1.
behavior Actions that deviate from normal user or system patterns
2.
development Designs training to improve security behavior
3.
report handling Validating and escalating suspicious email reports
4.
work security Protecting systems and data in remote setups
5.
incident report First notification of a suspicious or security event
6.
threat Risk from trusted individuals misusing access.
7.
security OPSEC - Everyday habits that protect sensitive data.
8.
management Creating, storing, and protecting secure passwords.
9.
campaign Deceptive campaign to steal data or install malware.
10.
detection Identifying suspicious emails, links, or requests
11.
execution Delivering and managing awareness activities
12.
monitoring Ongoing tracking of threats or behaviors
13.
media policy Rules preventing data loss or malware from USBs.
14.
behavior Choices that increase exposure or threat likelihood.
15.
policy Defines rules and acceptable use expectations
16.
awareness Understanding current threats and acting safely
17.
engineering Manipulating people to bypass security safeguards
18.
behavior Legitimate actions outside a user’s normal pattern
19.
behavior Mistakes that accidentally create security risk
20.
handbook Summarizes key security policies and guidance