You are on page 1of 5

Security Awareness Importance

! " #!
+ $ * $% ! & ' ( )'

, ! $ - $ ) . /0. 1 $ 2!
+3 40 1 54 ' 6 7 ,

+3 2 $ - ! ( 8
+ ;. " ! : & ' ". & / ! "9 " 8
[9][1][2][5]+< ! / = ! ! 6 8

@ . $ $ 2 ' ' . >


5? 9 8 / !
+ $
+ A $9 A < 8
+DoS . / "! 8
+3 B < / C " D B < ! 7 E= & 8
+ 54 ' 8
: 'F 8
I' < < H G ( B 7 .= / 6" . / ;
+ 'F /0. ' ; (E ?JD

? 4' ! / / = / E C" )' #! 3


+ $ % < ? 'F < C " A 8 :@ . $
2 .K J
G ( 7.= /E E $ . & ' ( * ) 8
+I++ / " $ L ' H / A + @
@ 4 L ". @ ) 2 #! ;! & ! ' $ /! E
+ $ &

"# $% !
+, ! $ 2 /! B 7 .= E 8
+E = M" / ! 6 < ! 0! 8
+ $ >. < ! 3 9 8
C 9 < E /E = 29 * D <$ 0 " /E = / ' 8
+ $ 5 E 6 .
+ ' $ 2 <0 ! .N < ( / ! / ' 8

( )* + & '
2 $ /0. < ! $ - ! @ = 6 2 )'
5 /E O 5 ; 2 9 ;F L $ E L " $ G ! $ < E
[6]+(Password GuessingH+ ' G EJ2
, ' +
3 ) &' L ! $ 2 )' < '
& ' 4 9 ! P" EQ $ * / R'F * ; 6 ?4' S > < !
< ! 5 4 @ & $ E2 C "
+ $ @ G9+ $ C

[10].I H /E=

! ) 29 ;F $ @ " & ' )' •

:) 1
< " $ ( 1 ) /' ! ! ! 9
' ; < ! " ( < ! > < 40
+< !
: $ ? 4'- O 0
L< ? 'F L< : > ! O 29 $ ! )"
)' 5 4 < ! 3 P/ O= $ ! O P B
+ " ' / ! ".

[2] - I H /E=

: < !
< D $ )' < ! < ! ! •
: . 3 9 L< ! 3 7 " > ?" 9

)0" 7 .= / > ; /0. < B0 ! E " =<
> . >.= " ' E ! '
< F - E < E = #! ( L3
>. 4 < 2 $ >.= < 2 9 ;F
< (I H ' /E 2 ) = T0 / < <" < E
C0"9 2 9 3 ! 5 4 & 3 =J ! ' D < B0
< ; I C (H /! 3 )0"
7 > ' 5 ; & >.= E E H /( < ! 5
:/ Q ' '2 % ! U > I C ( B 7 .=
>.= 7 > E J )0" 2 H
= ; (E E 5 . )0" ! ' Q6 ;
E >.= 0. E C " ' < E )0" $! 29
" <$ 0 5 > E = ? .
! 4 J 5 ;& 6J < " 4 J & '
6 )0" < E < E ) E #! 2
V . ! J ? . ) " E E $ >
7 > / ! / /4 ! ' ? >. < < EE
0 V /(
4 5 ;& <0 ! C ! C 29 )' )0" ;
/0. < S > 2 9 ;F <0 /0 6 9/
2 1 . & < 3 ) " >.= E- ! J9 < F
2 E > . /4 ! ' /. ? >. <
< 9 ! ' =! & / " < F E= />
E ; ! E 9 29 = " & J < 2 > . )0"
7 > ) ' H ! <! ' < E < ; L ; = /0.
< < " < E LQ 6 ? ; )0" > . < ,
! ' ! > . >.= < (E 2 * * > 7
D (E $ ( ; = /6 # !
54 ' 3 2 = 5 ;

: @ / ' 4 0
' @

< F 5J

[11]I H/E=

"
: 5 .
&; 5 4 $ Q @ & ) @ . <E = $ !
5 . * 2 G> $ 2 E +< F > <E= @ ! "
+M @ = 5 W

: .
: C 7.
+ $ & ' < ! 3 95 ; •
+" ) ' Q •
+ < E 8 :& ' ! •
+ <X= 8
+ > >. 1 C 8
+V ++++ 'F < ' 8

#
References :

[1] C. Office of Technology, "Security Awareness Newsletter", COT Division of Security


services, October 2004, volumeII, Issue 4.

[2] Commonwealth Office of Technology,http://gotsource.ky.gov/dsweb/get/document-


40461/SA+NewsLetter, , published by the COT Division of Security Services, October 2004,
Volume II, Issue 4

[3] M. CIAMPA ,"Security+ guide to network security fundamentals", 2nd edition,


Canada: Course Technology, 2005.

http://www.al-jazirah.com.sa/digimag/02012005/wr37.htm[4]

[5] A. Mohammed,"Aljazirah Office : Security Awareness" ,Cairo, 2002.

[6] security focus, www.securityfocus.com/archieve/132/353712, protecting password, message


to security management, US-CERT securityawareness tips, Feb 12 2004.

[7]Semantic Corporation, April 23 2005,


http://securityresponse.symantic.com/avcenter/security/content/security.articles/corp.security.poli
cy.html.

[8] azgita gov, April 5 2004,


http://azgita.gov/policies_standards/html/p800_s895_security_trng.htm.

[9] Insight company, april 23 2005, http://www.insight.co.uk/training/training.htm

[10]http://securityresponse.symantec.com/avcenter/security/Content/security.articles/corp.securit
y.policy.html
[11] Infosec corporation, april 23
2005,http://www.infosec.co.uk/ExhibitorLibrary/131/ProactiveNetworkSecurity.pdf, Circle
Proactive Network Security.

You might also like