Sequential Label and Supply
nist sp 800-50, "Building an Information Technology Security Awareness and Training Program"
Sequential Label and Supply
After a recent failure of the computer systems at Sequential Label and Supply, it has become clear that current security provisions are inadequate
The IT security team is under-funded and understaffed
There is a lack of respect for the IT team
Problems are dealt with as they present themselves rather than are anticipated and prevented
Agency IT security policy
At present, there is no formal security policy and problems tend to be addressed on an ad hoc basis. For example, when a disc brought in by an employee infected all of the computers with a virus, the ability to use such software was disabled: no fundamental reforms were made
Awareness
There is a need to create a consistent, coherent security policy for the entire company, in all roles
Objectives include employee education and the development of a comprehensive security program to insure all employees act responsibly in regards to IT
Recent attacks to the company have placed it on high alert, although there remains a demonstrated reluctance to invest in IT security
Review and updating of materials and methods is required ASAP, as is a company-wide meeting on the topic of security; however training and education of all employees must be integrated into the regular schedule and standard operating processes of the company
Training-education
Role 1: Executives and managers
Learning Objectives
Both executives and managers must understand that IT security is not something that can be confined to the IT staff alone, but must be a pervasive, company-wide effort
Focus Areas
Evaluating priority areas using cost-benefit analysis
Methods/Activities
To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now