Analysis of a Network Security Awareness Program Interview Report
VerifiedAdded on  2023/05/30
|6
|1054
|342
Report
AI Summary
This report presents an interview with a security analyst regarding network security and information security awareness. The interview highlights the scope of the awareness program, extending beyond computers to various organizations vulnerable to threats, such as hotels. Key challenges include recruiting qualified personnel for security training, effectively conveying the importance of training to employees, and overcoming political obstacles. The effectiveness of training is evaluated through simulations like phishing and social engineering. Despite challenges like trainee attrition due to phishing, the training has significantly improved information security by preventing common threats. The program is conducted annually and utilizes various methods, including online platforms and in-person lectures, to protect both personal and organizational data. The report concludes with recommendations for improving the interview process, such as conducting interviews with multiple candidates and ensuring thorough preparation to minimize potential issues.

1
Running head: INTERVIEW
Interview
Student’s Name
School Affiliation
Running head: INTERVIEW
Interview
Student’s Name
School Affiliation
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

2
INTERVIEW
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................3
Recommendation.............................................................................................................................4
INTERVIEW
Table of Contents
Introduction......................................................................................................................................3
Discussion........................................................................................................................................3
Recommendation.............................................................................................................................4

3
INTERVIEW
Introduction
Interview refers to a conversation in which queries are asked and responses are provided. In
general parlance, the term interview denotes to one-on-one communication between an
interviewer as well as an interviewee. The conversation goes on as the interviewer asks queries
to which the practitioner gives a feedback, normally so data might be moved from interviewee to
interviewer. Although, sometimes data might be transferred in all directions. Interviews normally
occur face to face as well as in person, however current conversation technologies like the
internet have made it possible for the conversation to take in which participants are at different
locations through video conferencing program as well as interviews that take place over the
phone can occur without any visual contact (Wilson & Hash, 2013).
Discussion
To begin with, the interview was carried out on the network security by security analyst on the
security of the information. From the interview it clear that the project of awareness is all
encompassing the data of the organization. The network security company does not only
consider securing the computers but also organizations such as Hotels that are accessed by a
large group of people making it prone to threats (Kruger & Kearney, 2016). The network
security firm is entitled to provide knowledge on the information safety at various places such as
schools, police. The interviewee informed that to recruit new members to join their training on
the security threats is not easy for they consider those who have qualified for the position, again
the employees are in large numbers since most of them hired filling almost all the positions for
new recruits. The greatest challenge of creating awareness on the security of data is that to pass
information to workers on the relevance of the training takes a lot of time and it not easy for
them to understand its essence despite the provision of resources by the department of defense to
cover the whole event (Peltier, 2015).
INTERVIEW
Introduction
Interview refers to a conversation in which queries are asked and responses are provided. In
general parlance, the term interview denotes to one-on-one communication between an
interviewer as well as an interviewee. The conversation goes on as the interviewer asks queries
to which the practitioner gives a feedback, normally so data might be moved from interviewee to
interviewer. Although, sometimes data might be transferred in all directions. Interviews normally
occur face to face as well as in person, however current conversation technologies like the
internet have made it possible for the conversation to take in which participants are at different
locations through video conferencing program as well as interviews that take place over the
phone can occur without any visual contact (Wilson & Hash, 2013).
Discussion
To begin with, the interview was carried out on the network security by security analyst on the
security of the information. From the interview it clear that the project of awareness is all
encompassing the data of the organization. The network security company does not only
consider securing the computers but also organizations such as Hotels that are accessed by a
large group of people making it prone to threats (Kruger & Kearney, 2016). The network
security firm is entitled to provide knowledge on the information safety at various places such as
schools, police. The interviewee informed that to recruit new members to join their training on
the security threats is not easy for they consider those who have qualified for the position, again
the employees are in large numbers since most of them hired filling almost all the positions for
new recruits. The greatest challenge of creating awareness on the security of data is that to pass
information to workers on the relevance of the training takes a lot of time and it not easy for
them to understand its essence despite the provision of resources by the department of defense to
cover the whole event (Peltier, 2015).
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide

4
INTERVIEW
There other challenges as well as the obstacles from the political class. The group that has
accomplished the training are also evaluated on how to carry out activities such as phishing,
social engineering, and the attempt of physical access to examine whether they have learned and
are applying the appropriate measures to curb the crime. Although there is a challenge in the
time of training the employees because some of them are the victims of the phishing and drop
amid the program or give up (Whitman, 2013). The security awareness should be compulsory for
there is a big threat of cybercrime. These training have boasted the security of the information
greatly for they have prevented general threats from the public. The information security
awareness training is conducted every year and it can also be carried out through the department
of defense online platforms in which the employees are informed over the email when the
program will start while others still wait for a 30-day notice. The training on the information
security is delivered through various styles such as computer-based technique, in session
individual led lectures which is universal to an entire department of defense and it is done due to
a large number of trainees. The security awareness is aimed at helping people to protect
themselves and their personal data as well as in the organization they work from which is a great
achievement for the department of defense (Scholes, Westhead & Burrows, 2009).
Recommendation
The interview could have been conducted among several colleagues so that the interviewer can
make the right choice of selecting the attentive and active candidate to give the expected
information. Again, would help in determining the highly skilled interviewee with the
appropriate personality, interests as well as the interpersonal skills. The candidate identified as
active and preferred for the interview should be aware where the interview would be carried out,
the time in order to avoid surprises as well as tricks in the time of interview due to lack of
adequate prior preparation. The interviewer should have been in place and in time in order to
INTERVIEW
There other challenges as well as the obstacles from the political class. The group that has
accomplished the training are also evaluated on how to carry out activities such as phishing,
social engineering, and the attempt of physical access to examine whether they have learned and
are applying the appropriate measures to curb the crime. Although there is a challenge in the
time of training the employees because some of them are the victims of the phishing and drop
amid the program or give up (Whitman, 2013). The security awareness should be compulsory for
there is a big threat of cybercrime. These training have boasted the security of the information
greatly for they have prevented general threats from the public. The information security
awareness training is conducted every year and it can also be carried out through the department
of defense online platforms in which the employees are informed over the email when the
program will start while others still wait for a 30-day notice. The training on the information
security is delivered through various styles such as computer-based technique, in session
individual led lectures which is universal to an entire department of defense and it is done due to
a large number of trainees. The security awareness is aimed at helping people to protect
themselves and their personal data as well as in the organization they work from which is a great
achievement for the department of defense (Scholes, Westhead & Burrows, 2009).
Recommendation
The interview could have been conducted among several colleagues so that the interviewer can
make the right choice of selecting the attentive and active candidate to give the expected
information. Again, would help in determining the highly skilled interviewee with the
appropriate personality, interests as well as the interpersonal skills. The candidate identified as
active and preferred for the interview should be aware where the interview would be carried out,
the time in order to avoid surprises as well as tricks in the time of interview due to lack of
adequate prior preparation. The interviewer should have been in place and in time in order to
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser

5
INTERVIEW
interact with the interviewee to minimize the growing phobia as well as stress in the process. The
interviewer should consider the culture of the interviewee to avoid violations and assess him or
her to determine whether is longer or shorter thinker. The interviewer should make the interview
interactive so that it can be a two-direction conversation. The interviewer should prepare
questions relevant to the event before the time of interview in order to achieve the best of the
expected outcome from the interview of the day (Siponen, 2010).
INTERVIEW
interact with the interviewee to minimize the growing phobia as well as stress in the process. The
interviewer should consider the culture of the interviewee to avoid violations and assess him or
her to determine whether is longer or shorter thinker. The interviewer should make the interview
interactive so that it can be a two-direction conversation. The interviewer should prepare
questions relevant to the event before the time of interview in order to achieve the best of the
expected outcome from the interview of the day (Siponen, 2010).

6
INTERVIEW
References
Kruger, H. A., & Kearney, W. D. (2016). A prototype for assessing information security
awareness. computers & security, 25(4), 289-296.
Peltier, T. R. (2015). Implementing an Information Security Awareness Program. Information
Systems Security, 14(2), 37-49.
Scholes, L., Westhead, P., & Burrows, A. (2009). Family firm succession: the management buy-
out and buy-in routes. Journal of Small Business and Enterprise Development, 15(1), 8-
30.
Siponen, M. T. (2010). A conceptual foundation for organizational information security
awareness. Information Management & Computer Security, 8(1), 31-41.
Whitman, M. E. (2013). Enemy at the gate: threats to information security. Communications of
the ACM, 46(8), 91-95.
Wilson, M., & Hash, J. (2013). Building an information technology security awareness and
training program. NIST Special publication, 800(50), 1-39.
INTERVIEW
References
Kruger, H. A., & Kearney, W. D. (2016). A prototype for assessing information security
awareness. computers & security, 25(4), 289-296.
Peltier, T. R. (2015). Implementing an Information Security Awareness Program. Information
Systems Security, 14(2), 37-49.
Scholes, L., Westhead, P., & Burrows, A. (2009). Family firm succession: the management buy-
out and buy-in routes. Journal of Small Business and Enterprise Development, 15(1), 8-
30.
Siponen, M. T. (2010). A conceptual foundation for organizational information security
awareness. Information Management & Computer Security, 8(1), 31-41.
Whitman, M. E. (2013). Enemy at the gate: threats to information security. Communications of
the ACM, 46(8), 91-95.
Wilson, M., & Hash, J. (2013). Building an information technology security awareness and
training program. NIST Special publication, 800(50), 1-39.
⊘ This is a preview!⊘
Do you want full access?
Subscribe today to unlock all pages.

Trusted by 1+ million students worldwide
1 out of 6
Related Documents
Your All-in-One AI-Powered Toolkit for Academic Success.
 +13062052269
info@desklib.com
Available 24*7 on WhatsApp / Email
Unlock your academic potential
Copyright © 2020–2025 A2Z Services. All Rights Reserved. Developed and managed by ZUCOL.





