You are on page 1of 15

INFORMATION SECURITY

AWARENESS

SECURITY AWARENESS
AWARENESS FOR EVERYONE
RATIONALE FOR
SECURITY AWARENESS

• When we leave for


work in the morning,
we automatically lock
our doors.
• We need to have the
same automatic locks
for our computers.
IDENTIFY THE POPULATION

• Home users
• Reception area
• End users
• IT departments
• Management
• Executives
IS YOUR ORGANIZATION SECURE?
IF YOU DO NOT REACT QUICKLY
YOUR SECURITY WILL WASH AWAY
IN THE WORKPLACE

• The reception area is


the first line in defense
for many companies,
and as such they need
to add to the basic
users’ skill set:
• Physical security
• Social Engineering
END USER NEEDS

• All end users need to


understand the same
issues.
• How will these issues
affect their employers:
• Social engineering
• Digital Rights
Management (DRM)
including piracy
INFORMATION TECHNOLOGY NEEDS

• IT departments’ needs
build on the previous
groups with the
additions:
• Network security
• Writing secure code

Protected By People
MANAGEMENT NEEDS

• Managers must
understanding of “why”
security to make good
management choices
• Social Engineering
• Unauthorized removal of
information
• Employee Security
• Digital Right Management
EXECUTIVE

• Executives need to
understand that they
are ultimately
responsible for the
security of their
company.
• Laptop security
• Legal Issues
ENTERPRISE LEVEL SECURITY

• Enterprise security is the overarching umbrella for security


needs.
• Policies and procedures
• Incidence response
• Emerging technologies such as biometrics
IDENTIFY COUNTERMEASURES - 3

• Newsletters and news clipping services


• Brownbag lunches
• Computer Based Training (CBT)
• Instructor lead sessions
• Security fairs
• Posters
• Knick-knacks
IDENTIFY BROWNBAG TOPICS -4

• Pornography • Cell phones


• Coding • PDAs
• E-mail Issues • Spam
• Networks • Patch Management
• Passwords • DRM
• Physical Security • HIPPA
• WiFi use • Biometrics
TOPICS CONTINUED:

• Cryptography
• Social Engineering
• Physical security
• Unauthorized Removal of Information
• General and Specific Legal Issues
• Laptop Security
• Anti-virus Issues, Worms, and Trojan Horses

You might also like