Developers: | Kaspersky Lab |
Date of the premiere of the system: | April, 2019 |
Branches: | Internet services |
Technology: | Cybersecurity - Antiviruses, cybersecurity are Information loss preventions |
2019
Kaspersky Lab released in April, 2019 Kaspersky Automated Security Awareness Platform (ASAP) — the automated platform offering approach to the organization of trainings for protection against cyberthreats. This online tool allows to create and fix at employees skills of safe work in a digital medium. The person — the weakest link in a chain of information protection of the organization. According to a research of Kaspersky Lab, 52% of the companies consider worldwide the greatest threat to the system of corporate safety of employees as their actions can compromise corporate data. Because of carelessness and low digital literacy employees follow phishing the links, use unsafe corporate passwords, independently try to fight with viruses-encoders etc. Meanwhile, the error of one employee even in the sector of small or medium business runs very into money — according to the same research, the average damage from the successful attack to the companies of the SBM-segment is 4.3 million rubles.
The attacks of malefactors become successful because employees lack knowledge in information security field, and effective remedies are necessary for business for the solution of this problem. However normal trainings are too difficult and tiresome therefore they do not yield results — employees quickly forget the gained knowledge or do not take a course completely at all.
In the Kaspersky ASAP platform approach to the organization of trainings for protection against cyberthreats is implemented. The solution allows to estimate the current knowledge of the employee in the field of cyber security, to define in connection therewith a set of the skills necessary for it depending on its job duties and a profile of risk, to build the diagram of passing of the program. For example, only basic abilities while the head for work with confidential information needs to know how to secure data of the whole department are necessary for non-management employees.
The product is constructed taking into account features of human memory. During each lesson which lasts no more than 10 minutes the emphasis is several times placed on key messages. The lesson includes the interactive module and videos and also fixing and check exercises (the test or simulation of a phishing attack). Fixing exercises represent the evident tasks applicable to daily work of the employee. Working off of skills (and all their more than 350) is based on the principle "from simple to difficult" — i.e. so far check will not be undergone, the next stage of a training will not be available. Such structure allows to remember most effectively and, the most important, to use the gained knowledge.
Automated management in Kaspersky ASAP helps the companies to control process at all stages: from goal setting to efficiency evaluation. Thanks to a convenient control panel and detailed reports the company management will always have information for progress assessment.
See Also
- Censorship on the Internet. World experience
- Censorship (control) on the Internet. Experience of China
- Censorship (control) on the Internet. Experience of Russia, Roskomnadzor
- Law on regulation of Runet
- VPN and privacy (anonymity, anonymizers)
- Protection of critical information infrastructure of Russia
- Law On security of critical information infrastructure of the Russian Federation
- National Biometric Platform (NBP)
- Single Biometric System (SBS) of these clients of banks
- Biometric identification (market of Russia)
- Directory of solutions and projects of biometrics
- Digital economy of Russia
- Information security of digital economy of Russia
- SORM (System for Operative Investigative Activities)
- State detection system, warnings and mitigations of consequences of the computer attacks (State system of detection, prevention and elimination of consequences of computer attacks)
- National filtering system of Internet traffic (NASFIT)
- Yastreb-M Statistics of telephone conversations
- How to bypass Internet censorship of the house and at office: 5 easy ways
- The auditor - a control system of blocking of the websites in Russia
- The Single Network of Data Transmission (SNDT) for state agencies (Russian State Network, RSNet)
- Data network of public authorities (SPDOV)
- Single network of telecommunication of the Russian Federation
- Electronic Government of the Russian Federation
- Digital economy of Russia
- Cyber crime in the world
- Requirements of a NIST
- Global index of cyber security
- Cyber wars, Cyber war of Russia and USA
- Cyber crime and cyber conflicts: Russia, FSB, National coordination center for computer incidents (NKTsKI), Information Security Center (ISC) of FSB, Management of K BSTM of the Ministry of Internal Affairs of the Russian Federation, Ministry of Internal Affairs of the Russian Federation, Ministry of Defence of the Russian Federation, National Guard of the Russian Federation
- Cyber crime and cyber conflicts: Ukraine
- Cyber crime and cyber conflicts: USA, CIA, NSA, FBI, US Cybercom, U.S. Department of Defense, NATO, Department of Homeland Security, Cybersecurity and Infrastructure Security Agency (CISA)
- Cyber crime and cyber conflicts: Europe, ENISA
- Cyber crime and cyber conflicts: Israel
- Cyber crime and cyber conflicts: Iran
- Cyber crime and cyber conflicts: China
- As the USA spied on production of chips in the USSR
- Security risks of communication in a mobile network
- Information security in banks
- Digital transformation of the Russian banks
- Overview: IT in banks 2016
- The policy of the Central Bank in the field of data protection (cyber security)
- Losses of the organizations from cyber crime
- Losses of banks from cyber crime
- Trends of development of IT in insurance (cyberinsurance)
- Cyber attacks
- Overview: Security of information systems
- Information security
- Information security (world market)
- Information security (market of Russia)
- The main trends in data protection
- Software for data protection (world market)
- Software for data protection (the market of Russia)
- Pentesting (pentesting)
- Cybersecurity - Means of enciphering
- Cryptography
- VPN - Virtual private networks
- Security incident management: problems and their solutions
- Authentication systems
- Law on personal data No. 152-FZ
- Personal data protection in the European Union and the USA
- Quotations of user data in the market of cybercriminals
- Jackpotting
- Virus racketeer (encoder)
- WannaCry (virus racketeer)
- Petya/ExPetr/GoldenEye (virus racketeer)
- Malware (malware)
- APT - Targeted or target attacks
- DDoS and DeOS
- Attacks on DNS servers
- DoS-attacks on content delivery networks, CDN Content Delivery Network
- How to be protected from DDoS attack. TADetails
- Rootkit
- Fraud Detection System (fraud, fraud, fraud detection system)
- Solutions Antifraud directory and projects
- How to select an antifraud system for bank? TADetails
- Security Information and Event Management (SIEM)
- Directory of SIEM solutions and projects
- Than a SIEM system is useful and how to implement it?
- For what the SIEM system is necessary and as it to implement TADetails
- Intrusion detection and prevention systems
- Reflections of local threats (HIPS)
- Confidential information protection from internal threats (IPC)
- Phishing, DMARC, SMTP
- Trojan
- Botha's botnet
- Backdoor
- Worms Stuxnet Regin
- Flood
- Information loss preventions (DLP)
- Skimming (shimming)
- Spam
- Sound attacks
- Antispam software solutions
- Classical file infectors
- Antiviruses
- Cybersecurity: means of protecting
- Backup system
- Backup system (technologies)
- Backup system (security)
- Firewalls