Security awareness

Security awareness is the knowledge and attitude members of an organization possess regarding the protection of the physical, and especially informational, assets of that organization. Many organizations require formal security awareness training for all workers when they join the organization and periodically thereafter, usually annually.[1]

Security awareness poster from World War II.
An equivalent 2000 warning about the web security awareness.

Coverage

Topics covered in security awareness training include:

  • The nature of sensitive material and physical assets they may come in contact with, such as trade secrets, privacy concerns and government classified information
  • Employee and contractor responsibilities in handling sensitive information, including review of employee nondisclosure agreements
  • Requirements for proper handling of sensitive material in physical form, including marking, transmission, storage and destruction
  • Proper methods for protecting sensitive information on computer systems, including password policy and use of two-factor authentication
  • Other computer security concerns, including malware, phishing, social engineering, etc.
  • Workplace security, including building access, wearing of security badges, reporting of incidents, forbidden articles, etc.
  • Consequences of failure to properly protect information, including potential loss of employment, economic consequences to the firm, damage to individuals whose private records are divulged, and possible civil and criminal penalties

Being security aware means you understand that there is the potential for some people to deliberately or accidentally steal, damage, or misuse the data that is stored within a company's computer systems and throughout its organization. Therefore, it would be prudent to support the assets of the institution (information, physical, and personal) by trying to stop that from happening.

According to the European Network and Information Security Agency, 'Awareness of the risks and available safeguards is the first line of defence for the security of information systems and networks.'[2]

'The focus of Security Awareness consultancy should be to achieve a long term shift in the attitude of employees towards security, whilst promoting a cultural and behavioural change within an organisation. Security policies should be viewed as key enablers for the organisation, not as a series of rules restricting the efficient working of your business.'

Measuring security awareness

A 2016 study developed a method of measuring security awareness [3]. Specifically they measured "understanding about circumventing security protocols, disrupting the intended functions of systems or collecting valuable information, and not getting caught" (p. 38). The researchers created a method that could distinguish between experts and novices by having people organize different security scenarios into groups. Experts will organize these scenarios based on centralized security themes where novices will organize the scenarios based on superficial themes.

gollark: PotatOS really should get a sensible IPC framework in it.
gollark: Oh, discord too, yes.
gollark: They refuse to use proprietary software except somehow they play Minecraft?
gollark: Terrariola. But they still don't understand it.
gollark: Terrariola. They're very annoying. They don't seem to understand it very well, but talk about how great it is.

See also

References

  1. Assenza, G. (2019). "A Review of Methods for Evaluating Security Awareness Initiatives". European Journal for Security Research. doi:10.1007/s41125-019-00052-x.
  2. "OECD Guidelines for the Security of Information Systems, 1992".
  3. Giboney, Justin Scott; Proudfoot, Jeffrey Gainer; Goel, Sanjay; Valacich, Joseph S (2016). "The Security Expertise Assessment Measure (SEAM): Developing a scale for hacker expertise". Computers & Security. 60: 37–51. doi:10.1016/j.cose.2016.04.001.
This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.