Pertemuan 19 Organisational Back Up Matakuliah :A0334/Pengendalian Lingkungan Online

advertisement

Matakuliah

Tahun

Versi

:A0334/Pengendalian Lingkungan Online

: 2005

: 1/1

Pertemuan 19

Organisational Back Up

1

Learning Outcomes

Pada akhir pertemuan ini, diharapkan mahasiswa akan mampu :

• Mahasiswa dapat menunjukkan

Organisational back up

2

Outline Materi

• Information Security Training

– Why Is Security Training Important?

– Security Training and Security Awareness –

What Is The Difference?

– Who Should Be Trained, How, and What

Should They Be Trained In?

• Who Needs To Be Trained?

• How Should The Training Be Conducted?

• What Training Is Required?

3

– What Training Structure Would Be The Most Effective in The Long Term?

• Principle 1 – Awareness

• Principle 2 – Responsibility

• Principle 3 – Response

• Principle 4 – Ethics

• Principle 5 – Democracy

• Principle 6 – Risk Assessment

• Principle 7 –Security Design and Implementation

• Principle 8 – Security Management

• Principle 9 – Reassessment

– Conclusion

4

Information Security Training

• Why Is Security Training Important?

• Security Training and Security Awareness

– What Is The Difference?

– Who Should Be Trained, How, and What

Should They Be Trained In?

– Who Needs To Be Trained?

– How Should The Training Be Conducted?

– What Training Is Required?

5

• What Training Structure Would Be The Most

Effective in The Long Term?

– Principle 1 – Awareness

– Principle 2 – Responsibility

– Principle 3 – Response

– Principle 4 – Ethics

– Principle 5 – Democracy

– Principle 6 – Risk Assessment

– Principle 7 –Security Design and Implementation

– Principle 8 – Security Management

– Principle 9 – Reassessment

• Conclusion

6

Why Is Security training Important?

• This may sound like an obvious question, but it is important to look at what problems security training is likely to address effectively. Training is a ‘people’ issue – again, an obvious statement, but so often we overlook the obvious.

7

Security Training and security

Awareness – What Is The Difference?

• Information security is, above all, a business issue, which involves people, processes and technology.

• Security awareness can be thought of as creating the aspiration, whilst security training can be seen as one important means of achieving this aspiration. They are complementary and both are necessary for creating a security-aware culture by helping people move round the security learning cycle.

8

Who Should Be Trained, How, and What

Should They Be Trained In?

• The answer to the ‘who’, ‘how’ and ‘what’ question will depend on the individual and on the needs of your business, but the following points are relevant.

9

Who Needs To Be Trained?

• It is glib to say that everyone in an organisation at some time or another should receive some sort of information security training. In some organisations it is not unusual for every employee to have a security-related item in their job description and, where appropriate, to have specific relevant personal objectives.

10

How Should The Training Be Conducted?

• One example of how to conduct the training has already been given where distance learning was used effectively. Training courses are also very effective, both external and in-house, and on some of the more technical training it is important to provide hands-on training facilities.

There are many vendor-specific technical training courses, and counsulting firms can be employed to run courses on almost any aspect of information securities.

11

What Training Is Required?

• This question is perhaps the most complex to deal with, as what training is required depends on the individual, their role within an organisation and the aspirations of both the individual and the organisation. A good starting point, however, is to look at possible structures for determining what training is needed.

• A logical place to start would be to organise training around the ‘information security policy’ of the organisation, where, for example, all desktop users could be trained on the Internet usage policy.

12

What Training Structure Whould Be The

Most Effective in The Long Term?

• This section proposes that an effective structure for security training should be one that is bases on the nine principles described in the OECD guidelines.

• The guidelines state that: ‘All participants will be aided by awareness, education, information sharing and training that can lead to adoption of better security understanding and practices.’

13

Principle 1 - Awareness

• The guidelines expand on the importance of risk awareness as the first line of defence and of people understanding the consequences arising from the abuse of information systems and networks.

• Training should therefore ensure that people in all roles clearly understand these risks, and what they need to do to mitigate them.

14

Principle 2 - Responsibility

• The guidelines promote good management practices in terms of ensuring that individuals are aware of their responsibility and are accountable.

• Training should therefore be provided to help ensure people have the necessary skills and knowledge for themto discharge this responsibility.

15

Principle 3 - Response

• This recognises that security incidents will occur and that it is important to respond to them in a co-operative and timely manner. This raises an important point in terms of co-operation, because ideally training would need to inform on other people’s misfortunes – that is, learning from other people’s mistakes. However, information sharing is recognised as being difficult due to the potential loss of reputation arising from the risk of unsympathetic media reporting.

16

• Training should therefore attempt to include content from shared information on sensitive issues such as incidents.

17

Principle 4 - Ethics

• This is fundamental to changing the culture in terms of making people recognise that their action or inaction may harm others.

• Training should therefore be provided on codes such as these and delivered to all people in an organisation. A good place to start is induction training.

18

Principle 5 - Democracy

• This can often be taken for granted in the

UK, but it addresses the need for information security to be compatible with the essential value of a democratic society.

• Training should therefore be provided to help people understand the relevant legislation, both in terms of their rights and what is illegal.

19

Principle 6 – Risk Assessment

• Participants are encourage to conduct risk assessments in this section of the guidelines. Risk is a term used by many but, arguably, understood by few.

• Training should be given on risk and how it relates to the individual’s role within the organisation.

20

Principle 7 – Security Design and

Implementation

• I would argue that this is one of the most fundamental principles of the OECD guidelines where it states that systems, networks and policies need to be properly designed, implemented and co-ordinated to optimise security.

• Training should be provided on how security can be designed into IT systems and networks, as well as on implementing and maintaining them in a secure manner. Suppliers and users should teach their staff how to do it, and clients should teach their staff how to procure systems and services that will be secure.

21

Principle 8 – Security Management

• The guidelines state that participants should adopt a comprehensive approach to security management.

22

Principle 9 - Reassessment

• Security training should, therefore, not be a single event for any individual, but should be provided continuously to meet to needs of the changing environment.

This also applies to security awareness, as important to continuously re-enforce the need for good security practice.

Otherwise there is a risk of complacency, especially if no significant incidents occur.

23

Conclusion

• It is recognised that not all the points of advice provided above will apply to everyone,b ut it is hoped that with the right prioritisation the reader can go away and act on at least one price of advice or comment in this chapter.

24

The End

25

Download