- CISSP in 21 Days(Second Edition)
- M. L. Srinivasan
- 423字
- 2021-07-14 11:04:28
Information security education, training, and awareness
The information security domain consists of many concepts and definitions. Besides, information security initiatives in an organization will have many policies, procedures, as well as technology components. In order to have an effective security posture within the organization, it is important that people or personnel are aware of security requirements, organization-specific security policies and procedures, and most importantly, particular personnel-specific roles and responsibilities pertaining to security.
Security awareness and training is one of the core components of the risk management program in any organization. The objective is to ensure that the personnel are aware of the security requirements and are trained to handle day-to-day security events.
National Institute of Standards and Technology (NIST) publication 800-14 - Generally Accepted Principles and Practices for Securing Information Technology Systems, recommends seven steps for a security awareness and training program. The standard groups the best practices into three broad areas, which are identification, management, and the evaluation of training and awareness programs.
- In the identification phase, an organization would establish scope, goals and objectives, training staff identification, and the audience.
- In managing the program, an organization would motivate the management and employees, manage administration, and maintain the training and awareness programs.
- Periodically, an organization will evaluate the program for its effectiveness.
The international standard ISO/IEC27002 Information technology - Security techniques-code of practice for information security management is an acknowledged International Standard that provides some of the best practices in various domains of information security. The standard defines the following good practices a security professional should be aware of pertaining to Security Awareness and Training:
- Based on their job function, the standard emphasizes that all employees and, where relevant, contractors and third-party users should be provided with appropriate awareness training as well as regular updates in organizational policies and procedures.
- The induction program should consist of awareness training that covers the organization's security policies and the security expectations. The personnel should undergo such training before any access to information or services are granted to them.
- The training program should contain the security requirements of the organization, legal responsibilities, business controls and, most importantly, correct usage instructions that relate to information processing facilities.
- Procedures related to log-on, appropriate usage of systems, networks, software packages, and the explanation of disciplinary processes in case of policy or procedure violations should be part of the training.
- The training should also focus on known threats and enhance the awareness of security incidents and problems and the way to respond to them based on the personnel's role.
- Microsoft Dynamics 365 Extensions Cookbook
- VMware vSphere 6.7虛擬化架構實戰指南
- Java持續交付
- 網絡爬蟲原理與實踐:基于C#語言
- 21天學通C++(第5版)
- Java程序設計案例教程
- C語言程序設計與應用(第2版)
- .NET 4.5 Parallel Extensions Cookbook
- MATLAB GUI純代碼編寫從入門到實戰
- Java核心編程
- 現代JavaScript編程:經典范例與實踐技巧
- Python實戰指南:手把手教你掌握300個精彩案例
- Python數據科學實戰
- Swift語言實戰晉級(第2版)
- Test-Driven iOS Development with Swift 4(Third Edition)