70 likes | 289 Views
Security awareness plan Federal infosec standards and regulations robert chubbuck / uat. Ryan Haidinger – 6/3/2012. Overview. This security awareness plan overview will document key information in order to create and execute successfully within a small business community.
E N D
Security awareness planFederal infosec standards and regulationsrobertchubbuck / uat Ryan Haidinger – 6/3/2012
Overview • This security awareness plan overview will document key information in order to create and execute successfully within a small business community. • It is important to remember, that in order to be successful, it requires a team effort. Employees should want to work together in order to prevent security issues from occurring.
Key Elements • There are various elements of a security awareness plan that must be taken into consideration before conceptualizing. • 1. Both Senior / Executive management must both support and encourage employees to meet security objectives for this new plan. • 2. Identification of team members who will be responsible for properly implementing security plan for the company. • 3. Security Awareness Plan must be properly documented and presented to users in a way in which to reinforce the idea through a series of presentations and community focus activities. • 4. Proper training must be administrators by department managers to employees who have questions or concerns regarding the document.
Primary Questions • The following are a list of questions which need to be explained before creating the security awareness plan. • 1. How will the security plan be implemented into the company and at what capacity? • 2. Does the security awareness plan account for visitors / new, yet known people at the office. • 3. Are there training scenarios setup already in place to deal with new security updates, or is security training an unknown concept at the office. • 4. What is the resource (time and cost) budget for this full implementation? • 5. Is it possible to implement a section of this plan, and than update as time progresses? (good for companies on a budget)
Company Issues • The following are a list of issues that this plan will hope to resolve once fully implemented within the company. • 1. Company network at risk of Virus/Trojan attack due to public access by employee computers. • 2. Private information being downloaded and taken away from the office (via media device) • 3. Increase the security of all employee passwords • 4. Increase training for all employees of security issues in order to spot possible fraudulent / risk situations. • 5. Increase the amount of security policies currently at use, and also rework current policies to be more in tune with our new system.
Benefits and Drawbacks • There are a few worthy benefits and drawbacks that need to be considered before going through with a plan such as this. • Pros • 1. Ability to train employees over new security mechanisms has the possibility of saving company tens of thousands of dollars in risk situations. • 2. Increase the overall security of the company by implementing strict policies and enforcing password authentication security. • 3. Stop non-employee users from accessing corporate network and potentially risking the flow of private information to outside of the office. • 4. Limit the use of personal media devices, which have the possibility of stealing outside information. • Cons • 1. If the company does not have a security team currently in place, than it may prove difficult to setup all of these new security adjustments. In which case a company might hire a contracted consultant. • 2. Employee training time can be generalized, but might have to be extended for users who are unfamiliar with technology or security products. • 3. The cost of actually implementing each feature will take considerable time resources away from other projects, in additional to an actual monetary figure for implementation.
References • Guest Contributor. (2004). Success strategies for security awareness. Available: http://www.techrepublic.com/article/success-strategies-for-security-awareness/5193710. Last accessed June 3, 2012. • Peltier, T. (2005). Implementing an Information Security Awareness Program. Available: http://www.infosectoday.com/IT%20Today/Peltier_awareness.pdf. Last accessed June 3, 2012. • securingthehumsourcean. (2012). Awareness Business Justification. Available: http://www.securingthehumsourcean.org/res/business-justification. Last accessed June 3, 2012.