throbber
III. Operational Controls
`
`capability, contacts will have been established with counterparts outside the organization. This
`allows for early warning of threats and vulnerabilities that the organization may have notyet
`experienced. Early preventative measures (generally more cost-effective than repairing damage)
`can then be taken to reduce future losses. Data is also shared outside the organization to allow
`others to learn from the organization's experiences.
`
`12.1.3 Side Benefits
`
`Finally, establishing an incident handling capability helps an organization in perhaps unanticipated
`ways. Three are discussed here.
`
`Uses of Threat and Vulnerability Data: Incident handling can greatly enhance the risk assessment
`process. An incident handling capability will allow organizations to collect threat data that may be
`useful in their risk assessment and safeguard selection processes(e.g., in designing new systems).
`Incidents can be logged and analyzed to determine whetherthere is a recurring problem (or if
`other patterns are present, as are sometimes seen in hacker attacks), which would not be noticed
`if each incident were only viewedin isolation. Statistics on the numbers and typesofincidents in
`the organization can be used in the risk assessment processas an indication of vulnerabilities and
`threats.”
`
`Enhancing Internal Communications and Organization Preparedness. Organizations often find
`that an incident handling capability enhances internal communications andthe readiness of the
`organization to respondto any type ofincident, not just computer security incidents. Internal
`communications will be improved; managementwill be better organized to receive
`communications; and contacts within public affairs, legal staff, law enforcement, and other groups
`will have been preestablished. The structure set up for reporting incidents can also be used for
`other purposes.
`
`Enhancing the Training and Awareness Program. The organization's training process can also
`benefit from incident handling experiences. Based on incidents reported, training personnel will
`have a better understanding of users' knowledge of security issues. Trainers can use actual
`incidents to vividly illustrate the importance of computer security. Training that is based on
`current threats and controls recommendedbyincident handling staff provides users with
`information morespecifically directed to their current needs — thereby reducing the risks to the
`organization from incidents.
`
`* Tt is important, however, not to assumethat since only n reports were made, that n is the total numberofincidents;
`it is notlikely that all incidents will be reported,
`
`136
`
`|
`
`Roku EX1040 (Part 2 of 2) |
`Roku v. Ancora
`IPR2021-01406 |
`
`Roku EX1040 (Part 2 of 2)
`Roku v. Ancora
`IPR2021-01406
`
`

`

`12. Incident Handling
`
`12.2
`
`Characteristics of a Successful Incident Handling Capability
`
`A successful incident handling capability has several core characteristics:
`
`e
`
`e
`
`e
`
`e
`
`e
`
`an understanding of the constituencyit will serve;
`
`an educated constituency;
`
`a meansfor centralized communications;
`
`expertise in the requisite technologies; and
`
`links to other groupsto assist in incident handling (as needed).
`
`12.2.1 Defining the Constituency to Be Served
`
`The constituency includes computer users and
`program managers. Like any other customer-
`vendorrelationship, the constituency will tend
`to take advantage of the capability if the
`services rendered are valuable.
`
`The focus of a computer security incident handling
`capability may be external as well as internal. An
`incidentthat affects an organization mayalso affectits
`trading partners, contractors, or clients. In addition,
`an organization's computer security incident handling
`capability may be able to help other organizations
`and, therefore, help protect the community as a whole.
`
`The constituency is not always the entire
`organization. For example, an organization
`may use Several types of computers and
`networks but may decidethat its incident handling capability is cost-justified only for its personal
`computerusers. In doing so, the organization may have determined that computerviruses pose a
`muchlarger risk than other malicious technical threats on other platforms. Or, a large
`organization composedof several sites may decide that current computersecurity efforts at some
`sites do not require an incident handling capability, whereas other sites do (perhaps becauseofthe
`criticality of processing).
`
`12.2.2 Educated Constituency
`
`Users need to know about, accept, andtrust
`the incident handling capability orit will not
`be used. Throughtraining and awareness
`programs, users can become knowledgeable
`about the existence of the capability and how
`to recognize and report incidents. Userstrust
`in the value of the service will build with
`
`Managers need to know details aboutincidents,
`including who discovered them and how,so that they
`can prevent similar incidents in the future. However
`users will not be forthcoming if they fear reprisal or
`that they will become scapegoats. Organizations may
`need to offer incentives to employees for reporting
`incidents and offer guarantees against reprisal or
`other adverse actions. It may also be useful to
`consider anonymousreporting.
`
`

`

`IIT. Operational Controls
`
`reliable performance.
`
`12.2.3 Centralized Reporting and Communications
`
`Successful incident handling requires that users be able to report incidents to the incident handling
`team in a convenient, straightforward fashion;this is referred to as centralized reporting. A
`successful incident handling capability depends on timely reporting.
`Ifit is difficult or time
`consuming to report incidents, the incident handling capability may not be fully used. Usually,
`some form ofa hotline, backed up by pagers, works well.
`
`Centralized communications is very useful for accessing or distributing information relevant to
`the incident handling effort. For example, if users are linked together via a network,the incident
`handling capability can then use the network to send out timely announcements and other
`information. Users can take advantage of the network to retrieve security information stored on
`servers and communicate with the incident response team via e-mail.
`
`12.2.4 Technical Platform and Communications Expertise
`
`The technical staff members who comprise the incident handling capability need specific
`knowledge, skills, and abilities. Desirable qualifications for technical staff members may include
`the ability to:
`

`
`e
`
`e
`

`
`e
`
`work expertly with someorall of the constituency's core technology;
`
`work in a group environment;
`
`communicate effectively with different types of users, who will range from system
`administrators to unskilled users to managementto law-enforcementofficials;
`
`be on-call 24 hours as needed; and
`
`travel on short notice (of course, this depends upon the physical location of the
`constituency to be served).
`
`12.2.5 Liaison With Other Organizations
`
`Due to increasing computer connectivity, intruder activity on networks can affect many
`organizations, sometimesincluding those in foreign countries. Therefore, an organization's
`incident handling team may need to work with other teams or security groupsto effectively handle
`incidents that range beyond its constituency. Additionally, the team may need to poolits
`knowledge with other teams at various times. Thus,it is vital to the success of an incident
`handling capability that it establish ties and contacts with other related counterparts and
`
`|
`
`|
`|
`
`|
`
`138
`
`

`

`supporting organizations.
`
`Especially important to incident handling are
`contacts with investigative agencies, such as
`federal (e.g., the FBI), state, and local law
`enforcement. Lawsthat affect computer
`crime vary amonglocalities and states, and
`some actions maybe state (but not federal)
`crimes. It is important for teams to be familiar
`with current laws and to have established
`contacts within law enforcement and
`investigative agencies.
`
`12. Incident Handling
`
`The Forum of
`Incident Response and Security Teams
`
`The 1988Internet wormincident highlighted the need
`for better methods for responding to and sharing
`information about incidents, It was also clear that any
`single team or "hot line" would simply be
`overwhelmed. Out of this was born the conceptof a
`coalition ofresponse teams ~ each with its own
`constituency, but working together to share
`information, provide alerts, and support each other in
`the response to incidents. The Forum ofIncident
`Response and Security Teams (FIRST) includes
`teams from government, industry, computer
`manufacturers, and academia. NIST serves as the
`secretariat of FIRST.
`
`Incidents can also garner much media
`attention and can reflect quite negatively on
`an organization's image. An incident handling
`capability may need to work closely with the
`organization's public affairs office, whichis
`trained in dealing with the news media.
`In
`presenting informationto the press, it is important that (1) attackers are not given information
`that would place the organization at greater risk and (2) potential legal evidence is properly
`protected.
`
`12.3
`
`Technical Support for Incident Handling
`
`Incident handling will be greatly enhanced by technical mechanisms that enable the dissemination
`of information quickly and conveniently.
`
`12.3.1 Communications for Centralized Reporting of Incidents
`
`The technicalability to report incidents is of primary importance, since without knowledge of an
`incident, response is precluded. Fortunately, such technical mechanisms are alreadyin place in
`many organizations.
`
`For rapid response to constituency problems, a simple telephone “hotline”is practical and
`convenient. Some agencies may already have a numberused for emergencies or for obtaining
`help with other problems; it may be practical (and cost-effective) to also use this numberfor
`incident handling.
`It may be necessary to provide 24-hour coveragefor the hotline. This can be
`donebystaffing the answering center, by providing an answering service for nonoffice hours, or
`by using a combination of an answering machine and personalpagers.
`
`139
`
`

`

`III. Operational Controls
`
`If additional mechanisms for contacting the
`incident handling team can be provided, it may
`increase access and thus benefit incident
`handling efforts. A centralized e-mail address
`;
`that forwards mail to staff members would
`
`Onewayto establish a centralized reporting and
`incident response capability, while minimizing
`expenditures,is to use an existing Help Desk. Many
`agencies already havecentral Help Desks for fielding
`Aiiseboleantmonte epalcticns
`
`exchange information with the team.
`Providing a fax numberto users mayalso be
`helpful.
`
`—_
`ee
`;
`12.3.2 Rapid CommunicationsFacilities
`
`in detecting and eradicating computer viruses. By
`expanding the capabilities ofthe Help Desk and
`publicizing its telephone number {or e-mail address),
`an agency may be ableto significantly improve its
`ability to handle manydifferent types ofincidents:at
`manimalicast
`
`Some form of rapid communicationsisttaaa
`essential for quickly communicating with the
`constituency as well as with managementofficials and outside organizations. The team may need
`to send out security advisories or collect information quickly, thus some convenient form of
`communications, such as electronic mail, is generally highly desirable. With electronic mail, the
`team can easily direct information to various subgroups within the constituency, such as system
`managers or network managers, and broadcast generalalerts to the entire constituency as needed.
`Whenconnectivity already exists, e-mail has low overheadandis easy to use. (However,it is
`possible for the e-mail system itself to be attacked, as was the case with the 1988 Internet worm.)
`
`Althoughthere are substitutes for e-mail, they tend to increase response time. An electronic
`bulletin board system (BBS) can work well for distributing information, especially if it provides a
`convenient user interface that encouragesits use. A BBS connected to a network is more
`convenient to access than one requiring a terminal and modem; however,the latter may be the
`only alternative for organizations without sufficient network connectivity. In addition,
`telephones, physical bulletin boards, and flyers can be used.
`
`12.3.3 Secure CommunicationsFacilities
`
`Incidents can range from thetrivial to those involving national security. Often when exchanging
`information aboutincidents, using encrypted communications may be advisable. This will help
`prevent the unintended distribution of incident-related information. Encryption technologyis
`available for voice, fax, and e-mail communications.
`
`12.4
`
`Interdependencies
`
`An incident handling capability generally depends upon other safeguards presented in this
`handbook. The most obviousis the strong link to other components of the contingency plan. The
`following paragraphsdetail the most important of these interdependencies.
`
`140
`
`

`

`12. Incident Handling
`
`Contingency Planning. As discussed in the introduction to this chapter, an incident handling
`capability can be viewed as the componentof contingency planning that deals with responding to
`technical threats, such as viruses or hackers. Close coordination is necessary with other
`contingency planning efforts, particularly when planning for contingency processing in the event
`of a serious unavailability of system resources.
`
`Support and Operations. Incident handlingis also closely linked to support and operations,
`especially user support and backups. For example, for purposesofefficiency and cost savings,
`the incident handling capability is often co-operated with a user "help desk." Also, backups of
`system resources may need to be used when recovering from anincident.
`
`Training and Awareness. Thetraining and awareness program can benefit from lessons learned
`during incident handling.
`Incident handling staff will be able to help assess the level of user
`awareness about current threats and vulnerabilities. Staff members may be able to help train
`system administrators, system operators, and other users and systems personnel. Knowledge of
`security precautions (resulting from suchtraining) helps reduce future incidents. It is also
`importantthat users are trained what to report and how to reportit.
`
`Risk Management. Therisk analysis process will benefit from statistics and logs showing the
`numbers and typesof incidents that have occurred and the types of controls that are effective in
`preventing incidents. This information can be usedto help select appropriate security controls
`and practices.
`
`12.5
`
`Cost Considerations
`
`There are a numberofstart-up costs and funding issues to consider when planning an incident
`handling capability. Because the success of an incident handling capability relies so heavily on
`users’ perceptionsof its worth and whetherthey useit, it is very important that the capability be
`able to meet users’ requirements. Two important funding issuesare:
`
`Personnel. An incident handling capability plan might call for at least one manager and one or
`more technical staff members(or their equivalent) to accomplish program objectives. Depending
`on the scopeof the effort, however, full-time staff members may not be required.
`In some
`situations, some staff may be needed part-time or on an on-call basis. Staff may be performing
`incident handling duties as an adjunct responsibility to their normal assignments.
`
`Incident handling staff will need to keep current with computer system
`Education and Training.
`and security developments. Budget allowances need to be made,therefore, for attending
`conferences, security seminars, and other continuing-education events. If an organization is
`located in more than one geographic areas, funds will probably be needed fortravel to other sites
`for handling incidents.
`
`141
`
`

`

`IIT, Operational Controls
`
`References
`
`Brand, Russell L. Coping With the Threat of Computer Security Incidents: A Primerfrom
`Prevention Through Recovery. July 1989.
`
`Fedeli, Alan. "Organizing a Corporate Anti-Virus Effort." Proceedings of the Third Annual
`Computer VIRUSClinic, Nationwide Computer Corp. March 1990.
`
`Holbrook,P., and J. Reynolds, eds. Site Security Handbook. RFC 1244 prepared for the Internet
`Engineering Task Force, 1991. FIP from csrc.nist.gov:/put/secpley/rfc 1244.txt.
`
`National Institute of Standards and Technology. "Establishing a Computer Security Incident
`Response Capability." Computer Systems Laboratory Bulletin. Gaithersburg, MD. February 1992.
`
`Padgett, K. Establishing and Operating an Incident Response Team. Los Alamos, NM: Los
`Alamos National Laboratory, 1992.
`
`Pethia, Rich, and Kenneth van Wyk. Computer Emergency Response - An International Problem.
`1990.
`
`Quarterman, John. The Matrix - Computer Networks and Conferencing Systems Worldwide.
`Digital Press, 1990.
`
`Scherlis, William, S. Squires, and R. Pethia. Computer Emergency Response. 1989.
`
`Schultz, E., D. Brown, and T. Longstaff. Responding to Computer Security Incidents: Guidelines
`for Incident Handling. University of California Technical Report UCRL-104689, 1990.
`
`Proceedingsof the Third Invitational Workshop on Computer Security Incident Response.
`August 199].
`
`Wack, John. Establishing an Incident Response Capability. Special Publication 800-3.
`Gaithersburg, MD: National Institute of Standards and Technology. November1991.
`
`142
`
`

`

`Chapter 13
`
`AWARENESS, TRAINING, AND EDUCATION
`
`People, whoareall fallible, are usually recognized as one of the weakestlinks in securing systems.
`The purpose of computer security awareness,training, and education is to enhancesecurity by:
`
`e
`

`
`e
`
`improving awarenessof the need to protect system resources;
`
`developing skills and knowledge so computerusers can perform their jobs more
`securely; and
`
`building in-depth knowledge, as needed, to design, implement, or operate security
`programs for organizations and systems.
`
`Making computer system users aware oftheir security responsibilities and teaching them correct
`practices helps users change their behavior.” It also supports individual accountability, which is
`one of the most important ways to improve computer security. Without knowing the necessary
`security measures (and to how to use them), users cannotbe truly accountable for their actions.
`The importance ofthis training is emphasized in the Computer Security Act, which requires
`training for those involved with the management, use, and operation of federal computer systems.
`
`This chapterfirst discusses the two overriding benefits of awareness, training, and education,
`namely: (1) improving employee behavior and (2) increasing the ability to hold employees
`accountable for their actions. Next, awareness, training, and education are discussed separately,
`with techniques used for each. Finally, the chapter presents one approach for developing a
`computersecurity awareness andtraining program.”
`
`13.1
`
`Behavior
`
`People are a crucial factor in ensuring the security of computer systems and valuable information
`resources. Human actions accountfor a far greater degree of computer-related loss than all other
`sources combined. Of suchlosses, the actions of an organization's insiders normally cause far
`more harm than the actions of outsiders. (Chapter 4 discusses the major sources of computer-
`related loss.)
`
`°° One often-cited goal of training is changing people's attitudes. This chapter views changing attitudes as just one
`step toward changing behavior.
`
`°° This chapter doesnot discuss the specific contents of training programs. Seethe references for details of suggested
`course contents.
`
`143
`
`

`

`IIT. Operational Controls
`
`The major causes of loss due to an organization's own employeesare: errors and omissions, fraud,
`and actions by disgruntled employees. Oneprincipal purpose of security awareness, training, and
`education is to reduce errors and omissions. However, it can also reduce fraud and unauthorized
`activity by disgruntled employees by increasing employees’ knowledge of their accountability and
`the penalties associated with such actions.
`
`Managementsets the example for behavior within an organization. If employees know that
`management doesnot care aboutsecurity, no training class teaching the importance ofsecurity
`and imparting valuable skills can be truly effective. This "tone from the top" has myriad effects an
`organization's security program.
`
`13.2
`
`Accountability
`
`Oneofthe keys to a successful computer security
`program is security awareness and taining. If
`employees are not informed of applicable
`organizational policies and procedures,they cannot
`be expected to acteffectively to securecomputer
`TeSOUICes..
`
`Both the dissemination and the enforcement
`of policyarecritical issues that are
`implemented and strengthened through
`training programs. Employees cannotbe
`expected to follow policies and procedures of
`which they are unaware. In addition,
`enforcing penalties may be difficult if users can claim ignorance when caught doing something
`wrong.
`
`Training employees mayalso be necessary to show that a standard of due care has been taken in
`protecting information. Simply issuing policy, with no follow-up to implementthat policy, may
`not suffice.
`
`Manyorganizations use acknowledgment statements whichstate that employees have read and
`understand computer security requirements.
`(An example is provided in Chapter 10.)
`
`13.3
`
`Awareness
`
`Awarenessstimulates and motivates those
`bej
`:
`.
`ing trained to care aboutsecurity and to
`:
`.
`:
`;
`remind them of important security practices.
`Explaining what happensto an organization,
`its mission, customers, and employeesif
`security fails motivates people to take security
`seriously.
`
`|
`Secuity awareness programs:(1) setthe stage for
`traliing by changing organizaliGnul
`realize the importance ofsecurity and the adverse
`ws
`oe
`:
`consequencesofits failure; and (2) remind users of
`the proceduresto be followed.
`
`Awareness can take on different forms for particular audiences. Appropriate awareness for
`managementofficials might stress management's pivotalrole in establishing organizational
`
`144
`
`

`

`13. Awareness, Training, and Education
`
`attitudes toward security. Appropriate awareness for other groups, such as system programmers
`or information analysts, should address the need for security asit relates to their job. In today's
`systems environment, almost everyone in an organization may have access to system resources —
`and therefore may have the potential to cause harm.
`
`Comparative Framework
`
`
`
`
`[awareness[teanne|epvcarton
`
`
`
`
`
`Objective:
`
`
`Media
`Teaching Method:
`
`
`
`
`- Videos
`- Lecture
`- Discussion Seminar
`
`
`- Case study workshop
`- Backgroundreading
`-Newsletters
`
`- Hands-on practice
`-Posters, etc.
`
`
`
`
`
`
`
`True/False
`Problem Solving
`Eassay
`(interpret learning)
`Multiple Choice
`(apply learning)
`
`
`
`
`(identify learning)
`
`
`Practical Instruction
`
`Theoretical Instruction
`
`Test Measure:
`
`
`
`Impact Timeframe
`
`Figure 13.1 compares someofthe differences in awareness,training, and education.
`
`Awareness is used to reinforce the fact that security supports the mission of the organization by
`protecting valuable resources. If employees view security as just bothersomerules and
`procedures, they are morelikely to ignore them. In addition, they may not make needed
`suggestions about improving security nor recognize and report security threats and vulnerabilities.
`
`Awarenessalso is used to remind people of basic security practices, such as logging off a
`computer system or locking doors.
`
`Techniques. A security awareness program can use many teaching methods,including video
`
`145
`
`

`

`If. Operational Controls
`
`tapes, newsletters, posters, bulletin boards, flyers, demonstrations, briefings, short reminder
`notices at log-on, talks, or lectures. Awarenessis often incorporated into basic security training
`and can use any method that can change employees’attitudes.
`
`Effective security awareness programs need to
`be designed with the recognition that people
`tend to practice a tuning out process (also
`known as acclimation). For example, after a
`while, a security
`poster, no matter how well
`,
`¥P
`,
`designed, will be ignored;it will, in effect,
`simply blend into the environment. Forthis
`reason, awareness techniques should be
`creative and frequently changed.
`
`13.4
`
`Training
`
`Employeesoften regard computer security as an
`obstacle to productivity. A commonfeelingis that
`they are paid to produce, not to protect. To help
`meuvelrembloxees, aWateness shits
`how security, from a broader perspective, contributes
`to productivity. The consequences ofpoor security
`should be explained, whileavoiding the fear and
`intimidation that employees often associate with
`security.
`
`The purpose oftraining is to teach people the skills that will enable them to perform their jobs
`more securely. This includes teaching people what they should do and howthey should (or can)
`do it. Training can address manylevels, from basic security practices to more advanced or
`specialized skills.
`It can be specific to one computer system or generic enoughto addressall
`systems.
`
`Training is most effective when targeted to a specific audience. This enables the training to focus
`on security-related job skills and knowledge that people need performing their duties. Two types
`of audiences are general users and those whorequire specialized or advancedskills.
`
`General Users. Mostusers need to understand good computersecurity practices, such as:
`
`e
`
`e
`
`e
`
`protecting the physical area and equipment(e.g., locking doors, caring for floppy
`diskettes);
`
`protecting passwords(if used) or other authentication data or tokens(e.g., never
`divulge PINs); and
`
`reporting security violations or incidents (e.g., whom to call if a virusis
`suspected).
`
`In addition, general users should be taught the organization's policies for protecting information
`and computer systems and the roles and responsibilities of various organizational units with which
`they may haveto interact.
`
`146
`
`|
`
`

`

`13. Awareness, Training, and Education
`
`In teaching general users, care should be taken not to overburden them with unneededdetails.
`These people are the target of multiple training programs, such as those addressing safety, sexual
`harassment, and AIDS in the workplace. The training should be made useful by addressing
`security issues that directly affect the users. The goal is to improve basic security practices, not
`to make everyoneliterate in all the jargon or philosophyof security.
`
`Specialized or Advanced Training. Many groups need more advanced or more specialized
`training than just basic security practices. For example, managers may need to understand
`security consequencesandcosts so they can factor security into their decisions, or system
`administrators may need to know how to implementand usespecific access control products.
`
`
`
`There are many different ways to identify
`Onegroupthat has beentargeted for specialized
`individuals or groups whoneedspecialized or
`training is executives and functional managers. The
`advancedtraining. One methodis to lookat
`training for managementpersonnelis specialized
`job categories, such as executives, functional
`aor naaee eeyiuse Maneeer ae not rs .
`managers, or technology providers. Another
`general rule) need to understarid the technical details
`rad
`:
`.
`ofsecurity. However, they do need to understand
`methodis to look at job functions, such as
`howto organize, direct, and evaluate security
`system design, system operation, or system
`measures and programs, They also need to
`use. A third methodis to look at the specific
`understand risk acceptance.
`technology and products used, especially for
`advancedtraining for user groups and (raining mmmmmmmnnenemeeenmmemmses
`for anew system. This is further discussed in
`the section 13.6 of this chapter.
`
`Techniques. A security training program normally includestrainingclasses, either strictly devoted
`to security or as added special sections or modules within existing training classes. Training may
`be computer- or lecture-based (or both), and may include hands-on practice and casestudies.
`Training, like awareness, also happenson the job.
`
`13.5
`
`Education
`
`Security education is more in-depth than security training andis targeted for security professionals
`and those whose jobs require expertise in security.
`
`Techniques. Security education is normally outside the scope of most organization awareness and
`training programs.
`It is more appropriately a part of employee career development. Security
`education is obtained through college or graduate classes or through specialized training
`programs. Because ofthis, most computer security programs focus primarily on awareness and
`
`147
`
`

`

`III. Operational Controls
`
`training, as does the remainderof this chapter.”
`
`13.6
`
`Implementation”
`
`An effective computer security awareness and training (CSAT) program requires proper planning,
`implementation, maintenance, and periodic evaluation. The following seven steps constitute one
`approach for developing a CSAT program.”
`
`Step 1:
`
`Identify Program Scope, Goals, and Objectives.
`
`Step 2:
`
`Identify TrainingStaff.
`
`Step 3:
`
`Identify Target Audiences.
`
`Step 4: Motivate Management and Employees.
`
`Step 5:
`
`Administer the Program.
`
`Step 6: Maintain the Program.
`
`Step 7:
`
`Evaluate the Program.
`
`13.6.1 Identify Program Scope, Goals, and
`Objectives
`
`The first step in developing a CSAT program
`is to determine the program's scope, goals,
`and objectives. The scope of the CSAT
`program should providetrainingtoall types of
`people whointeract with computer systems.
`The scope of the program canbe anentire
`organization or a subunit. Since users need
`training whichrelates directly to their use of
`
`The Computer Security Act of 1987 requires federal
`agencies to “provide for the mandatory periodic
`training in computer security awareness and accepted
`computer practices of all employees who are involved
`with the management, use, or operation of each
`federal computer system within or under the
`supervision of that agency.” The scope and goals of
`federal computer security awarenessand training
`programs must implementthis broad mandate.
`(Other federal requirements for computer security
`training are contained in OMB Circular A-130,
`Appendix Tl, and OPM regulations.)
`
`*7 Unfortunately, college and graduate security courses are not widely available.
`address general security.
`
`In addition, the courses may only
`
`** This section is based on material prepared by the Departmentof Energy's Office of Information Managementforits
`unclassified security program.
`
`” This approachis presented to familiarize the reader with someof the important implementation issues. It is not the only
`approach to implementing an awareness andtraining program.
`
`
`
`

`

`13. Awareness, Training, and Education
`
`particular systems, a large organizationwide program may need to be supplemented by more
`specific programs.
`In addition, the organization should specifically address whether the program
`applies to employeesonly or also to other users of organizational systems.
`
`Generally, the overall goal of a CSAT programis to sustain an appropriate level of protection for
`computer resources by increasing employee awareness of their computer security responsibilities
`and the waysto fulfill them. More specific goals may need to be established. Objectives should
`be defined to meet the organization's specific goals.
`
`13.6.2 Identify Training Staff
`
`There are many possible candidates for conducting the training including internaltraining
`departments, computer security staff, or contract services. Regardless of who is chosen,it is
`important that trainers have sufficient knowledge of computersecurity issues, principles, and
`techniques.
`It is also vital that they know how to communicate information and ideaseffectively.
`
`13.6.3 Identify Target Audiences
`
`Not everyone needs the same degree or type of computersecurity information to do their jobs. A
`CSATprogram that distinguishes between groups of people, presents only the information needed
`by the particular audience, and omits irrelevant information will have the best results. Segmenting
`audiences(e.g., by their function or familiarity with the system) can also improve the effectiveness
`of a CSAT program. Forlarger organizations, some individuals will fit into more than one group.
`For smaller organizations, segmenting may not be needed. The following methods are some
`examples of ways to dothis.
`
`Individuals may be separated into groups according to
`Segment according to level of awareness.
`their current level of awareness. This may require research to determine how well employees
`follow computersecurity procedures or understand how computersecurityfits into their jobs.
`
`Segmentaccording to general job task orfunction. Individuals may be grouped as data
`providers, data processors, or data users

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket