INFORMATION SECURITY AWARENESS & TRAINING PROGRAM



Similar documents
Promoting a cyber security culture and demand compliance with minimum security standards;

Cyber security Country Experience: Establishment of Information Security Projects.

National Cyber Crime Unit

EDUCATION AND SCHOOLS

Declaration of Principles of the World Summit. Tunis in 2005 adopted by Heads of States and Governments stated that:

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

Protection Policy Statement

CYSPA launch event - Turkey

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cyber Security - What Would a Breach Really Mean for your Business?

2015 Information Security Awareness Catalogue

ITU Global Cybersecurity Agenda (GCA)

Cybercrime : Malaysia. By DSP MahfuzBin Dato Ab. Majid Royal Malaysia Police

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Cybersecurity in Nepal

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

ACEIE, CSP & NSTF workshop on digital wellness in SA. Jansie Niehaus Exec Director, NSTF 21 Aug 2015

How To Defend Yourself Against Cyber Attacks

Cybersecurity and Collaborative Research Projects. Hiroto Yasuura Executive Vice President Kyushu University

Executive Director Centre for Cyber Victim Counselling /

THE WORLD IS MOVING FAST, SECURITY FASTER.

How To Protect Yourself From Cyber Crime

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Finnish Cyber Security Strategy. Permanent Secretary, LTG Arto Räty Chairman of the Security Committee , Geneva

Identity Theft. CHRISTOS TOPAKAS Head of Group IT Security and Control Office

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Cybercrime: risks, penalties and prevention

Cyber Stability 2015 Geneva, 09 July African Union Perspectives on Cybersecurity and Cybercrime Issues.

ESKISP Direct security testing

2012 NORTON CYBERCRIME REPORT

CYBER SECURITY STRATEGY AN OVERVIEW

Small businesses: What you need to know about cyber security

Europol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011

Commonwealth Approach to Cybergovernance and Cybersecurity. By the Commonwealth Telecommunications Organisation

CONSUMER EDUCATION Policy Recommendations of the OECD S Committee on Consumer Policy

What legal aspects are needed to address specific ICT related issues?

How To Ensure Cyber Security In The Czech Republic

National Cyber Security Policy -2013

How To Understand And Understand The European Priorities In Information Security

Playing Our Part in Responding to National Threats

Honourable members of the National Parliaments of the EU member states and candidate countries,

2 Gabi Siboni, 1 Senior Research Fellow and Director,

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

A practical guide to IT security

Cyber Security Strategy

OVERVIEW. 1. Cyber Crime Unit organization. 2. Legal framework. 3. Identity theft modus operandi. 4. How to avoid online identity theft

How To Cover A Data Breach In The European Market

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

TELECOMMUNICATIONS SERVICE PROVIDERS ASSOCIATION OF KENYA

The 2012/3 SA Cyber Threat Barometer. Craig Rosewarne

THE HUMAN COMPONENT OF CYBER SECURITY

Cybersecurity Protecting Yourself, Your Business, Your Clients

AISA NATIONAL CONFERENCE 2015 TRUST IN INFORMATION SECURITY. 14 October 2015 OPENING ADDRESS LYNWEN CONNICK

NEW ZEALAND S CYBER SECURITY STRATEGY

Women in an Age of Cyber Wars: Risks, Management and Opportunity

Certificate in Cyber Security

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Cybernetic Global Intelligence. Service Information Package

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Harmonizing cyberlaws and regulations: the experience of the East African Community CTO Cybersecurity Forum April 2013 Yaoundé, Cameroon

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

Connect Smart for Business SME TOOLKIT

Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley

CYBER SECURITY LEGISLATION AND POLICY INITIATIVES - UGANDA CASE

CYBER-ATLAS A COMPLETE CYBER RISK MANAGEMENT SOLUTION

Australian Government Cyber Security Review

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

Digital Forensics G-Cloud Service Definition

DON T BE A VICTIM! IS YOUR INVESTMENT PROGRAM PROTECTED FROM CYBERSECURITY THREATS?

Mitigating and managing cyber risk: ten issues to consider

1. This report outlines the Force s current position in relation to the Policing of Cyber Crime.

3 day Workshop on Cyber Security & Ethical Hacking

CYBER SECURITY TRAINING SAFE AND SECURE

Cyber security trends & strategy for business (digital?)

Roadmap for new Cyber security education in ME

Course Bachelor of Information Technology majoring in Network Security or Data Infrastructure Engineering

HMG Security Policy Framework

National Cyber Security Policy (Draft) March 2015

How To Write A Cybersecurity Framework

Government of Kenya Ministry of Information Communications and Technology Telposta Towers, 10th Floor, Kenyatta Ave Nairobi, Kenya

Transcription:

INFORMATION SECURITY AWARENESS & TRAINING PROGRAM By Serah Francis MSc Student, Gjøvik University, Norway ISES Member IFIP TC3 ISES Project

INTRODUCTION Africa has 167 million Internet Users and is estimated that by 2025, that figure will raise to 600 million Internet users and 360 million smartphones In 2013, Internet contribution $18 billion and is estimated to be $300 billion in 2025. Every second, 18 adults become a victim of cybercrime, resulting in more than 1.5 million cybercrime victims each day on a global level

CRIME theft of personal data fraud inside threats abuse on children Inside threats terrorism.

In 2012, banks in Kenya, Rwanda, Uganda, Tanzania and Zambia alone lost US$245 M to fraud Same year, a South African Bank lost $6.7 million when two of their employees account were hacked In 2013 South Africa was identified as one of the countries hosting more than average rate of phishing sites, and 70% of its citizens were victim of cybercrme compared to 50% globally Last year, 5,000 Kenyan Facebook users lost million of shillings through a hacking scam

CRIME FACILITATORS Fast Internet Connection Increase of mobile devices High rate of unemployment, Lack of national databases to track criminals, Growth of e-government initiatives and e-commerce, Use of unsecure or outdated hardware and software

IMPORTANCE OF INFORMATION SECURITY AWARENESS & TRAINING PROGRAM Makes individual aware of their responsibilities in relation to information security Allows them to recognize IT security concerns and respond accordingly Provide a focal point and a driving force for a range of awareness, training and educational activities related to information security. Security is everyone s responsibility.

WHY SECURITY AWARENESS IMPORTANT FOR AFRICA For developing nations, ICT is a key component in improving the quality of life and participation in global economic activities. It provides opportunities for people with basic services such as e-banking, e-health, e-commerce and e-learning etc. Important that all users understand the risks of being online and the impacts of not using best practices. Failure to recognize the above could limit their use of internet services due to lack of trust and confidence

KEY CHALLENGES Shortage of information security professionals and skills Lack of basic awareness among users. Lack of knowledge/knowhow of importance of ICT Security. Lack of secure software and ICT-based applications. Lack of effective legislations and regulations Lack of collaboration between public, private, experts, academia and international organisations.

IT SECURITY LEARNING MODEL (1) Target Group Public Citizens IT Security Awareness Private Technical Admins.

IT SECURITY LEARNING MODEL (2) Four Level approach: Awareness Designed to be presented to all users to focus their attention on security Intended to allow individual to recognize IT security concerns and respond accordingly It is a foundation of a good Information Security Awareness & Training program Training Strives to produce relevant and needed security skills and competencies Builds upon information gathered from awareness presentations

IT SECURITY LEARNING MODEL (3) Education Education and Experience level focuses on developing the ability and vision to perform complex multi-discplinary activities and skills needed to further the IT security profession and to keep pace with threat and technicies Strives to produce IT security specialists and professionals capable of vision and proactive response Professional Development Intended to ensure that users posses a required level of knowledge and competence necessary for their roles Validation of skills typically through certification

AWARENESS Ensure upper management support Establish a policy Assign responsibility (CIO) Needs assessment Develop Awareness and Training Materials Implementation of the program Update and monitor program

AWARENESS -EXAMPLES OF TOPICS COVERED Undersanding the key concepts relating to the importance of secure information Protect computer and mobile devices from malware and unauthorised access Adopt safe habits of using email securely, social networks, and surfing the Web Back Up and restore data approariately and safely Secure dispose of data and device

AWARENESS DELIVERY MODEL & EXAMPLES Partnership with Private Organisations, Education Institutions and NGOs Delivery through Social Media, T.V, Radio, Cybercafe, Digital Centres, Mobile Cinema & Posters, government & private websites Examples Get Safe Online - https://www.getsafeonline.org/ - UK Stop Think Connect - http://www.dhs.gov/stopthinkconnect - US Slettmeg.no (("deleteme.no) - https://norsis.no/ -Norway Cyberstreetwise - https://www.cyberstreetwise.com/ - Soho, UK ENISA Cyber Security Month https://cybersecuritymonth.eu/ Kids Online - http://www.kids-online.net/

GOALS OF TRAINING To produce relevant skills & competence Important: Needs assesment to identify those individual with significant IT security responsibilities Each user may need specific training for their job Specific training programs may be tailored to specific organisations or systems e.g. Healthcare, Legal System Training can be delivered by Online or Live Instructor

TRAINING - TARGET GROUPS Users Citizens with varying age and technical knowledge who use ICTs for personal use anywhere outside their work environment. All organisations personnel, Mid-level managers, Executive management & System administrators Third party Partners, suppliers, consultant contracted to perform work in an organisation.

PROPOSAL FOR AFRICA (1) Align education system to include Information Security courses Raise Security Awareness using ways and methods fit for Africa Specialized Skills Training in Information Security could be established through local ICT Hubs or Computer Science Departments in public universities. This could lead to Train the Trainer courses and can be facilitated through Public Partnership,African CERT and NGO s based in Africa.

PROPOSAL FOR AFRICA (2) ECDL: Many African countries have adopted ECDL (ICDL) to promote digital literacy and ICT skills ECDL program is designed as an entry-level computer certification to demonstrate competence in computer use The program offers a range of IT modules and IT Security for basic skills Accredited Test Centres which currently numbers more than 500, and now spans 22 territories in Sub-Saharan Africa.

CONCLUSION Educating Internet users to be safer and more secure requires collaboration and effort from government agencies, private organisation, academia, civil society and users. No government agency can reach everyone or provide all the necessary requirements on it s own. The infrastructure of the internet is complex and requires all stakeholders to work together towards a common goal. Educating Internet users to be safer and more secure also gives them the trust and confidence in the use of ICTs and especially the more vulnerable people in our communities. There is an urgent need for a more coordinated and effective action in promoting IT Security Awareness & Training program across Africa and the rest of the world

REFERENCES Books Managing an Information Security and Privacy Awareness and Training Program ISBN 978-1439815458 Standards and Guidance NIST SP 800-50 Building an IT Security Awareness and Training Program

? Thank you