logo

Security Awareness Program | Cyber Security

   

Added on  2022-09-13

6 Pages1469 Words50 Views
Running head: Cybersecurity 1
Cybersecurity
Name
Institution of Affiliation
Security Awareness Program | Cyber Security_1
Cybersecurity 2
The security awareness program is very important to any institution, company or
organization for its full functionality regards to today’s technology situation. For an organization
to develop a strategic security plan, several factors are taken into consideration. Some of the
examples include: After the development of IT system users should be inducted to inform them
of how it is used. One of the factors which could never be overlooked is the security awareness
program, (Awawdeh & Tubaishat, 2014).
1.)
A well-informed security awareness culture is the one that ensures, clients, staff and all
stakeholders are well informed with best practices, outlines how security threats may be
managed and ensure security guidelines or policies are adhered to and maintained by everyone.
Where management has assembled a dedicated staff, distributed functions amid trained staff.
Training of staff by management on personal roles, security roles, systems and how to avoid
certain risks. Where staff are educated about online threats and tend to be sensitive to ensure
security is not breached. Management, clients, and staff are working towards keeping their data
safe by following the security awareness program proposed by the organization, (Aloul, 2012).
2.)
Perhaps the most common one, a computer virus written program that alters how
computer functions without consent or knowledge of the user, usually cause damage to the
computer. It can be avoided by careful evaluation of emails from unknown senders, free
software’s or downloads from peer to peer sharing sites and Installation of updated antivirus
from an approved provider. Hackers and predators are other treats, people creating computer
malware to steal data, identify identity or lock you out. Having online security tools having
identity theft protection is on the way one could avoid these treats. Phishing, where one or
Security Awareness Program | Cyber Security_2
Cybersecurity 3
business pretends to be trustworthy and can end up accessing sensitive data on finance or private
information through malware emails or messages. Antivirus with identity theft protection can be
a solution to this threat, (Rudolph, 2015).
3.)
Measures/ rules/ steps/ guidelines put up to ensure the integrity of a network, its
information, and the electronic devices' immediate environment. They include: Doing a risk
assessment that allows the organization to analyze and classify which network or devices are
more vulnerable and at greater risk. The idea is to reduce the identified vulnerabilities linked to
the communication network and electronic devices. When recruiting new personnel into an IT
place, security guidelines are implemented to ensure the human error is reduced, misuse of
resources and fraud. Security issues are addressed as early as at the start of the hiring process
(application). Polices such as provision IT resources to ensure the appropriate use of
communication devices and networks to facilitate effective performance to their functions.
Additionally authorization to the use of devices to put responsibilities and obligations to persons
using these devices or communication networks. Some organization implement training
procedures to IT users so they are informed of potential security threats when using devices,
therefore ensure precaution and individual responsibility to report any little security incident that
may arise guidelines such as report incidence, manage incidence, collect and share IT
information, developing user awareness, defining user responsibilities are common amongst
companies. Other policies that have incorporated include developing disciplinary processes,
network, and device use controls (establishing remote equipment management), developing
separate operation facilities, securing external facilities and ensuring procedures used to render
information unrecoverable before it is disposed of, (Fay, 2011).
Security Awareness Program | Cyber Security_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
PfSense: A Comprehensive Cybersecurity Tool for Intrusion Detection System
|20
|3463
|311

Cyber Security Awareness Training for Widget Inc Dot Com
|11
|855
|364

Ransomware & Malware
|5
|581
|276

The Assignment on Information Security
|12
|832
|36

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

Professional Skills In Information Communication Technology: Cyber Security
|20
|6717
|27