Shield Flashcards

(8 cards)

1
Q

What is the SHIELD model?

A

Defending yourself or your organization against manipulation, leaks, social engineering, and insider risk without drifting into paranoia. Its core process is: S = Surface the asset or vulnerability
H = Highlight who has access and why
I = Inspect incentives, exposure, and failure points
E = Establish layers of verification and least privilege
L = Limit unnecessary disclosure and access
D = Drill response, review incidents, and adapt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What problem is the SHIELD model designed to solve?

A

Defending yourself or your organization against manipulation, leaks, social engineering, and insider risk without drifting into paranoia.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the steps of the SHIELD model?

A

S = Surface the asset or vulnerability
H = Highlight who has access and why
I = Inspect incentives, exposure, and failure points
E = Establish layers of verification and least privilege
L = Limit unnecessary disclosure and access
D = Drill response, review incidents, and adapt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the master question for the SHIELD model?

A

What asset matters here, who can reach it, what vulnerabilities or incentives create risk, and what layered controls would reduce exposure without wrecking normal function?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When should I use the SHIELD model?

A

Use it for sensitive information, key relationships, hiring, internal security, phishing risk, fraud prevention, and reputation protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What mistake does the SHIELD model try to prevent?

A

It prevents naive trust, loose information handling, and overreliance on a single control or a single trustworthy-looking person.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the one-line rule of the SHIELD model?

A

Protect what matters with layered controls, limited exposure, verification, and review.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do I know I am using the SHIELD model correctly?

A

You are using it correctly if critical information, access, and response plans become more disciplined without the system becoming unusably rigid.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly