skip to main content
10.1145/1940941.1940970acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

Training general users on the non-policy side of the IS program

Published:01 October 2010Publication History

ABSTRACT

Once an information security program is put in place in an organization, the program needs to be managed and formal training needs to take place in order to get everyone to comply with the policies resulting from the program. Most of the training and education is conducted on these policies, but there is also a need to train users on some general good security practices, password management practices, access control management, and violation reporting that may not be part of the policies laid out by the information security program. This paper will focus on this aspect of the information security program training.

References

  1. ANTI-PHISHING WORKING GROUP. 2007. Anti-Phishing Working Group. Retrieved June 27, 2010 from: http://www.antiphishing.org/Google ScholarGoogle Scholar
  2. D., Sanok. 2005. An analysis of how antivirus methodologies are utilized in protecting computers from malicious code. Information Security Curriculum Development, 142--144. DOI= http://doi.acm.org/10.1145/1107622.1107655 Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. EBAY. 2006. Spoof email tutorial. Retrieved June 27, 2010 from: http://pages.ebay.com/education/spooftutorialGoogle ScholarGoogle Scholar
  4. FEDERAL TRADE COMMISSION. 2006. How not to get hooked by a phishing scam. Consumer alert news. http://www.ftc.gov/bcp/edu/pubs/consumer/alerts/alt127.htmGoogle ScholarGoogle Scholar
  5. General Services Administration, 1996. Telecommunications: Glossary of Telecommunication Terms. Retrieved June 25, 2010 from: http://www.its.bldrdoc.gov/fs-1037/other/a.pdfGoogle ScholarGoogle Scholar
  6. "Information Security." Title 44 U. S. Code, Sec. 3542. (2008), retrieved June 28, 2010 from: http://frwebgate.access.gpo.gov/cgi-bin/usc.cgi?ACTION=RETRIEVE&FILE=¿xa¿busc44.wais&start=1050213&SIZE=2782&TYPE=TEXTGoogle ScholarGoogle Scholar
  7. Internet Crime Complaint Center. 2009 Internet Crime Report. Available from www.ic3.gov/media/annualreport/2009_IC3Report.pdf; accessed 28 June 2010.Google ScholarGoogle Scholar
  8. J., Misra, and I., Saha. 2009. A Reinforcement Model for Collaborative Security and Its Formal Analysis. New Security Paradigms Workshop, 6, 101--114. DOI= http://doi.acm.org/10.1145/1719030.1719045 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. M., Liron. Windows Automatic Updates. Retrieved June 28, 2010 from: http://www.updatexp.com/windows-automatic-updates.htmlGoogle ScholarGoogle Scholar
  10. M., Whitman, and M. Mattord. Management of Information Security. Course Technology, Boston, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Microsoft, 2010. Create Strong Passwords. Retrieved June 28, 2010 from: http://www.microsoft.com/protect/fraud/passwords/create.aspxGoogle ScholarGoogle Scholar
  12. Microsoft. 2010. Firewalls: Frequently Asked Questions. Retrieved June 29, 2010 from: http://www.microsoft.com/security/firewalls/faq.aspxGoogle ScholarGoogle Scholar
  13. Microsoft. 2010. What is encryption?. Retrieved June 27, 2010 from: http://windows.microsoft.com/en-US/windows-vista/What-is-encryptionGoogle ScholarGoogle Scholar
  14. R., Richardson. 2009. CSI Computer Crime & Security Survey 2008. Retrieved June 27, 2010 from: http://i.cmpnet.com/v2.gocsi.com/pdf/CSIsurvey2008.pdfGoogle ScholarGoogle Scholar
  15. The Chinese University of Hong Kong, 2004. The DOs & DONT's checklist for protecting your digital data. Retrieved June 30, 2010 from: http://www.cuhk.edu.hk/itsc/security/gpis/prodatac.htmlGoogle ScholarGoogle Scholar

Index Terms

  1. Training general users on the non-policy side of the IS program

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Other conferences
            InfoSecCD '10: 2010 Information Security Curriculum Development Conference
            October 2010
            187 pages
            ISBN:9781450302029
            DOI:10.1145/1940941

            Copyright © 2010 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 1 October 2010

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate18of23submissions,78%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader