However, as Kolb and Abdullah reiterate, "security awareness is not about training but rather designed to change employee behavior" (105).
A program concerning security awareness should work in conjunction with the information technology software and hardware JCS utilizes. In this way, it mitigates the risks and threats to the organization. Security awareness is a defensive layer to the information system's overall security structure. Although not a training program, per se, security awareness does provide education to the end users at JCS, regarding the information security threats the organization faces, and the role that these end users play.
Culnan, Foxman and Ray make note that all employees who are in any way involved with the company's IT systems, should be made aware of the possible security threats. In addition, security awareness includes an understanding of security basics, with a general security literacy. Training is underpinned by security basics and literacy, through providing a base of knowledge regarding key security concepts as well as security vocabulary.
The definition of security awareness does not simply apply to being aware of the challenges of information security at the JCS office, it also includes off-site challenges as well. Culnan, Foxman and Ray note that with the distributed computing environment used by JCS today, the threat of security breaches from outside JCS's boundaries has increased. The researchers' study found that employee security awareness and training programs can have a positive impact on off-site computer security. For this reason, the definition of security awareness has to include building knowledge regarding information security threats that also occur at home, coffee shops, hotels, airports, or other places. Security awareness will become part of JCS's comprehensive risk management strategies.
As the NIST notes, people are fallible, as such security awareness enhances security. Components of awareness include developing the employee's skills and knowledge so they can perform their jobs more securely, increase their awareness about the need to protect system resources, and build knowledge so they can implement or operate security programs for their organization. As the NIST succinctly puts it,
Making computer system users aware of their security responsibilities and teaching them correct practices helps users change their behavior. It also supports individual accountability, which is one of the most important ways to improve computer security. Without knowing the necessary security measures
(and how to use them), users cannot be truly accountable for their actions ("An
Introduction" 145).
Development/Designing Awareness:
Any organization can have cutting edge, network and hardware security protection, according to Kolb and Abdullah. However, it only takes one uneducated JCS employee to unintentionally publish confidential, organization data or to download a virus that can compromise all of the organization's systems. No matter how secure JCS's network may be, it's only as secure as its weakest link -- the end user (Emm). Whether errors are made intentionally or unintentionally, the security incidents caused by these errors justifies the need for a security awareness program. Wilson and Hash note that there are three major facets in the development of a security awareness program. These are designing the program, developing the awareness training material and implementing the program.
The development and design of a security awareness program for JCS begins with an inventory of the critical information that the organization holds. Also, a review of JCS's organizational policies regarding who has access to this sensitive information and how the information is access must be performed (Culnan, Foxman & Ray). Kolb and Abdullah note that the designed for JCS's security awareness program should be centered on publicizing the policies and procedures regarding the organization's information security. The design must also educate users the importance that these policies and procedures need to be followed uniformly, by all employees, and the expectations JCS has about their employees.
Culnan, Foxman and Ray give examples of issues the security awareness program design and development team needs to take into consideration, when developing the program. These include:
Who should be responsible for developing the programs?
Whether the programs should be outsourced or developed in-house.
Whether to deliver the programs in the classroom or online
How to measure the effectiveness of the programs (52).
As Wilson and Hash note, there are two very important questions that the design and development team need to ask themselves as well. What behaviors do they want to reinforce? What skills do they want the JCS employees to learn? These questions will help JCS determine some of the basic design aspects of the security awareness program they will be developing.
Another step that should happen...
Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are
SECURITY and PRIVACY - the following security and privacy requirements apply: The Office does not accept responsibility for the privacy, confidentiality or security of data or information not generated by this office or transmitted from external sources into the system. The Office does not accept responsibility for loss, corruption, misdirection or delays in transmission of personal data through the system. Users are responsible for the integrity of all data and
Phishing Spear Phishing and Pharming The following is intended to provide a very brief overview of examples of some the most dangerous and pervasive security risks in the online and networked world. One of the most insidious of identity theft is known as phishing. The term 'phishing' refers to the practice of "fishing for information." This term was originally used to describe "phishing" for credit card numbers and other sensitive information
Social Security Company Network Security Policy This paper is intended to address the importance of having a written and enforceable Computer Network Security Policy for The Financial Group, an accounting corporation. The company's accounting systems comprise three major elements: a Web-based front-end server, a back-end database, and business-logic applications. OS-level console access is used for system administration. Accountants access the system with Web browsers using HTTP only and are authenticated via the
UN Security Council Proliferation of chemical, biological and nuclear weapons to terrorist organizations is inarguably one of the greatest menaces threatening international peace and security today.[footnoteRef:1] Since the turn of the century, this sentiment has grown in strength across the world, and as a countermeasure to this threat, in 2004, the United Nations Security Council passed Resolution 1540 to combat the dangerous nexus between the spread of weapons of mass destruction
Social Engineering and Information Security We are in an age of information explosion and one of the most critical problems facing us is the security and proper management of information. Advanced hardware and software solutions are being constantly developed and refined to patch up any technical loopholes that might allow a hacker attack and prevent consequent breach of information security. While this technical warfare continues, hackers are now pursuing other vectors
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now