+ All Categories
Home > Technology > End User Security Awareness Presentation

End User Security Awareness Presentation

Date post: 14-May-2015
Category:
Upload: cristian-mihai
View: 33,911 times
Download: 2 times
Share this document with a friend
Description:
End User Security Awareness Presentation
Popular Tags:
24
End User Security Awareness
Transcript
Page 1: End User Security Awareness Presentation

End UserSecurity Awareness

Page 2: End User Security Awareness Presentation

Session Prerequisites

• Hands-on experience with Microsoft Windows 2000 or Windows XP

• Knowledge of Windows system security concepts and practices

• Some understanding of training methodology

Level 100

Page 3: End User Security Awareness Presentation

Session Overview

• Introduction to End User Security Awareness

• End User Security Awareness Challenges

• Understanding End User Security Awareness

• Developing End User Security Awareness Initiatives

• Using Security Awareness Materials and Resources

• Best Practices

• Summary

Page 4: End User Security Awareness Presentation

Introduction to End User Security Awareness

Why implement a security awareness campaign?• Communicate policy to the user community and encourage compliance• Mitigate the Security versus Usability equation• Defend against social engineering threat components• User awareness enhances the overall security profile

What do we want to accomplish by making users aware of security?• Encourage safe usage habits and discourage unsafe behavior• Change user perceptions of information security• Inform users about how to recognize and react to potential threats• Educate users about information security techniques they can use

How do we get the desired results?• Build interest• Educate• Communicate• Repeat

The Why, What, and How of Security Awareness

Page 5: End User Security Awareness Presentation

End User Security Awareness Challenges

Convincing users to develop and maintain safer computer usage habits

Delivering a consistent message about the importance of information security

Motivating users to take a personal interest in information security

Giving end user security awareness a higher priority within organizations

Developing materials that deliver a clear message about security topics

Page 6: End User Security Awareness Presentation

Positioning End User Security Awareness for Business

• End User Security and Awareness programs reside in the Policies, Procedures, and Awareness layer of the Defense in Depth security model.

• User security awareness can affect every aspect of an organization’s security profile.

• User awareness is a significant part of a comprehensive security profile because many attack types rely on human intervention to succeed. Polices, Procedures & Awareness

PerimeterPerimeter

Internal NetworkInternal Network

HostHost

ApplicationApplication

DataData

Physical SecurityPhysical SecurityPhysical SecurityPhysical Security

DEFENSE IN DEPTH

Page 7: End User Security Awareness Presentation

The Business Case for End User Security Awareness

2006 E-Crime Watch Survey1

• 63% of survey respondents reported security incidents that resulted in operational losses.

• Insiders were responsible for 27% of all incidents and 55% of respondents reported at least one incident that was the result of insider activity.

2006 CSI/FBI Computer Crime and Security Survey2

• 43% of respondents view user awareness training and education as the most critical security issue in their organization.

2005 Committing to Security Benchmark Study3

• Human error, not systems weakness, is the leading cause of serious security incidents.

1. The E-Crime Watch Survey is sponsored by CSO Magazine in cooperation with CERT, Microsoft Corporation, and the US Secret Service

2. The CIS/FBI Security Survey is sponsored by the Computer Security Institute and the US Federal Bureau of Investigation

3. The Committing to Security Benchmark Study is sponsored by CompTIA

Page 8: End User Security Awareness Presentation

The Personal Case for End User Security Awareness

Online Survival Guide, Consumer Reports, September 2005

• Americans have spent $9 billion to repair problems caused by viruses and spyware over the past two years.

• Nearly 65% of internet users have experienced a computer virus infection over the past two years.

• It’s estimated that more than 2 million children nationwide have inadvertently viewed pornographic content.

AOL/National Cyber Security Alliance Online Safety Study, December 2005

• Nearly one in four Americans are affected each month by phishing attacks designed to enable identity theft.

Internet Security Threats, Better Business Bureau, November 2005

• 79% of computer users want to learn more about how to protect themselves and their computers from viruses and spyware.

Page 9: End User Security Awareness Presentation

End User Awareness Business ProcessThe Microsoft recommended six phase end user awareness process

1. Planning• Ownership• Funding• Roles

2. Development• Campaign Materials• Awareness Content• Delivery Methods

3. Deployment• Pilot Deployment• Message Refinement• Final Deployment

4. Assessment• Pre-assessment• Pilot Assessment• Questionnaires

5. Response• Policy• Communication• Refinement

6. Maintenance• Business Changes• Technology Changes• Threat Changes

ASSESSPLAN

DE

VE

LOP

DEPLOY

RE

SP

ON

DM

AIN

TAIN

Page 10: End User Security Awareness Presentation

What Users Need to KnowUsers need to know about information security issues that affect their work, their home, themselves,and their families. They need to understand the threats and risks as well as the methods they can personally use to defend against those threats.

• MalwareDefending against Viruses and Trojan Horse Software

• SpywareAnti-spyware techniques and understanding End User Agreement language’s role

• ScamsRecognizing Scam messages, social engineering attacks, and spam

• Safe Internet and Email UsageProtecting the workplace and family from unwelcome or unsafe content

• Account SecurityStrong Password practices and using appropriate account privilege levels

• Information Theft / Identity TheftShredding confidential documents, protecting personal and private information from theft

• Physical SecurityHow to protect data on mobile devices and why premise security is important

• Regulations, Policies, and TrustWhat regulations affect information security and why security policies exist

Page 11: End User Security Awareness Presentation

Motivating the End User Community

Understand the human side of the security equation and use it to tailor the security awareness message for the audience it needs to influence.

• Self Interest - People tend to retain facts better when they can personally identify with or use that information personally, show how organizational security policies can translate to safe home usage practices as well.

• Memory Persistence - Current news stories or recent situations that affected the organization recently help reinforce the consequences of security lapses better than outdated stories no matter how sensational they may be.

• Perceived Importance - Policy adherence depends on perceived importance, communicate the need for stated security policies in context and enforce existing policies.

• Self Efficacy - People are more inclined to follow procedures that they feel they have an good understanding of so users who understand the concept of complex password creation policies are more likely to follow those principles.

Page 12: End User Security Awareness Presentation

Overcoming the Hurdles to Security Awareness

• End user security education is not a one-way knowledge transfer, reinforce the messages often and get feedback on the effectiveness of the program.

• Make security threats seem real and pertinent, make it believable.

• Use social marketing techniques to encourage safe practices, make security seem interesting and cool.

• Make security less of a hurdle to productivity, show how unsafe practices and shortcuts can actually hinder productivity by introducing risks.

• Don’t fall victim to the “Do as I say and not as I do” trap, enforce security policies fairly and consistently, lead by example!

Effective End User Security Awareness initiatives are not merely training sessions, they are concerted efforts from the top down focused on changing

behaviors and encouraging a security minded culture.

Page 13: End User Security Awareness Presentation

Using the Provided Security Awareness Materials

The materials that accompany this slide deck presentation include content that was designed for business customers and end user consumers as a part of various user security awareness and home user security awareness initiatives on the part of Microsoft Corporation and it’s various partners.

While some of these materials may have been developed for specific audiences but they provide key examples of how to tailor end user security awareness messages to suit the various target issues that may affect users personally and that can then be transferred to use in the workplace as well.

Page 14: End User Security Awareness Presentation

Using the Provided Security Awareness Materials

The following slides include a list of materials that may accompany this presentation and their recommended usages:

• Key Considerations for Developing Effective Information Security Awareness and Training Programs – Document

This document contains helpful information and tips about security awareness program development methodology and concepts.

• The Role of Information Security In Everyday Business – Presentation

This customizable PowerPoint presentation deck uses the concepts outlined in the Key Considerations document and can be modified to suit an organization’s needs

• Consumer Security and Online Safety Messaging - Document

This document gives talking points and pitch messages that describe current Microsoft and partner initiatives oriented toward consumer information security in addition to some useful general user security awareness message content.

Page 15: End User Security Awareness Presentation

Using the Provided Security Awareness Materials

• Consumer Security Messaging Framework- DocumentThis printable foldout document outlines messaging pillars, benefit

statements, and top level support points that outline Microsoft’s efforts to improve end user security and security awareness.

• Family Safe Computing Group External Video- VideoThis video presents information for external audiences about the Family

Safe Computing efforts by Microsoft to improve the family safety options available to consumers to protect their families online.

• Family Safe Computing Group Internal Video- VideoThis video presents information for internal audiences about Microsoft’s

Family Safe Computing initiative that discusses the efforts and talking points relevant to the FSC initiative.

• Get Net Safe Deck- PresentationThis PowerPoint presentation developed by Microsoft for the Get Net Safe

Tour gives guidance to users about steps they can take to improve online security for themselves, their families, and their own computers.

Page 16: End User Security Awareness Presentation

Using the Provided Security Awareness Materials

• Get Net Safe Posters: Blue & Green- Acrobat DocumentThese posters were developed for the Get Net Safe Tour and outline

simple steps users can follow to help them improve security at home with links for further information and help.

• Internet Security and Safety – Microsoft Ready- PresentationThis Microsoft ready PowerPoint presentation gives useful end user

guidance on steps they can take to improve security at home for safer internet usage for their family, themselves, and their computers.

• Internet Security and Safety – Partner Ready- PresentationThis Microsoft partner ready PowerPoint presentation gives useful end

user guidance on steps they can take to improve security at home for safer internet usage for their family, themselves, and their computers.

• Microsoft PSA Safety Radio- Acrobat DocumentThis is a series of Microsoft sponsored public service announcement

scripts for radio audiences that give some general security tips and links for more information.

Page 17: End User Security Awareness Presentation

Using the Provided Security Awareness Materials

• Protect Your Family Brochures, factsheets, and videos: MS, Partner, and Elite – Acrobat Documents and video

This series of materials offer end user guidance on steps they can take to help protect their families from online threats such as inappropriate content and online predators.

• Protect Your PC Brochures, factsheets, and videos: MS, Partner, and Elite – Acrobat Documents and video

This series of materials offer end user guidance on steps people can take to help protect their computers at home from threats like viruses and spyware.

• Protect Yourself Brochures, factsheets, and videos: MS, Partner, and Elite – Acrobat Documents and video

This series of materials offer end user guidance on steps people can take to help protect themselves from threats like identity theft and scams.

Page 18: End User Security Awareness Presentation

Using the Provided Security Awareness Materials

• Windows Live Fact Sheet – Acrobat Document

This fact sheet provides end user information about the security offerings available at Windows Live OneCare along with some tips about online safety and links to additional resources.

• Xbox Family Safety Brochure – Acrobat Document

This brochure provides end user guidance about family safety features available for the Xbox gaming platform and some general guidance about ESRB game ratings and some other family safety tips.

Page 19: End User Security Awareness Presentation

End User Security Awareness Resources

Microsoft Security at Home – http://www.microsoft.com/athome/securityUseful services, resources, and information to help users and families improve

online safety.

Staysafe – http://www.staysafe.orgHome page for the non-profit Staysafe organization that offers online safety

educational content for end users, educators, and families.

GetNetWise – http://www.getnetwise.orgHome page for the GetNetWise non-profit organization with information about

online safety for children and adults.

OnGuard Online – http://onguardonline.govResources and information from a coalition of different governmental agencies

concerning online safety and security awareness topics.

Page 20: End User Security Awareness Presentation

End User Security Awareness Resources

i-SAFE – http://www.isafe.org

Non-profit organization site dedicated to outreach and educational campaigns to keep children safe online, provides educational materials, services, and courses for teachers, students, parents, and law enforcement agencies.

NetSmartz – http://www.netsmartz.org

Online partnership between the National Center for Missing & Exploited Children and the Boys and Girls Club of America that offers online child safety information and materials for educators, parents, law enforcement, and children.

CERT Coordination Center Home Network Tips – http://www.cert.org/tech-tips/home-networks

This FAQ offers some more detailed technical information for end users about information security and what they can do to protect their home networks.

Page 21: End User Security Awareness Presentation

Best Practices

Communicate to Users How this is important to them personallyPeople are more receptive to information that affects them personally or that they can identify with. When training give examples to how safe usage not only applies to the workplace but how it can be used at home as well.

Discuss Safe Practices in context with examplesSecurity awareness can seem dry to some people, keep everyone’s attention by citing examples the audience can identify with, use audience participation techniques, and convey the potential consequences with recent organizational incidents or recent high profile media events.

Inform users of security initiatives that may affect themKeep everyone in the loop and keep communication lines open. Create an information security group with members from different business groups to establish lines of communication about security initiatives, get buy-in from management, and let the end user community know why security policies are necessary.

Understand the importance of End User Security Awareness EffortsRemember that vulnerabilities are not only exploited from the outside, but can also be exploited from within your organization. Approach security awareness with the same seriousness as any other security related initiative, give the users the tools to help with security efforts.

Page 22: End User Security Awareness Presentation

Remember that security awareness isn’t a one shot fix but a long term process designed to educate AND to change user behavior

Remember that security awareness isn’t a one shot fix but a long term process designed to educate AND to change user behavior

Session Summary

Deliver security information that users will view as being valuable to them personally and professionallyDeliver security information that users will view as being valuable to them personally and professionally

Communicate with users, let them know why policies exist and why they are enforced for everyoneCommunicate with users, let them know why policies exist and why they are enforced for everyone

Be mindful of security solutions that can impact usability and communicate the need to users whenever such solutions are implemented

Be mindful of security solutions that can impact usability and communicate the need to users whenever such solutions are implemented

Page 23: End User Security Awareness Presentation

Next Steps• More information on security topics: http://www.microsoft.com/security

• Microsoft Security at Home Resources: http://www.microsoft.com/athome/security

• Find additional security training events:http://www.microsoft.com/seminar/events/security.mspx

• Sign up for security communications:http://www.microsoft.com/technet/security/signup/default.mspx

• Get additional security tools and content:http://www.microsoft.com/security/guidance/default.mspx

• Find additional e-learning clinics: https://www.microsoftelearning.com/security

Page 24: End User Security Awareness Presentation

Questions and Answers


Recommended