Training of Information Security for Common Users Dr. Francisco Eduardo Rivera FAA SALT Conference, February 18, 2004.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

CS898T Mobile and Wireless Network Handheld Device Security By Yuan Chen July 25 th, 2005.
Develop an Information Strategy Plan
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Hands-On Ethical Hacking and Network Defense
Security Controls – What Works
8.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Chapter 12 Strategies for Managing the Technology Infrastructure.
If this is the information superhighway, it’s
Introduction to Systems Analysis and Design
Security Certification
Session 3 – Information Security Policies
Copyright © Center for Systems Security and Information Assurance Lesson Eight Security Management.
Chapter 13 Organizing Information System Resources MIS Department Centralization and Decentralization Outsourcing Computer Facilities and Services.
SecureAware Building an Information Security Management System.
SEC835 Database and Web application security Information Security Architecture.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Implementing Security Education, Training, and Awareness Programs
Cybersecurity nexus (CSX)
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
1 Introduction to Information Security. 2 Historical aspects of InfoSec Critical characteristics of information CNSS security model Systems development.
1 As a public interest company, MITRE works in partnership with the government to address issues of critical national
ETHICS & Information Security Issues
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Information Systems in Organizations 3.2 Systems Management.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
OBJECT ORIENTED SYSTEM ANALYSIS AND DESIGN. COURSE OUTLINE The world of the Information Systems Analyst Approaches to System Development The Analyst as.
Information Security Research and Education Network INSuRE Dr. Melissa Dark Purdue University Award #
LEONARDO DA VINCI PROGRAMME PL/04/B/F/PP – _________________________________________________________________________ European Curricula for Economic.
Delivering e-Security Education through e-Learning V.K.Sharma Lakshmi Kalyani CDAC, Noida.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
Information Systems Security New Faculty Orientation Day Queen’s University August 2011 George Farah, GIAC/GSEC Gold, CRISC, CISA University Information.
Federal Information Security Management Act (FISMA) By K. Brenner OCIO Internship Summer 2013.
Topic 5: Basic Security.
Chapter 11 Managing Application Development. Agenda Application management framework Application management issues Criteria for development approach Development.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
CSCE 548 Secure Software Development Security Operations.
Policies and Procedures Security+ Guide to Network Security Fundamentals Chapter 11.
New A.M. Best Cyber Questionnaire
SecSDLC Chapter 2.
1 1 Cybersecurity : Optimal Approach for PSAPs FCC Task Force on Optimal PSAP Architecture Working Group 1 Final Report December 10 th, 2015.
Information Systems in Organizations 3.2 Systems Management.
INFORMATION SECURITY AWARENESS Whose Job is it Anyway? Ron Freedman Ron Freedman Vice President VCampus Corporation Scott Wright Scott WrightPresident.
Computer Security By Duncan Hall.
Information Systems in Organizations 3.2 Systems Management.
Author: M.A. Álvarez & T. Arzuaga CG AutomationNovember 2013 D2-02_12 Comprehensive Cybersecurity strategy for Smartgrid equipment manufacturers SC D2.
Safe’n’Sec IT security solutions for enterprises of any size.
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Security Education, Training, and Awareness Programs Jeff Summits.
MANAGEMENT of INFORMATION SECURITY Third Edition C HAPTER 1 I NTRODUCTION TO THE M ANAGEMENT OF I NFORMATION S ECURITY If this is the information superhighway,
Implementing Security Education, Training, and Awareness Programs By: Joseph Flynn.
Information Security Principles and Practices by Mark Merkow and Jim Breithaupt Chapter 1: Why Study Information Security?
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part I.
CISSP-Certified Information Systems Security Professional Presented By Passin1day.com
Slide 1 MANAGEMENT OF INFORMATION SECURITY  “ If this is the information superhighway, it is going through a bad, bad neighborhoods” Dorian Berger, 1997.
New A.M. Best Cyber Questionnaire
Cyber Warfare and Importance of Cyber Awareness
Information Systems Sarika Agarwal.
UNIT I INTRODUCTION Growing IT Security Importance and New Career Opportunities – Becoming an Information Security Specialist – Conceptualizing.
Year 10 ICT ECDL/ICDL IT Security.
Careers in IT.
I have many checklists: how do I get started with cyber security?
CLOUD COMPUTING SECURITY
Information governance and information security
Security week 1 Introductions Class website Syllabus review
Unit # 1: Overview of the Course Dr. Bhavani Thuraisingham
Presentation transcript:

Training of Information Security for Common Users Dr. Francisco Eduardo Rivera FAA SALT Conference, February 18, 2004

2 Overview What is training of IS Importance and Background Common Final Users, The Problem Approaches Re-orientation Awareness, Support and Responsibility The scenario approach Conclusion

3 What is Information Security Training? It is not a computer literate training It is not an academic course It is not just for new employees It is not another training It is an urgency! It must be part of the essential policy of the organization

4 InfoSec or Cybersecurity training? Not only for IT experts All workers dealing with Information Cover all aspects Prevention oriented rather than Remedial oriented Practical approach rather than theory Continuously

5 Information security, what for? Protecting assets: Information resources, including computing time and memory destruction alteration corruption misuse Steal of information Avoiding Intruders Keeping Confidentiality and Privacy

6 Possible Consequences Enormous potential costs if Information security is breached Liability Loss of competitive advantages Image damage National interest

7 Information Security has changed From teen hackers To serious and professional hackers Information war The number and quality of attacks Is growing rapidly The speed of spread is growing Distributed and evolving attacks

8 A growing discipline? Maturity The experience The complexity of subject The coverage and inter-discipline The technical details The changing environment More than 500 enterprises Expenditures of more than $5 billion/year

9 Cybersecurity Many organizations involved ACM, NIST, CSI, ISACA, IEEE, ISOC, ISSA, SANS etc. More than 300 universities programs Specialized training and certifications CISSP, CISA, CISM, SSCP, Security+, SCP, GIAC, TICSA A czar, federal agencies: DHA, NSA, OMB, Information Security Act,…

10 The problem The security strength is the strength of the weakest part Traditional: high security in Computer Centers Traditional: centralized control of security management and operations Traditional: users only deal with internal data and no external connection

11 The problem (continuation) The Internet as The extended information resource The standard way of communication The use of network bandwidth for other purposes The connectivity w/Internet Present version is intrinsically insecure The new unsecured wireless networks The holes in operating systems

12 Common Final User Is the employee who manage corporate information through computers and networks, but is not in charge of the function of systems, programs, networks and equipment He/she is not an expert He/she is computer literate Is the most important resource in the organization followed by information

13 General Training Approaches Mission oriented Global covering Cost effective oriented But in the case of Information Security Sense of urgency Implications Practical aspects

14 Specific Training approaches Information classification – mostly academic Information Systems Development Cycle (SDLC) – mostly professional organizations Standards and Models – mostly certification organizations Around specific software packages

15 The NIST approach Security Education, Training and Awareness SETA To divide in three levels of depth Education – Curriculum Training – Organization Awareness – Final users

16 Re-orientation Awareness is not enough! What is important in security? Basic understanding Motivation Basic what to do and what not to do Where to go Recognize problems and importance Prevent Follow Policies

17 Our approach Similar to INIST But some training is also for Final users Based on Awareness, Support and Responsibility

18 Integration Awareness Support Responsibility Prevention through Policies Practical Knowledge Motivation

19 Motivation “Raison d’être” For the organization For the department For his/her specific position Improve system Detect problems Understanding of implications The cost of not doing

20 Prevention It needs responsibility Follow strictly the policies Do some routine tasks Periodical Review Backup Upgrade It needs support from IT and other users

21 Practical Knowledge Identify problems Levels of risk Open to suggestions How to do Passwords Network identification Who to address in case of problem and what to do ( and not to do)

22 Responsibility The new element Who is the owner of information? Final user is not a user but he/she is co-responsible of: Data Management of data Basic security and accessibility

23 The Scenario Approach The field is so large Less technical information and more decision making abilities What are the basic cases? Simple to Complex problems Interaction with other users Rapid response

24 Scenarios (in plural) Illustrate with practical real cases Many variants To identify key issues When to explore? More than one right answer Interactive discussion Graphical presentation

25 Conclusion InfoSec Training is and investment Need to Review periodically To update with new problems Challenging user attitudes in: awareness, support and responsibility Use Plain Language The user is an integral part of the solution

26 Questions ? Comments?