Information Security Awareness Training. Course Outline. Provides a brief orientation to the topics covered in the module.

Similar documents
PCI Data Security Standard 3.0

NOS for IT User and Application Specialist. IT Security (ESKITU04) November 2014 V1.0

National Cyber Security Month 2015: Daily Security Awareness Tips

Cybersecurity Best Practices

Small businesses: What you need to know about cyber security

Business Case. for an. Information Security Awareness Program

Global Corporate IT Security Risks: 2013

External Supplier Control Requirements

Senaca Shield Presents 10 Top Tip For Small Business Cyber Security

Are You Ready for PCI 3.1?

Version: 2.0. Effective From: 28/11/2014

Monitoring and Logging Policy. Document Status. Security Classification. Level 1 - PUBLIC. Version 1.0. Approval. Review By June 2012

IA/CYBERSECURITY IS CRITICAL TO OPERATE IN CYBERSPACE

Mitigating and managing cyber risk: ten issues to consider

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Better secure IT equipment and systems

Information Security It s Everyone s Responsibility

Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO p f

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

Welcome to the Protecting Your Identity. Training Module

I D C A N A L Y S T C O N N E C T I O N

Cyber Security. John Leek Chief Strategist

Connect Smart for Business SME TOOLKIT

Better protection for customers, and recurring revenue for you!

What Data? I m A Trucking Company!

OCT Training & Technology Solutions Training@qc.cuny.edu (718)

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Cisco ASA 5500 Series Anti-X Edition for the Enterprise

Data Sheet: Vigilant Web Application Firewall. Where every interaction matters. Security-as-a-Service. Fully Managed Solution

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Information Security Awareness Training and Phishing

safe surfer seminar Martin Hellweg, Author

Bitrix Software Security. Powerful content management with advanced security features

NATIONAL CYBER SECURITY AWARENESS MONTH

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Host/Platform Security. Module 11

Mobile Devices: Know the RISKS. Take the STEPS. PROTECT AND SECURE Health Information.

A Bring-Your-Own-Device (BYOD) Solution Brief

Best Practices Guide to Electronic Banking

Cyber Security Awareness. Internet Safety Intro.

Report on CAP Cybersecurity November 5, 2015

DATA BREACH COVERAGE

A Small Business Approach to Big Business Cyber Security. Brent Bettis, CISSP 23 September, 2014

SMALL BUSINESS IT SECURITY PRACTICAL GUIDE

Cyber Essentials Scheme

developing your potential Cyber Security Training

SecureAge SecureDs Data Breach Prevention Solution

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Data Security 101. Christopher M. Brubaker. A Lawyer s Guide to Ethical Issues in the Digital Age. cbrubaker@clarkhill.com

Business Internet Banking / Cash Management Fraud Prevention Best Practices

Business ebanking Fraud Prevention Best Practices

Cyber Security An Exercise in Predicting the Future

Cisco ASA 5500 Series Content Security Edition for the Enterprise

anomaly, thus reported to our central servers.

Cybersecurity. Are you prepared?

Course 4202: Fraud Awareness and Cyber Security Workshop (3 days)

SIMULATED ATTACKS. Evaluate Susceptibility Using PhishGuru, SmishGuru, and USBGuru MEASURE ASSESS

A practical guide to IT security

Performing Advanced Incident Response Interactive Exercise

Cyber Self Assessment

Global IT Security Risks

Unit 3 Cyber security

Deploying Firewalls Throughout Your Organization

2012 Endpoint Security Best Practices Survey

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

10 Smart Ideas for. Keeping Data Safe. From Hackers

Information Security Baseline (minimal measures)

Top 10 Tips to Keep Your Small Business Safe

Transcription:

Information Security Awareness Training Course Outline Module 1 Information security risks 1. explain what information security means. 2. define the four aspects of information security. 3. understand their role in supporting information security. Section 1.1 Welcome Section 1.2 What is information security? Introduces the concept of information security in practical terms with reference to the everyday workplace environment. Section 1.3 Why is information security important? Gives an overview of the importance of information security awareness. Section 1.4 Consequences of security breaches Provides examples of some of the negative outcomes that can result from information security breaches. Section 1.5 The essential role you play Highlights the importance of everyone in the workplace doing their part to support information security policies and procedures. Section 1.6 Summary Section 1.7 Assessment 1

Module 2 Physical security The first aspect of information security covered in the course is physical security. Participants successfully completing this module should be able to: 1. define what is meant by physical security. 2. give examples of physical security measures in the workplace. 3. list some good work habits that help maintain physical security. Section 2.1 Welcome Section 2.2 Physical security in the workplace Explains what is meant by physical security with examples relevant to the workplace environment. Section 2.3 Security-conscious work habits Highlights the importance of developing good work habits that help to maintain physical security. Section 2.4 Physical security outside the workplace Outlines some of the information security risks that can be encountered when working outside the workplace, for example working from home or travelling to other locations. Section 2.5 Risks of carrying electronic devices Explains some of the particular risks that are associated with carrying electronic devices such as smartphones. Section 2.6 Summary Section 2.7 Assessment 2

Module 3 Computer and network security The second aspect of information security covered in the course is computer and network security. 1. recognise the importance of complying with computer and network policies. 2. list some examples of the risks posed by computers and networks. 3. explain the meaning of technical terms such as virus, malware, encryption and firewall. 4. understand the importance of reporting and responding to security incidents quickly. Section 3.1 Welcome Section 3.2 Your computer and network policies Emphasises the importance of following the proper workplace policies and procedures, even if the reasons for them are not understood. Section 3.3 Understanding information technologies Gives a non-technical explanation of key terms related to computers and computer networks. Section 3.4 Reporting incidents or concerns Highlights the importance of reporting computer and network security issues and responding quickly. Section 3.5 Summary Section 3.6 Assessment 3

Module 4 Communications security The third aspect of information security covered in the course is communications security. 1. recognize what is meant by communications security. 2. explain some of the particular risks associated with email. 3. put into practice some tips to avoid communications security breaches. Section 4.1 Welcome Section 4.2 Communications security Introduces the concept of communications security with examples of what it covers. Section 4.3 The risks of email Highlights the risks that can be posed by email use, such as malicious attachments, misleading links, and phishing attacks. Section 4.4 Communicating outside the workplace Looks at some information security risks to be aware of when communicating outside the workplace (for example, working from home or in public places). Section 4.5 Summary Section 4.6 Assessment 4

Module 5 Personnel security The fourth aspect of information security covered in the course is personnel security. 1. explain what is meant by personnel security. 2. list the main areas of risk associated with personnel security. 3. understand what social engineering is, and recognise the threat is can pose. 4. be aware of the risk that deliberate acts by personnel can cause security breaches. Section 5.1 Welcome Section 5.2 What is personnel security Introduces the concept of personnel security and outlines four main areas of risk associated with it. Section 5.3 Social engineering Explains the concept of social engineering and how it can be used to breach information security. Section 5.4 Security procedures Makes the point that a significant proportion of security breaches are caused by personnel failing to follow correct procedures. Section 5.5 Deliberate acts Highlights the fact that there is a risk posed by personnel deliberately acting in ways that breach security, and that everyone should be alert to this risk. Section 5.6 Summary Section 5.7 Assessment 5