Information Security Awareness Program Proposal
|
|
|
- Mervyn Phillips
- 10 years ago
- Views:
Transcription
1 Information Security Awareness Program Proposal Michael E. Whitman, Ph.D. Purpose The purpose of information security awareness is improving coherence of the need to protect information and system resources, and defining the user s role in the process. Making computer system users aware of their security responsibilities and disseminating correct practices can help user s change past behaviors. 1
2 Benefits There are two overriding benefits of awareness, namely: (1) improving employee compliance and (2) increasing the ability to hold employees accountable for their actions. One principal purpose of information security awareness is to reduce errors and omissions. However, it can also reduce fraud and unauthorized activity by increasing employees' knowledge of accountability and the penalties associated with such actions. Accountability Both the dissemination and the enforcement of policy are critical issues that are strengthened through awareness programs. Employees cannot be expected to follow policies and procedures of which they are unaware. 2
3 Awareness Awareness stimulates and motivates those being trained to care about security and to remind them of important security practices. Explaining what happens to an organization, its mission, customers, and employees if security fails motivates people to take security seriously. Awareness Awareness can take on different forms for particular audiences. Awareness is used to reinforce the fact that security supports the mission of the organization by protecting valuable resources. Awareness is also used to remind people of basic security practices, such as logging off a computer system or locking doors. 3
4 Comparative Framework Awareness Effective security awareness programs need to be designed with the recognition that people tend to practice a tuning out process (also known as acclimation). For this reason, awareness techniques should be creative and frequently changed. 4
5 Program Implementation Step 1: Identify Program Scope, Goals, and Objectives. Step 2: Identify Training Staff. Step 3: Identify Target Audiences. Step 4: Motivate Management and Employees. Step 5: Administer the Program. Step 6: Maintain the Program. Step 7: Evaluate the Program. Step 1: Identify Program Scope, Goals, and Objectives. Scope: Faculty, Staff and Students in offices, labs and public access ports. Goals: Increase the general level of security awareness. Reduce the incidences of computer fraud, waste and abuse. Create a more security savvy member of the organization s computing community. 5
6 Step 1: Identify Program Scope, Goals, and Objectives. Objectives: Design a detailed security awareness implementation plan. Create interesting security awareness materials using internal resources whenever possible. Provide variety and creativity in the program. Have program in place and functional within 6 months of approval. Step 2: Identify Training Staff. Primary administrator responsible for program is the Chief Information Security Officer. Assistance will be provided by key security faculty, University outreach training professionals, and select system administrators. Some assistance will be available on a temporary basis from students in Information Security coursework. 6
7 Step 3: Identify Target Audiences. There are three target audiences: Students Staff Faculty Within these three audiences there are two general categories of users: Managerial users those responsible for managing technology and users of technology. End users those using technology. Step 4: Motivate Management and Employees. This will be accomplished through a series of short presentations on the importance of security and the security awareness program. 7
8 Step 5: Administer the Program. The program will consist of three main efforts: Security awareness presentations. Security awareness columns in campus newsletters and other dedicated publications. Security awareness materials: Posters Videos CD-ROMs Promotional Materials Program Theme Be SAFE Think before you Click! Security Awareness For Everyone 8
9 Security Awareness Program Step 6: Maintain the Program. Maintenance will be provided through a joint effort between the CISO, faculty, and selected Information Security students. Step 7: Evaluate the Program. Evaluation of the program will be conducted on a semi-annual basis by the CISO. Costs How to Spend a Dollar on Security recommends that out of every security dollar you spend: 15 cents: Policy 40 cents: Awareness 10 cents: Risk Assessment 20 cents: Technology 15 cents: Process We feel it can be done for much less, for an estimated annual budget of approx $5,000. Many materials (posters, newsletters etc.) will be contributed by security personnel and students. by Patrick McBride (ComputerWorld November 9, 2000) 9
TEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Developing the Security Program Jan 27, 2005 Introduction Some organizations use security programs to describe the entire set of personnel, plans, policies, and initiatives
Security Awareness & Securing the Human. By: Chandos J. Carrow, CISSP System Office - Information Security Officer Virginia Community College System
Security Awareness & Securing the Human By: Chandos J. Carrow, CISSP System Office - Information Security Officer Virginia Community College System I am not John Popper nor do I play the harmonica Question
Nexed s Privacy Policy tells you what information we use, collect or disclose to third parties about our users.
ANSWERABLES BETA VERSION PRIVACY POLICY Effective Date: August 30, 2013 This Privacy Policy applies to the Answerables software, associated services and website located at www.nexed.com, its sub-domains
Wright State University Information Security
Wright State University Information Security Controls Policy Title: Category: Audience: Reason for Revision: Information Security Framework Information Technology WSU Faculty and Staff N/A Created / Modified
Academic Unit Action Plan: SOCIAL WORK
Academic Unit Action Plan: SOCIAL WORK Academic Unit Name School of Social Work_(Orillia) 2012 2017 Lakehead University Academic Plan Priorities Academic Unit Goals for the Period 2012 2017 Action(s) Designed
INJURY AND ILLNESS PREVENTION PROGRAM. For SOLANO COMMUNITY COLLEGE DISTRICT
INJURY AND ILLNESS PREVENTION PROGRAM For SOLANO COMMUNITY COLLEGE DISTRICT Adopted: August 1992 Updated: January 2004 Updated: January 2006 Updated: January 2009 TABLE OF CONTENTS INTRODUCTION... 1 GOALS...
FEDERAL ELECTION COMMISSION OFFICE OF INSPECTOR GENERAL
FEDERAL ELECTION COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT Review of Outstanding Recommendations as of June 2013 August 2013 ASSIGNMENT No. OIG -13-03 Report Overview As required by the Inspector
Information Resources Security Guidelines
Information Resources Security Guidelines 1. General These guidelines, under the authority of South Texas College Policy #4712- Information Resources Security, set forth the framework for a comprehensive
Request for Change in Delivery of Graduate Certificate
Request for Change in Delivery of Graduate Certificate The Interdisciplinary Human Development Institute A University Center for Excellence at the University of Kentucky, began offering a Graduate Certificate
Privacy and Security Awareness, Education and Training Policy
Privacy and Security Awareness, Education and Training Policy Version Approval Date Owner 1.0 June 4, 2015 Pam Clarke 1. Purpose HealthShare Exchange of Southeastern Pennsylvania, Inc. (HSX) is committed
Information Security Training & Awareness
Online Training & Project Briefing Expectations & Responsibilities Information Security Manager s Forum, March 4, 2008 Revised September 20, 2010 (1) Why is awareness important? Obligation to protect private
Elmira City School District. Every Student Succeeds. Communication Plan 2007-08. Elmira City School District 951 Hoffman Street Elmira, NY 14905.
Elmira City School District Every Student Succeeds Communication Plan 2007-08 Elmira City School District 951 Hoffman Street Elmira, NY 14905 2 School Communications C ommunication is defined as the exchange
Texas System of Care Social Marketing Plan
Attachment B Texas System of Care Social Marketing Plan Overview Texas made an early commitment to the system of care approach and has made steady progress over the past 15 years. In the communities where
College of Human Environmental Sciences Strategic Plan for 2012-2015
College of Human Environmental Sciences Strategic Plan for 2012-2015 Revised Fall 2013 Mission: The College will be a well-recognized leader in preparing students to impact the lives of individuals and
Information Security Awareness Training and Phishing
Information Security Awareness Training and Phishing Audit Report Report Number IT-AR-16-001 October 5, 2015 Highlights The Postal Service s information security awareness training related to phishing
Strategic Plan, 2006 Department of Physics Texas Tech University. Department of Physics Mission Statement. Department of Physics Vision Statement
Strategic Plan, 2006 Department of Physics Texas Tech University Department of Physics Mission Statement The mission of the Department is to provide quality undergraduate education, quality graduate education,
FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS
TABLE OF CONTENTS General Topics Purpose and Authorities Roles and Responsibilities Policy and Program Waiver Process Contact Abbreviated Sections/Questions 7.1 What is the purpose of this chapter? 7.2
R345, Information Technology Resource Security 1
R345, Information Technology Resource Security 1 R345-1. Purpose: To provide policy to secure the private sensitive information of faculty, staff, patients, students, and others affiliated with USHE institutions,
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS Key Cyber Security Role: Authorizing Official (AO)
DOE CYBER SECURITY EBK: CORE COMPETENCY TRAINING REQUIREMENTS Key Cyber Security Role: Authorizing Official (AO) Role Definition: The AO is the Senior DOE Management Federal official with the authority
Priority III: A National Cyberspace Security Awareness and Training Program
Priority III: A National Cyberspace Security Awareness and Training Program Everyone who relies on part of cyberspace is encouraged to help secure the part of cyberspace that they can influence or control.
INFORMATION SECURITY AT THE HEALTH RESOURCES AND SERVICES ADMINISTRATION NEEDS IMPROVEMENT BECAUSE CONTROLS WERE NOT FULLY IMPLEMENTED AND MONITORED
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL INFORMATION SECURITY AT THE HEALTH RESOURCES AND SERVICES ADMINISTRATION NEEDS IMPROVEMENT BECAUSE CONTROLS WERE NOT FULLY IMPLEMENTED
Network Security Policy
Network Security Policy I. PURPOSE Attacks and security incidents constitute a risk to the University's academic mission. The loss or corruption of data or unauthorized disclosure of information on campus
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Employee Computer Usage Policies and Procedures I. PURPOSE: The purpose of this section is to define the policies and procedures for using the administrative
OPP CITY SCHOOLS JOB DESCRIPTION. (1) Master s degree from an accredited educational institution.
OPP CITY SCHOOLS ASSISTANT PRINCIPAL, ELEMENTARY SCHOOL JOB DESCRIPTION QUALIFICATIONS: (1) Master s degree from an accredited educational institution. (2) Certification in Educational Leadership, School
933 COMPUTER NETWORK/SERVER SECURITY POLICY
933 COMPUTER NETWORK/SERVER SECURITY POLICY 933.1 Overview. Indiana State University provides network services to a large number and variety of users faculty, staff, students, and external constituencies.
D.C. OFFICE OF THE ATTORNEY GENERAL GOVERNMENT OF THE DISTRICT OF COLUMBIA POSITION VACANCY ANNOUNCEMENT
D.C. OFFICE OF THE ATTORNEY GENERAL GOVERNMENT OF THE DISTRICT OF COLUMBIA POSITION VACANCY ANNOUNCEMENT ANNOUNCEMENT NO: ES -02-2015 POSITION: Director of Communications POSITION GRADE & SERIES: ES-301-08/09
Responsible Administrative Unit: Computing, Communications & Information Technologies. Information Technology Appropriate Use Policy
1.0 BACKGROUND AND PURPOSE Information Technology ( IT ) includes a vast and growing array of computing, electronic and voice communications facilities and services. At the Colorado School of Mines ( Mines
Hotline and Case Management System Now that you have them, what do you do with them?
Hotline and Case Management System Now that you have them, what do you do with them? Mike Hill Chief Audit Officer, GHSU Tad Bixby Practice Director, Global Compliance About Georgia Health Sciences Enterprise
InItIatIves for IndustrIal Customers employee energy awareness PlannInG GuIde
Initiatives for Industrial Customers EMPLOYEE ENERGY AWARENESS PLANNING GUIDE 2 STEPS TO SUCCESS The following six steps can help you build your own Power Smart Employee Energy Awareness program. These
Davis Applied Technology College Public Relations Policy and Procedures Approval Date: December 12, 2011
Davis Applied Technology College Public Relations Policy and Procedures Approval Date: December 12, 2011 1. Purpose 1.1. This policy standardizes production criteria for the College brand image, publications,
Policy Governing Computer Security and Resource Allocation
(In the text that follows, the policy is set in straight type; additional explanatory material is set in italics and is not to be considered part of the policy itself.) 1. Rationale In support of its mission
Standards and Criteria for Promotion and Tenure. School of Social Work and Human Service Social Work Department
Standards and Criteria for Promotion and Tenure School of Social Work and Human Social Work Department TABLE OF CONTENTS Page I. Preamble... 4 II. Weighting Criteria... 4 III. Appointment Criteria for
WELCOME TO THE POLICE DEPARTMENT
The University of Houston Clear Lake Police Department is a full service police agency, providing law enforcement and security services to the UH Clear Lake campus community operating twenty-four hours
Role of Awareness and Training for Successful InfoSec Security Program 1
Role of Awareness and Training for Successful InfoSec Security Program 1 Role of Awareness and Training for Successful Information Systems Security Program Venkata Siva, Jose R Velez Saint Leo University
Western Kentucky University, The Center. The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014
Western Kentucky University, The Center The Michael Minger Act Report for 2015 Activity Reported for Calendar Year 2014 Section 1: Campus Security Authority List campus security authority personnel (definition
APHIS INTERNET USE AND SECURITY POLICY
United States Department of Agriculture Marketing and Regulatory Programs Animal and Plant Health Inspection Service Directive APHIS 3140.3 5/26/2000 APHIS INTERNET USE AND SECURITY POLICY 1. PURPOSE This
Strategic Plan 2012-2018 University Libraries Virginia Tech
Strategic Plan 2012-2018 University Libraries Virginia Tech Introduction Our mission is to invent the future of libraries at Virginia Tech. We honor tradition as we excel in our core mission to provide
SBBC: JJ-002 FL: 28 THE SCHOOL BOARD OF BROWARD COUNTY, FLORIDA JOB DESCRIPTION. Approved School-based Administrators Salary Schedule
THE SCHOOL BOARD OF BROWARD COUNTY, FLORIDA JOB DESCRIPTION POSITION TITLE: CONTRACT YEAR: PAY GRADE: School Assistant Principal Eleven Months* Approved School-based Administrators Salary Schedule QUALIFICATIONS:
Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:
Executive Summary Texas state law requires that each state agency, including Institutions of Higher Education, have in place an Program (ISP) that is approved by the head of the institution. 1 Governance
To specify the minimum Occupational Safety and Health (OSH) program requirements for safety and health training for National Park Service:
SECTION 5: SAFETY TRAINING 5.0 OCCUPATIONAL SAFETY AND HEALTH TRAINING Purpose To specify the minimum Occupational Safety and Health (OSH) program requirements for safety and health training for National
Information Security Policy and Handbook Overview. ITSS Information Security June 2015
Information Security Policy and Handbook Overview ITSS Information Security June 2015 Information Security Policy Control Hierarchy System and Campus Information Security Policies UNT System Information
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY
CITY OF MARQUETTE, MICHIGAN CITY COMMISSION POLICY Policy Number: 2008-02 Date Adopted: October 27, 2008 Department: Administrative SUBJECT: IDENTITY THEFT PREVENTION PROGRAM I. OBJECTIVE: A. To protect
Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme
Internet Security Awareness Program in Georgia funded by ISOC Community Grants Programme Final Report July, 2011 Prepared by David Tabatadze Project Coordinator [email protected] Project Overview With the internet
IT SECURITY EDUCATION AWARENESS TRAINING POLICY OCIO-6009-09 TABLE OF CONTENTS
OFFICE OF THE CHIEF INFORMATION OFFICER Date of Issuance: May 22, 2009 Effective Date: May 22, 2009 Review Date: Section I. PURPOSE II. AUTHORITY III. SCOPE IV. DEFINITIONS V. POLICY VI. RESPONSIBILITIES
Software Contract and Compliance Review
Audit Report Report Number IT-AR-15-009 September 18, 2015 Software Contract and Compliance Review The software contract did not comply with all applicable standards and management did not ensure the supplier
-A Scavenger Hunt for College Students
-A Scavenger Hunt for College Students 2015 Event Sponsorship Proposal The Finders Keepers Scavenger Hunt is an exciting and challenging hunt involving students who search their campus to solve cryptic
GENERATION SAFE 360 SELF ASSESSMENT: PRINTABLE VERSION. Page 1
Page 1 Contents 1. Introduction 2. How to use the 360 Self Assessment 3. Links to documents and resources 4. Acknowledgements 5. 360 Self Assessment 6. Report Sheet Introduction The development and expansion
ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles and Responsibilities
Policy Title: Information Security Roles Policy Type: Administrative Policy Number: ADMINISTRATIVE POLICY # 32 8 2 (2014) Information Security Roles Approval Date: 05/28/2014 Revised Responsible Office:
Meditech Patient Care System Clinical Documentation Nursing Student Pre Training Overview
Meditech Patient Care System Clinical Documentation Nursing Student Pre Training Overview Instructions: Read and familiarize yourself with the contents of this module. Upon completion, print the Clin Doc
Information Security Policy
Information Security Policy Touro College/University ( Touro ) is committed to information security. Information security is defined as protection of data, applications, networks, and computer systems
STRATEGIC OBJECTIVES 2010-11
STRATEGIC OBJECTIVES 2010-11 OVERVIEW: The Division of Marketing & Communications is committed to assisting Texas A&M University in achieving a culture of excellence as outlined in Vision 2020 and its
STELLENBOSCH UNIVERSITY DEPARTMENT OF CIVIL ENGINEERING POST GRADUATE STUDIES AT THE CHAIR IN CONSTRUCTION ENGINEERING AND MANAGEMENT
STELLENBOSCH UNIVERSITY DEPARTMENT OF CIVIL ENGINEERING POST GRADUATE STUDIES AT THE CHAIR IN CONSTRUCTION ENGINEERING AND MANAGEMENT The construction industry needs creative and innovative graduates who
Free Medical Billing. Insurance Payment Posting: The following instructions will help guide you through Insurance Payment Posting Procedures.
: The following instructions will help guide you through Procedures. Click Windows Start Button Click Open Internet Browser Enter Https://www.FreeMedicalBilling.net Click Login to Your Account Enter Username:
A Human Resource Capacity Tool for First Nations // planning for treaty
A Human Resource Capacity Tool for First Nations // planning for treaty table of contents Introduction //...3 Tools //... 9 HR Planning Timeline... 9 Stage 1 Where are we now?...11 Stage 2 Where do we
Caldwell Community College and Technical Institute
Caldwell Community College and Technical Institute Student Computer Usage Policies and Procedures I. Campus Computer Usage Overview: The purpose of this document is to define the policies and procedures
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)
CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT) PURPOSE: The purpose of this procedure is to establish the roles, responsibilities, and communication procedures for the Computer Security Incident
Strategic Plan 2013-2015. The College of Business Oregon State University. Strategic Plan. Approved June 2012 Updated June 2013 Updated June 2014
The College of Business Oregon State University Strategic Plan Approved June 2012 Updated June 2013 Updated June 2014 1 The College of Business Oregon State University Vision Developing professionals who
CREDIT CARD SECURITY POLICY PCI DSS 2.0
Responsible University Official: University Compliance Officer Responsible Office: Business Office Reviewed Date: 10/29/2012 CREDIT CARD SECURITY POLICY PCI DSS 2.0 Introduction and Scope Introduction
UA Student Security Awareness/Anti- Phishing Campaign
2013-14 PROJECT PROPOSAL Posted: 4/21/14 UA Student Security Awareness/Anti- Phishing Campaign OBJECTIVE: University students are attractive targets for identity thieves and hackers. According to the FTC
Specific observations and recommendations that were discussed with campus management are presented in detail below.
CSU The California State University Office of Audit and Advisory Services INFORMATION SECURITY California State University, San Bernardino Audit Report 14-55 March 18, 2015 EXECUTIVE SUMMARY OBJECTIVE
COMPUTER AND NETWORK USAGE POLICY
COMPUTER AND NETWORK USAGE POLICY Respect for intellectual labor and creativity is vital to academic discourse and enterprise. This principle applies to works of all authors and publishers in all media.
TITLE: Scripps Compliance Program
PAGE 1 of 7 TITLE: Scripps Compliance Program IDENTIFIER: S-FW-LD-1003 APPROVED: Executive Cabinet 08/14/12 ORIGINAL FORMULATION: 11/00 REVISED: 02/06, 11/06, 10/09, 08/12 REVIEWED: EFFECTIVE: Acute Care:
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY
FAYETTEVILLE STATE UNIVERSITY POLICY ON INFORMATION SECURITY Authority: Category: Applies to: Chancellor, Fayetteville State University University-wide Faculty, Staff, and Students History: Approved on
Undergraduate Academic Assessment Plan 2013-14
Undergraduate Academic Assessment Plan 2013-14 B.F.A. in Graphic Design School of Art + Art History College of Fine Arts Associate Dean Margaret S. Mertz, Ph.D. [email protected] 1 Table of Contents
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System
United Tribes Technical College Acceptable Use Policies for United Tribes Computer System 1.0 Policy The purpose of this policy is to outline the acceptable use of computer equipment at United Tribes Technical
RPI Best Practice Standards
Recognition Professionals International (RPI) RPI Best Practice Standards Program and Standards Revised: April 2007 Recognition Professionals International 1601 N. Bond Street, Suite 303, Naperville, IL
Marketing, Recruitment and Admissions. Marketing Strategy 2013-2015
Marketing, Recruitment and Admissions Marketing Strategy 2013-2015 November 2013 The Marketing Strategy is created cooperatively by the Department s marketing managers and exists to advance the University
POSTAL REGULATORY COMMISSION
POSTAL REGULATORY COMMISSION OFFICE OF INSPECTOR GENERAL FINAL REPORT INFORMATION SECURITY MANAGEMENT AND ACCESS CONTROL POLICIES Audit Report December 17, 2010 Table of Contents INTRODUCTION... 1 Background...1
>>> SOCIAL MEDIA MARKETING ROI CHEATSHEET 40 WAYS TO MEASURE YOUR SOCIAL MEDIA ROI. we inspire people to take action
>>> SOCIAL MEDIA MARKETING ROI CHEATSHEET 40 WAYS TO MEASURE YOUR SOCIAL MEDIA ROI we inspire people to take action OBJECTIVE KPI METRIC + REVENUE SALES LEADS CUSTOMERS WEBSITE CONVERSIONS - COSTS STAFF
Importers must have written and verifiable processes for the selection of business partners including manufacturers, product suppliers and vendors.
Security Profile For each of the sections below, you will be required to write a response and/or upload a document demonstrating how your company adheres to the stated requirement. There is no one right
TAKE IT TO THE NEXT LEVEL. College of Nursing. Graduate Studies. College of Nursing
TAKE IT TO THE NEXT LEVEL College of Nursing Graduate Studies College of Nursing Health Sciences Building in Saskatoon Vision The College of Nursing is a world leader in educating nurses in interprofessional
