Week 14 - Human Resource Security

Human Resources Security


Security Awareness, Training, and Education

  • Standards Reference:

    • ISO 27002: Code of Practice for Information Security Management

    • NIST SP 800-100: Information Security Handbook: A Guide for Managers


Benefits of Security Programs

  • Improves employee behavior

  • Increases accountability

  • Mitigates liability for employee actions

  • Ensures compliance with regulations and obligations


Human Factors

  • Significance: Employee behavior is crucial for securing systems and information

  • Key Problems:

    • Errors and omissions

    • Fraudulent actions

    • Actions by disgruntled employees


Comparative Framework for Awareness, Training, and Education

  • Attributes:

    • Awareness: What

    • Training: How

    • Education: Why

  • Objectives:

    • Awareness: Recognition

    • Training: Skill

    • Education: Understanding

  • Teaching Methods:

    • Awareness: Media like videos, newsletters, posters

    • Training: Practical instruction, cases, hands-on practice

    • Education: Theoretical instruction like seminars and readings

  • Evaluation Methods:

    • Awareness: True/false, multiple choice

    • Training: Problem-solving

    • Education: Essay writing

  • Impact Timeframes:

    • Awareness: Short term

    • Training: Intermediate

    • Education: Long term


Awareness

  • Purpose: Inform employees of security issues and responsibilities

  • Importance: Understanding organizational security is vital for well-being

  • Engagement: Need management buy-in and enthusiasm

  • Tailoring: Programs should fit the organization’s needs


NIST SP 800-100 Insight

  • Awareness tools promote information security by identifying threats and vulnerabilities.

  • Explains allowed actions and behavioral rules for agency information systems.


Training

  • Aim: Teach secure IT-related skills

  • Focus for Various Groups:

    • General Users: Best security practices

    • Developers: Foster a security mindset

    • Management: Evaluate risks, costs, and benefits

    • Executives: Understand risk management goals


Education

  • Focus: In-depth knowledge for security professionals

  • Source: Often from external sources like colleges or specialized programs


Employment Practices

  • Management: Personnel with access to sensitive information

  • Issues:

    • Employees inadvertently contribute to security violations

    • Forgetting security protocols

    • Knowingly violating procedures


Security in Hiring

  • Objective: Ensure suitability of employees to reduce fraud or misuse

  • Background Checks:

    • Importance of accurate investigations

    • Enhanced checks for sensitive positions: criminal and credit checks


Employment Agreements

  • Must Include:

    • Responsibilities for security

    • Confidentiality agreements

    • Acknowledgment of the organization’s security policy


During Employment

  • Objectives: Enhance employee awareness of threats and responsibilities

  • Key Elements: Comprehensive security policies and ongoing training

  • Principles: Least privilege, separation of duties, limited reliance on key personnel


Termination Security

  • Objectives: Manage orderly exit of employees to mitigate risks

  • Critical Actions:

    • Remove access privileges

    • Retrieve company property

    • Notify relevant stakeholders


Email and Internet Use Policies

  • Importance: Address concerns about non-work use and malware risks

  • Suggested Policies:

    • Business use-only

    • Policy scope

    • Content ownership

    • Privacy and conduct standards

    • Prohibited activities

    • Disciplinary measures


Security Incident Response

  • Importance: Procedures for controlling incidents are essential

  • Benefits: Systematic responses and reduced recovery times


CSIRT: Computer Security Incident Response Team
  • Responsibilities:

    • Detecting incidents

    • Minimizing losses

    • Restoring services


Security Incidents Definition

  • Definition: Any action that threatens confidentiality, integrity, availability, etc.

  • Examples: Unauthorized access, information modification


Security Incident Terminology

  • Artifact: Any file/object involved in security breaches

  • CSIRT: Team for responding to security incidents

  • Incident: Violation of security policies

  • Triage: Initial sorting of incident information

  • Vulnerability: Exploit risks in technology


Incident Detection

  • Encouragement: Report anomalies

  • Tools: Use of automated tools like IDS and log analyzers


Triage Function

  • Goal: Centralize incident information for effective response


Incident Response Procedures

  • Importance: Essential to document response actions and identify causes for recovery


Incident Handling Life Cycle

  • Overview: Information flow during incident management


Documenting Incidents

  • Importance: Post-incident documentation for future prevention


Information Flow to/from Incident Handling Service

  • Examples: Announcements and how information flows within and outside


Summary of Key Topics

  • Security awareness, training, and education

  • Employment practices

  • Email and internet usage policies

  • CSIRT functions


Copyright Information

  • Protected work, dissemination restrictions apply.

Human Resources Security


Security Awareness, Training, and Education

  • Standards Reference:

    • ISO 27002: Code of Practice for Information Security Management

    • NIST SP 800-100: Information Security Handbook: A Guide for Managers


Benefits of Security Programs

  • Improves employee behavior

  • Increases accountability

  • Mitigates liability for employee actions

  • Ensures compliance with regulations and obligations


Human Factors

  • Significance: Employee behavior is crucial for securing systems and information

  • Key Problems:

    • Errors and omissions

    • Fraudulent actions

    • Actions by disgruntled employees


Comparative Framework for Awareness, Training, and Education

  • Attributes:

    • Awareness: What

    • Training: How

    • Education: Why

  • Objectives:

    • Awareness: Recognition

    • Training: Skill

    • Education: Understanding

  • Teaching Methods:

    • Awareness: Media like videos, newsletters, posters

    • Training: Practical instruction, cases, hands-on practice

    • Education: Theoretical instruction like seminars and readings

  • Evaluation Methods:

    • Awareness: True/false, multiple choice

    • Training: Problem-solving

    • Education: Essay writing

  • Impact Timeframes:

    • Awareness: Short term

    • Training: Intermediate

    • Education: Long term


Awareness

  • Purpose: Inform employees of security issues and responsibilities

  • Importance: Understanding organizational security is vital for well-being

  • Engagement: Need management buy-in and enthusiasm

  • Tailoring: Programs should fit the organization’s needs


NIST SP 800-100 Insight

  • Awareness tools promote information security by identifying threats and vulnerabilities.

  • Explains allowed actions and behavioral rules for agency information systems.


Training

  • Aim: Teach secure IT-related skills

  • Focus for Various Groups:

    • General Users: Best security practices

    • Developers: Foster a security mindset

    • Management: Evaluate risks, costs, and benefits

    • Executives: Understand risk management goals


Education

  • Focus: In-depth knowledge for security professionals

  • Source: Often from external sources like colleges or specialized programs


Employment Practices

  • Management: Personnel with access to sensitive information

  • Issues:

    • Employees inadvertently contribute to security violations

    • Forgetting security protocols

    • Knowingly violating procedures


Security in Hiring

  • Objective: Ensure suitability of employees to reduce fraud or misuse

  • Background Checks:

    • Importance of accurate investigations

    • Enhanced checks for sensitive positions: criminal and credit checks


Employment Agreements

  • Must Include:

    • Responsibilities for security

    • Confidentiality agreements

    • Acknowledgment of the organization’s security policy


During Employment

  • Objectives: Enhance employee awareness of threats and responsibilities

  • Key Elements: Comprehensive security policies and ongoing training

  • Principles: Least privilege, separation of duties, limited reliance on key personnel


Termination Security

  • Objectives: Manage orderly exit of employees to mitigate risks

  • Critical Actions:

    • Remove access privileges

    • Retrieve company property

    • Notify relevant stakeholders


Email and Internet Use Policies

  • Importance: Address concerns about non-work use and malware risks

  • Suggested Policies:

    • Business use-only

    • Policy scope

    • Content ownership

    • Privacy and conduct standards

    • Prohibited activities

    • Disciplinary measures


Security Incident Response

  • Importance: Procedures for controlling incidents are essential

  • Benefits: Systematic responses and reduced recovery times


CSIRT: Computer Security Incident Response Team
  • Responsibilities:

    • Detecting incidents

    • Minimizing losses

    • Restoring services


Security Incidents Definition

  • Definition: Any action that threatens confidentiality, integrity, availability, etc.

  • Examples: Unauthorized access, information modification


Security Incident Terminology

  • Artifact: Any file/object involved in security breaches

  • CSIRT: Team for responding to security incidents

  • Incident: Violation of security policies

  • Triage: Initial sorting of incident information

  • Vulnerability: Exploit risks in technology


Incident Detection

  • Encouragement: Report anomalies

  • Tools: Use of automated tools like IDS and log analyzers


Triage Function

  • Goal: Centralize incident information for effective response


Incident Response Procedures

  • Importance: Essential to document response actions and identify causes for recovery


Incident Handling Life Cycle

  • Overview: Information flow during incident management


Documenting Incidents

  • Importance: Post-incident documentation for future prevention


Information Flow to/from Incident Handling Service

  • Examples: Announcements and how information flows within and outside


Summary of Key Topics

  • Security awareness, training, and education

  • Employment practices

  • Email and internet usage policies

  • CSIRT functions


Copyright Information

  • Protected work, dissemination restrictions apply.