Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

respond to discussion 4CR

Respond

Sonia

Discussion #4 – Governance Policies

The concepts of “2.1 Cyber Security Awareness (CSA)” and “2.2 Cyber Security Knowledge Sharing (SKS)” are intricately linked to the Security Awareness Policy.  

Cyber Security Awareness (CSA) is defined in the text as users possessing knowledge and a strong dedication to security. The CSA is indispensable to the cyber security efforts of organizations. Since employee security knowledge varies, it is critical to comprehend cybersecurity best practices.  Adhering to CSA principles, the Security Awareness policy emphasizes employee security commitment and awareness (Alahmari et al., 2022). Conventional training programs are employed to enhance the knowledge of employees. Presentations, workshops, multimedia, email reminders, and screen savers are all provided by these applications. Clear screen policies, password protection, and phishing prevention are suggested as ways to enhance CSA. In support of educating personnel about security policies and best practices, the Security Awareness policy may advocate for and coordinate the execution of training plans (Alahmari et al., 2022).

Notwithstanding uncertainties regarding its effectiveness, Security Awareness Training (SAT) continues to be emphasized as a means of mitigating cybersecurity risks. It emphasizes well-designed training methods with technical solutions, placing security as a secondary objective. According to research, the SAT could aid users in detecting and preventing fraud. Security Education, Training, and Awareness (SETA) programs are examined for their ability to avert security breaches resulting from employee ignorance. Additionally, SAT is suggested for preventing ransomware attacks that encrypt user files. International security organizations such as ISO and NIST deem this technique indispensable (Al-Daeef et al., 2016).

Sharing of Cybersecurity Knowledge (SKS)

  The passage examines Cyber Security Knowledge Sharing (SKS) and emphasizes the significance of instilling information to foster learning. SKS stresses the value of collaboration in the pursuit of cyber security objectives. Security Awareness promotes knowledge sharing among personnel to enhance cyber security. Cyber Security Awareness and Knowledge Sharing are concepts that are reflected in the Security Awareness policy. Enhancing an organization’s cyber security requires employee awareness, training, technological expertise, and collaborative knowledge sharing (Alahmari et al., 2022).

A comprehensive manual on developing an IT security awareness and training program is offered in NIST SP-800.50. The intent and scope of the program outlined in this document established a structure for its advancement and underscored the significance of organizational responsibilities and roles. Training in the classroom, online, and through hands-on experience was also covered. The authors prioritized the importance of consistent program alignment with the values of the organization and ongoing enhancement. The guide emphasized evaluating the program’s effect on cybersecurity awareness and integrating it into the company culture (Wilson et al., 2003).

Constructing a Cybersecurity Culture

According to the text, a cyber security culture could aid in addressing human-related cyber security vulnerabilities. By emphasizing collaboration and knowledge sharing, the Security Awareness policy fosters a robust cyber security culture within the organization (Alahmari et al., 2022).  The Security Awareness and Training Policy at Virginia State University (VSU) outlined guidelines for IT system managers, administrators, and users to ensure the proper protection of university systems and data. The policy addressed various aspects including roles, responsibilities, management commitment, data disposal, coordination, and compliance, with a particular emphasis on sensitive system and data matters. All employees were required to complete security awareness training for the use of VSU information technology resources. Refresher courses were also provided annually. The Technology Services department is responsible for implementing information security awareness and training best practices, which involve continuous training, effective communication, and monitoring compliance (Purpose – Virginia State University 2017).

The choice of Cyber Security Awareness policy and information sources is closely linked to social engineering.  Understanding and implementing a cybersecurity awareness policy is crucial for effectively defending against social engineering attacks. It equips individuals with knowledge, fosters a mindset focused on security, and offers practical tools to effectively identify and address social engineering threats. At Virginia State University, students and staff can introduce cybersecurity risks through their actions, such as clicking on malicious links or neglecting security best practices. An effectively implemented policy fosters a culture of cybersecurity, enabling security personnel to identify and address potential threats. Adhering to regulations is crucial for any organization in preventing penalties and protecting its reputation. A policy also empowers employees with the expertise and capabilities to detect and prevent social engineering attacks, ensuring that unauthorized access and information compromise are effectively thwarted. It fosters a culture of security awareness, making it more difficult for malicious individuals to take advantage of weaknesses.

 

Jason

Effectiveness of information security awareness methods based on psychological theories 
by Bilal Khan1 , Khaled S. Alghathbar1, 2 , Syed Irfan Nabi1,3 and Muhammad Khurram Khan1  Accepted 24 March, 2011
African Journal of Business Management Vol. 5(26), pp. 10862-10868, 28 October, 2011 Available online at DOI: 10.5897/AJBM11.067 ISSN 1993-8233 ©2011 Academic Journals

Khan et al. (2011)  evaluate the effectiveness of different information security awareness tools and techniques using psychological theories and models as a frame of reference. They also describe how to measure information security awareness in an organization.

They drew on Namjoo et al.’s (2008) definition of Information security awareness, where they defined information security as the individual’s passive involvement and increased interest in certain issues a key component being consciousness-raising and action.

Another strong definition cited by Khan et al ., 2011  was from the Information Security Forum (2003),  it stated that information security awareness can also be defined as “the extent to which every member of staff understands the importance of information security, the levels of information security appropriate to the organization, their security responsibilities, and acts accordingly” (Security Forum, 2003).

The research conducted by Kahn et. al.,  evaluated the effectiveness of information security awareness interventions. They proposed a five step stair model. The steps include: 

1.    Knowledge about information security
2.    Attitude towards information security
3.    Normative belief towards information security 
4.    Intention for Information security
5.    Information security (IS) behavior

Their study also evaluated the effectiveness of information security tools . The following presents a summary of the effectiveness of each tool by (Khan et al., 2011)

1) Educational presentation – “Education is often seen as the key to changing behavior. Different types of awareness campaigns are based on different psychological theories that focus on different aspects of human psychology. Usually the education campaigns target the knowledge aspect of the human and it ignores the motive behind the human behavior”
(Khan et al., 2011).

2) E-mail messaging – “One type of campaign for information security awareness is email messaging. These messages disseminate useful information regarding phishing, social engineering, password management and information security incidents. This method is effective in providing security related information and hence increases information security knowledge of the recipient” (Khan et al., 2011).

3) Group discussions – “One type of information security awareness intervention is an informal meeting in which there is no one way communication. In this meeting, about 15-20 individuals of an organization participate and the participants take full advantage of sharing knowledge and experience” (Albrechsten & Hovden 2010).

4) Newsletter articles – “Newsletter is a monthly or quarterly one to four pages information security report. These reports can be both in electronic or print format. They are distributed among security awareness training. The employees of the organization can acquire the desired training at their own pace” (Khan et al., 2011).

5) Video games – “It is claimed by the researchers that video game is a good technique in motivating players towards adapting the desired behavior as it catches the player’s attention and engages him. However, this method does not have a component of knowledge transfer unless the player has already gained the information security knowledge before starting the game” (Khan et al., 2011).

6) Computer-based training (CBT)- “Computer-based training has several advantages over conventional methods of information security awareness. CBT is available at all times to all employees within the organization and it is an effective method of information making, improve performance and accountability and help determine an organization’s information technology (IT) security awareness and training” ( Khan et al., 2011).

 7) Posters- “Posters are simple and effective reminders of information security that catch end user attention and remind them of basic information security rules. Posters require fewer resources. Catchy slogans and attractive designs greatly contribute to the effectiveness of posters”(Khan et al., 2011).


It was noted in the discussion that “it is beneficial to find out the number of phishing e-mails that have been opened by the employees of the organization. The number of phishing e-mails accessed shows the level of information security awareness. The more is the number of phishing e-mails accessed, the less the level of awareness” (Khan et al., 2011).

Emphasized in the discussion was that “Information security awareness can also be measured by counting the number of security incidents being reported. It also indicates the awareness of the user who knows the person to contact when an information security incident occurs.”

In conclusion the authors noted that “the aim of many information security campaigns is to increase information security knowledge. However Many post-campaign surveys ask questions focusing mainly on the knowledge of the participant and do not assess user’s information security behavior” (Khan et al., 2011).

Supplemental Source
The Springfield Technical Community College Information Security Awareness Policy

According to the Springfield Technical Community College Information Security Awareness Policy, (STCC) its purpose is to implement information security best practices and to comply with federal and state laws and regulations related to Information Security Awareness Training. 

The policy is also used to educate users on their responsibility to help protect the confidentiality, availability and integrity of STCC’s information assets and to ensure that all personnel are trained on relevant rules, regulations, and best practices for cybersecurity.

The purpose in this policy aligns with the research conducted by Khan et. al., as they emphasized the importance of educating users about information security awareness. Education was also seen  as the key to changing behavior.

The policy also speaks to educating users on cyber security topics, including but not limited to: 
-Virus or malicious software (Malware) 
-Phishing attempts 
-Social engineering 
-Application / Operating system vulnerabilities

Khan et al. (2011)also emphasized this in their research where they noted “it is beneficial to find out the number of phishing e-mails that have been opened by the employees of the organization . 

Rationale for Choice of Article

The article resonated with me because of my interest in information security awareness and the need for sensitization.   Organizations must enforce a security awareness policy for the safety of all employees at all levels of the organization. Ensuring employees adhere to such a policy can help to mitigate security breaches and protect the enterprise.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Computer Science 2 Assignments

Operational Excellence Week 2 Assignment Information Systems for Business and Beyond Questions: · Chapter 3 – study questions 1-8, Exercise 2, 4 & 5 Information Technology and Organizational Learning Assignment: Chapter 3 – Complete the two essay assignments noted below:  · Review the strategic integration section.  Note what strategic integration is and how

Discussion 3: generative adversarial nets

  Generative adversarial nets are mentioned in 2014 by Ian Goodfellow et al.  Why is generative adversarial network a key turning point in the history of generative modeling? Why is the field of image generation important? 

Week 3 – Linear Regression & Business Decision Making

attached file.  An asset management company must replace the manager of its two signature mutual funds, who is about to retire. Two candidates have been short-listed. The management team is divided and cannot decide which of the two candidates would make the better mutual fund manager. The retiring manager presents

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

Letter of Recommendations

Hi  Attached is the sample of Letter of recommendation  Please write about it accordingly  1. Write about author :AUTHOR WILL BE professor David Kimble I will give links about his Biography write accordingly or you can use your own search engines about him to write it. 2 . How the

data science

Final Exam Due Saturday 11:59 pm (Week 15) You cannot use any of the datasets in our assignments, class notes, and your own midterm project. If you are using the same one, you will receive 0 for your final project. 1. Question Formulation (5 points): You need to devise a

IT 202

5/15/24, 10:59 AM Assignment Information 1/3 IT 202 Project One Milestone Guidelines and Rubric Overview For the purposes of this assignment, imagine that you are a systems architect at a medium-sized publishing company with 130 employees. The company primarily publishes books, both in print and online. It also produces other

Assessments

Perimeter defense techniques Evaluate the types of assessments, select one that you might use, and explain why it is important. Of the top eight areas to research when conducting an assessment, select no less than three and explain how one should approach the research and why it should be approached

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

Week 2 understanding on Python.

PDF for reference purpose other file is requirement Python Installation & Examples Atif Farid Mohammad PhD 1. Open any Browser 2. Go to 3. Click at Download button 4. Go to your Download Folder (In both Windows and Mac) a. In Windows you will have the file: Anaconda3-2022.05-Windows-x86_64.exe b. Double

Computer Science Assignments

Operational Excellence Week 2 Assignment information Systems for Business and Beyond Questions · Chapter 2 – study questions 1-10, Exercise 2      Information Technology and Organizational Learning Questions · Chapter 2 – Note why the IT organizational structure is an important concept to understand.  Also, note the role of

Computer Science IT project assignment

Pg. 01 Project I Project Deadline: Sunday 12/5/2024 @ 23:59 [Total Mark is 14] Introduction to Database IT244 College of Computing and Informatics Project Instructions · You can work on this project as a group (minimum 2 and maximum 3 students). Each group member must submit the project individually with

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

coding

Assignment 6 Due Saturday 11:59 pm (Week 14) Part 1 (50 points) We will explore the Marvel Network Universe. The dataset which you will find in Blackboard consists of the hero’s networks. For this dataset, you will need to ask yourself 3 questions (i.e which superhero knows more superheroes?) ,

project ppt presentation

Project 3 – Ensemble Methods and Unsupervised Learning In this project you will explore some techniques in unsupervised learning as well as ensemble methods. It is important to realize that understanding an algorithm or technique requires understanding how it behaves under a variety of circumstances. You will go through the

How hackers get info

Identify at least two ways in which hackers gather information about companies. What can companies do to limit this access, specifically to the ways you have identified? Which type of information can be gathered with enumeration? How and why should companies protect themselves against enumeration attempts?