Standard Users – UB Users

SCKIPT User Behaviour Matrix (Standard Users)
Source (UB)
Case Scenario (C)
Known Interactions (K)
Protection (P)
Threats (T)
UB3. Users
UB3.C1 – Scan QR Codes
UB3.C2 – User sign-in
UB3.C3 – Take screenshots-photos of company data
UB3.C4 -Users use different ISPs
UB3.C2.K1 – Sign-in attempts from anywhere
UB3.C2.K2 – Sign-in on non-owner devices
UB3.C4.K1 – Users contract and use non-secure ISP
UB3.C1.P1 – Monitor content/URLs behind QR Codes
UB3.C2.P1 – Restrict User Sign-in by Country
UB3.C3.P1
– Split information to not allow to identify sensitive / confidential data from one source
– Whitemark, obfuscate, replace sensitive / Confidential data
– DLP/DRM
– Deny screenshot software and/or monitor it file extensions
UB3.C4.K1.P1
– Monitor activities from non-secure ISP
UB3.C1.T1 – Access to malicious content through malicious URL after scan QR Codes
UB3.C2.K1.T1 – Suspicious sign-in attempts from multiple countries in a short time
UB3.C2.K2.T1 – User sessions remains active on non-owner devices after user activity
UB3.C3.T1 -Data leakage of sensitive or critical information
UB3.C4.K1.T1 -Sign-in attempts using non-secure ISP