Advanced Technologies Inc. Information Security Training Report

Verified

Added on  2022/08/28

|2
|528
|23
Report
AI Summary
This report provides an overview of an information security training program for Advanced Technologies Inc. (ATI). The training emphasizes the importance of information security in the face of evolving cyber threats, covering topics such as the definition of information security, risks associated with employee actions and inactions, and the implementation of policies based on NIST Special Publication 800-50. The report highlights the significance of availability, integrity, and confidentiality of information. It also covers crucial policies like the clean desk policy, social networking limits, Bring Your Own Device (BYOD) policy, and data management. The training emphasizes the roles and responsibilities of all employees, including managers and IT security personnel, in maintaining a secure working environment. The report concludes with a strong recommendation for the training and its importance to the organization.
Document Page
Information security training
This is an informative text regarding the training upcoming soon. The training will be touching
on Advanced Technologies Inc. 's information security. As a general concept, information is
what is conveyed by a particular sequence. Information can be electrical or physical. Information
security, therefore, is the practice of preventing unauthorized infringement in the flow sequence
of ideas conveyed. Information security ensures the prevention of unauthorized use, inspection,
destruction, recording or access of information.
This training is very important. It will highlight and remind each one in the Advanced
Technologies Inc. company risks and threats around ever-advancing and evolving growth in
information flow and cybersecurity. This also covers the need to know about deliberate moves
by internal staff to illegally acquire companies’ sensitive information by any possible loopholes
available and use to harm the firm.
Availability, integrity, and confidentiality is the basic description of secure information.
Misplaced Information or information falling into appropriate users’ hands contradicts basic
description. This can lead to damage, misuse, stealing or even attacks hence a reiteration of the
need of everyone in the organization knowing the risks and take appropriate action to ensure
he/she doesn’t subject the firm to dangers and losses accrued with their action or inaction.
The companies’ system can be secure enough but employees’ actions and inaction can be a
major threat. There is the adoption of NIST special publication 800-50 to help with the
information security approach. For the case of action, the training will cover the essential actions
on users to ensure each one knows their duties and possible outcomes. The training will also
notify trainees on possible actions by ATI on actions contravening the policies. On the other
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
hand, inaction can also bring disaster to the firm. This includes careless handling of information
and even writing sensitive information on sticky notes and leaving them unattended. There will
be coverage on possible handling for safety.
Crucial policies concerning data will be addressed. This includes; clean desk policy, social
networking limits, Bring your own device policy(BYOD) and even data management. This will
be a buildup on your perceived understanding of methods of ensuring security is upheld. Using
strong passwords, logging out from emails and not leaving passwords in public computers is
considered obvious knowledge you have.
Training will touch on the roles and responsibilities of everyone. Although it is known that
security is everyone’s responsibility, key persons hold special responsibilities to ensure good
coordination of employees and IT security wings are in harmony. In the training managers, chief
information officers and agency heads roles will be highlighted.
In conclusion, it’s an essential training that will be reminding and informing everyone essential
aspects of information security and their roles to play to achieve a secure and conducive working
environment in Advanced Technologies Inc. DON’T MISS!!!
chevron_up_icon
1 out of 2
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]