.P1 – Use a link checker
Click to expand the image
UB4.C2.K2.P1 – Validate File Extensions
UB4.C2.K2.P2 – Validate FileHashes with Threat Intelligence Sources
UB4.C2.K1.T1 – Phishing and Fake Login Pages
UB4.C2.K2.T1 – Download Malicious Files