Griffith University指导老师 Hui TianMod 4-2Cyber Security Awareness ImprovementSocial Engineering and Security Awareness– Learn how to measure cyber awareness– Identify key things in a well-designed cybersecurity awareness training program– Develop a cyber awareness measurement questionnaire / an AUP with BYOD and WFH in considerationObjectivesCase Study Part 2:As a security officer, you need to make a “cyber security awareness improvement plan”for “The Good Guys”. A well-designed questionnaire for measuring cyber securityawareness and a well-designed AUP are all key components in improving cybersecurity awareness efficiently and contributes to a safe cyber environment in yourcompany with the best effort from everyone.– Use a well-designed questionnaire to measure a person’s security awareness– Force Acceptable Usage Policies (AUPs)– Google “phishing” images and use in training– Some companies move away from email, use groupware like Microsoft SharePoint– Use email proxies to stop phishing attacks before reaching endpoints– Design secure systems asking for identification and authorization– Policy state: employees do not confront suspects, but escalate suspicious people to security guardSecurity Awareness ImprovementDon’t just train, create a security awareness culture changeSocial Engineering and Security Awareness• An empirically validated survey instrument to assess the information securityawareness (ISA) of employees• Establishes areas where training and ISA programs need improvementHuman Aspects of Cybersecurity Questionnaire – Design Paradigmhttp://www.sciencedirect.com/science/article/pii/S01674048173000811. Pwd management2. Email use3. Internet use4. Social media use5. Mobile devices6. Information handling7. Incident reportingAIM: Develop an Adaptive Control Framework (ACF) to provide effective methods to communicate,educate and positively influence employees to improve their security awareness & behavior.Social Engineering and Security Awareness• What is it?• How to “measure” it?Information Security (InfoSec) AwarenessWhat a computer user knows about behaving safely whenusing a computer (Knowledge)What a computer user thinks about having to behaveAppropriately (Attitude)What a computer user says they do (Behaviour)Social Engineering and Security Awareness• What is it?• How to “measure” it?Information Security AwarenessSocial Engineering and Security Awareness• Designed for relevant people in your org• Cover all 7 domains as HAIS-Q-paper• Measure from aspects of knowledge,attitude and behavior• Come with a scoring standard and thedescription about the scoring rangeHAIS-Q Behaviours (Good, Bad, Neutral)• Use same password for everything• Click on links in dodgy emails• Leave a work computer unattended• Post sensitive info. on social media websites• Not consider the negative consequence when posting on a social network site• Sending work email using secure networks only• Work on a mobile device using public Wi-Fi• Insert foreign USB into work computer• Do not report security incidents at work• ……Information Security AwarenessSocial Engineering and Security AwarenessReport requirement for Case Study• 1. Title (followed by your name and student ID)• 2. Executive Summary• 3.1 Case description• 3.2 Security Operations (Choose two out of 3 topics)– Part 1: Privacy Impact Assessment– Part 2: Design a questionnaire (2905ICT) / Design an AUP policy (7905ICT)– Part 3: Risk Management and Governance• 4. Conclusion and ReflectionSocial Engineering and Security Awareness• AUP template 1-Acme.pdf at course site• https://www.sciencedirect.com/science/article/pii/S0167404817300081Resources
Related Posts
Question 1 Janet Brown is 45 and divorced. She has two children who live with her and are dependent on her. Stephen is 12. Sarah is 17 and has been certified as eligible for the disability credit. Janet’s financial information for 2019 and 2020 includes the following: 2020 2019 Salary and taxable benefits $105,000 $100,000 Car expenses deducted in computing employment income
Uncategorized / By
Scenario: You are employed by Pacific IT Solutions as a solutions integrator. Your job description is to implement IT solutions and provide customer support. One of your long-time customers, Western Mining, has their head office in Sydney and is opening a branch office in Brisbane. You have been contracted to setup the network. A meeting has been held to start the project. The minutes of the meeting are as follows:
Uncategorized / By