Analysis of Information Security Training Report for ATI

Verified

Added on  2022/08/28

|4
|629
|16
Report
AI Summary
This report analyzes an information security training program designed for Advanced Technologies Inc. (ATI). The training emphasizes the importance of information security awareness to mitigate risks associated with evolving cyber threats and internal vulnerabilities. It covers essential topics such as availability, integrity, and confidentiality of information, highlighting the significance of employee actions and inactions. The report references NIST Special Publication 800-50 and outlines key aspects of the training, including essential actions, consequences of policy violations, and crucial policies like the clean desk policy, BYOD, and data management. It also addresses roles and responsibilities of key personnel, including managers and CIOs, in ensuring a secure working environment. The report concludes by stressing the necessity of this training for all employees to understand their roles in maintaining a secure and conducive workplace.
Document Page
The email Advisory
Information security training
This is an informative text regarding the training upcoming soon. The training will be
touching on Advanced Technologies Inc. 's information security. As a general concept,
information is what is conveyed by a particular sequence. Information can be electrical or
physical. Information security, therefore, is the practice of preventing unauthorized infringement
in the flow sequence of ideas conveyed. Information security ensures the prevention of
unauthorized use, inspection, destruction, recording or access of information.
This training is very important. It will highlight and remind each one in the Advanced
Technologies Inc. company risks and threats around ever-advancing and evolving growth in
information flow and cybersecurity. This also covers the need to know about deliberate moves
by internal staff to illegally acquire companies’ sensitive information by any possible loopholes
available and use to harm the firm.
Availability, integrity, and confidentiality is the basic description of secure information.
Misplaced Information or information falling into appropriate users’ hands contradicts basic
description. This can lead to damage, misuse, stealing or even attacks hence a reiteration of the
need of everyone in the organization knowing the risks and take appropriate action to ensure
he/she doesn’t subject the firm to dangers and losses accrued with their action or inaction.
The companies’ system can be secure enough but employees’ actions and inaction can be
a major threat. There is the adoption of NIST special publication 800-50 to help with the
information security approach. For the case of action, the training will cover the essential actions
on users to ensure each one knows their duties and possible outcomes. The training will also
tabler-icon-diamond-filled.svg

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
notify trainees on possible actions by ATI on actions contravening the policies. On the other
hand, inaction can also bring disaster to the firm. This includes careless handling of information
and even writing sensitive information on sticky notes and leaving them unattended. There will
be coverage on possible handling for safety.
Crucial policies concerning data will be addressed. This includes; clean desk policy,
social networking limits, Bring your own device policy(BYOD) and even data management. This
will be a buildup on your perceived understanding of methods of ensuring security is upheld.
Using strong passwords, logging out from emails and not leaving passwords in public computers
is considered obvious knowledge you have.
Training will touch on the roles and responsibilities of everyone. Although it is known
that security is everyone’s responsibility, key persons hold special responsibilities to ensure good
coordination of employees and IT security wings are in harmony. In the training managers, chief
information officers and agency heads roles will be highlighted.
In conclusion, it’s an essential training that will be reminding and informing everyone essential
aspects of information security and their roles to play to achieve a secure and conducive working
environment in Advanced Technologies Inc. DON’T MISS!!!
The Bulletin Poster
Critical messages
Document Page
Did you know information security
starts with you?
The use of personal removable media on
companies’ computers is prohibited.
Do not download suspicious contents using
companies’ computers
Keep your desk clean always
Comply with information security policies
Do not open strange emails using the
company’s network
Do not share sensitive company’s
information with unauthorized user
Report any suspicious activity on
information to IT security
Ensure your own devices scanned and
accepted before using the company’s network
Always update your computer antivirus
Document Page
The Presentation
Information
security awareness training.pptx
chevron_up_icon
1 out of 4
circle_padding
hide_on_mobile
zoom_out_icon
logo.png

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]