Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.



Descargar para leer sin conexión

End User Security Awareness Presentation

Descargar para leer sin conexión

End User Security Awareness Presentation

Libros relacionados

Gratis con una prueba de 30 días de Scribd

Ver todo

Audiolibros relacionados

Gratis con una prueba de 30 días de Scribd

Ver todo

End User Security Awareness Presentation

  1. 1. End User Security Awareness
  2. 2. Session Prerequisites <ul><li>Hands-on experience with Microsoft Windows 2000 or Windows XP </li></ul><ul><li>Knowledge of Windows system security concepts and practices </li></ul><ul><li>Some understanding of training methodology </li></ul>Level 100
  3. 3. Session Overview <ul><li>Introduction to End User Security Awareness </li></ul><ul><li>End User Security Awareness Challenges </li></ul><ul><li>Understanding End User Security Awareness </li></ul><ul><li>Developing End User Security Awareness Initiatives </li></ul><ul><li>Using Security Awareness Materials and Resources </li></ul><ul><li>Best Practices </li></ul><ul><li>Summary </li></ul>
  4. 4. Introduction to End User Security Awareness <ul><li>The Why, What, and How of Security Awareness </li></ul><ul><li>Why implement a security awareness campaign? </li></ul><ul><ul><li>Communicate policy to the user community and encourage compliance </li></ul></ul><ul><ul><li>Mitigate the Security versus Usability equation </li></ul></ul><ul><ul><li>Defend against social engineering threat components </li></ul></ul><ul><ul><li>User awareness enhances the overall security profile </li></ul></ul><ul><li>What do we want to accomplish by making users aware of security? </li></ul><ul><ul><li>Encourage safe usage habits and discourage unsafe behavior </li></ul></ul><ul><ul><li>Change user perceptions of information security </li></ul></ul><ul><ul><li>Inform users about how to recognize and react to potential threats </li></ul></ul><ul><ul><li>Educate users about information security techniques they can use </li></ul></ul><ul><li>How do we get the desired results? </li></ul><ul><ul><li>Build interest </li></ul></ul><ul><ul><li>Educate </li></ul></ul><ul><ul><li>Communicate </li></ul></ul><ul><ul><li>Repeat </li></ul></ul>
  5. 5. End User Security Awareness Challenges <ul><li>Convincing users to develop and maintain safer computer usage habits </li></ul>Delivering a consistent message about the importance of information security Motivating users to take a personal interest in information security Giving end user security awareness a higher priority within organizations Developing materials that deliver a clear message about security topics
  6. 6. Positioning End User Security Awareness for Business <ul><li>End User Security and Awareness programs reside in the Policies, Procedures, and Awareness layer of the Defense in Depth security model. </li></ul><ul><li>User security awareness can affect every aspect of an organization’s security profile. </li></ul><ul><li>User awareness is a significant part of a comprehensive security profile because many attack types rely on human intervention to succeed. </li></ul>DEFENSE IN DEPTH Polices, Procedures & Awareness Perimeter Internal Network Host Application Data Physical Security
  7. 7. The Business Case for End User Security Awareness <ul><li>2006 E-Crime Watch Survey 1 </li></ul><ul><li>63% of survey respondents reported security incidents that resulted in operational losses. </li></ul><ul><li>Insiders were responsible for 27% of all incidents and 55% of respondents reported at least one incident that was the result of insider activity. </li></ul><ul><li>2006 CSI/FBI Computer Crime and Security Survey 2 </li></ul><ul><li>43% of respondents view user awareness training and education as the most critical security issue in their organization. </li></ul><ul><li>2005 Committing to Security Benchmark Study 3 </li></ul><ul><li>Human error, not systems weakness, is the leading cause of serious security incidents. </li></ul><ul><li>The E-Crime Watch Survey is sponsored by CSO Magazine in cooperation with CERT, Microsoft Corporation, and the US Secret Service </li></ul><ul><li>The CIS/FBI Security Survey is sponsored by the Computer Security Institute and the US Federal Bureau of Investigation </li></ul><ul><li>The Committing to Security Benchmark Study is sponsored by CompTIA </li></ul>
  8. 8. The Personal Case for End User Security Awareness <ul><li>Online Survival Guide, Consumer Reports, September 2005 </li></ul><ul><ul><li>Americans have spent $9 billion to repair problems caused by viruses and spyware over the past two years. </li></ul></ul><ul><ul><li>Nearly 65% of internet users have experienced a computer virus infection over the past two years. </li></ul></ul><ul><ul><li>It’s estimated that more than 2 million children nationwide have inadvertently viewed pornographic content. </li></ul></ul><ul><li>AOL/National Cyber Security Alliance Online Safety Study, December 2005 </li></ul><ul><ul><li>Nearly one in four Americans are affected each month by phishing attacks designed to enable identity theft. </li></ul></ul><ul><li>Internet Security Threats, Better Business Bureau, November 2005 </li></ul><ul><ul><li>79% of computer users want to learn more about how to protect themselves and their computers from viruses and spyware. </li></ul></ul>
  9. 9. End User Awareness Business Process <ul><li>The Microsoft recommended six phase end user awareness process </li></ul><ul><li>1. Planning </li></ul><ul><li>Ownership </li></ul><ul><li>Funding </li></ul><ul><li>Roles </li></ul><ul><li>2. Development </li></ul><ul><li>Campaign Materials </li></ul><ul><li>Awareness Content </li></ul><ul><li>Delivery Methods </li></ul><ul><li>3. Deployment </li></ul><ul><li>Pilot Deployment </li></ul><ul><li>Message Refinement </li></ul><ul><li>Final Deployment </li></ul><ul><li>4. Assessment </li></ul><ul><li>Pre-assessment </li></ul><ul><li>Pilot Assessment </li></ul><ul><li>Questionnaires </li></ul><ul><li>5. Response </li></ul><ul><li>Policy </li></ul><ul><li>Communication </li></ul><ul><li>Refinement </li></ul><ul><li>6. Maintenance </li></ul><ul><li>Business Changes </li></ul><ul><li>Technology Changes </li></ul><ul><li>Threat Changes </li></ul>
  10. 10. What Users Need to Know <ul><li>Users need to know about information security issues that affect their work, their home, themselves, </li></ul><ul><li>and their families. They need to understand the threats and risks as well as the methods they can </li></ul><ul><li>personally use to defend against those threats. </li></ul><ul><li>Malware </li></ul><ul><ul><li>Defending against Viruses and Trojan Horse Software </li></ul></ul><ul><li>Spyware </li></ul><ul><ul><li>Anti-spyware techniques and understanding End User Agreement language’s role </li></ul></ul><ul><li>Scams </li></ul><ul><ul><li>Recognizing Scam messages, social engineering attacks, and spam </li></ul></ul><ul><li>Safe Internet and Email Usage </li></ul><ul><ul><li>Protecting the workplace and family from unwelcome or unsafe content </li></ul></ul><ul><li>Account Security </li></ul><ul><ul><li>Strong Password practices and using appropriate account privilege levels </li></ul></ul><ul><li>Information Theft / Identity Theft </li></ul><ul><ul><li>Shredding confidential documents, protecting personal and private information from theft </li></ul></ul><ul><li>Physical Security </li></ul><ul><ul><li>How to protect data on mobile devices and why premise security is important </li></ul></ul><ul><li>Regulations, Policies, and Trust </li></ul><ul><ul><li>What regulations affect information security and why security policies exist </li></ul></ul>
  11. 11. Motivating the End User Community <ul><li>Understand the human side of the security equation and use it to tailor the security awareness message for the audience it needs to influence. </li></ul><ul><li>Self Interest - People tend to retain facts better when they can personally identify with or use that information personally, show how organizational security policies can translate to safe home usage practices as well. </li></ul><ul><li>Memory Persistence - Current news stories or recent situations that affected the organization recently help reinforce the consequences of security lapses better than outdated stories no matter how sensational they may be. </li></ul><ul><li>Perceived Importance - Policy adherence depends on perceived importance, communicate the need for stated security policies in context and enforce existing policies. </li></ul><ul><li>Self Efficacy - People are more inclined to follow procedures that they feel they have an good understanding of so users who understand the concept of complex password creation policies are more likely to follow those principles. </li></ul>
  12. 12. Overcoming the Hurdles to Security Awareness <ul><li>End user security education is not a one-way knowledge transfer, reinforce the messages often and get feedback on the effectiveness of the program. </li></ul><ul><li>Make security threats seem real and pertinent, make it believable. </li></ul><ul><li>Use social marketing techniques to encourage safe practices, make security seem interesting and cool. </li></ul><ul><li>Make security less of a hurdle to productivity, show how unsafe practices and shortcuts can actually hinder productivity by introducing risks. </li></ul><ul><li>Don’t fall victim to the “Do as I say and not as I do” trap, enforce security policies fairly and consistently, lead by example! </li></ul>Effective End User Security Awareness initiatives are not merely training sessions, they are concerted efforts from the top down focused on changing behaviors and encouraging a security minded culture.
  13. 13. Using the Provided Security Awareness Materials <ul><li>The materials that accompany this slide deck presentation include content that was designed for business customers and end user consumers as a part of various user security awareness and home user security awareness initiatives on the part of Microsoft Corporation and it’s various partners. </li></ul><ul><li>While some of these materials may have been developed for specific audiences but they provide key examples of how to tailor end user security awareness messages to suit the various target issues that may affect users personally and that can then be transferred to use in the workplace as well. </li></ul>
  14. 14. Using the Provided Security Awareness Materials <ul><li>The following slides include a list of materials that may accompany this presentation and their recommended usages: </li></ul><ul><li>Key Considerations for Developing Effective Information Security Awareness and Training Programs – Document </li></ul><ul><ul><li>This document contains helpful information and tips about security awareness program development methodology and concepts. </li></ul></ul><ul><li>The Role of Information Security In Everyday Business – Presentation </li></ul><ul><ul><li>This customizable PowerPoint presentation deck uses the concepts outlined in the Key Considerations document and can be modified to suit an organization’s needs </li></ul></ul><ul><li>Consumer Security and Online Safety Messaging - Document </li></ul><ul><ul><li>This document gives talking points and pitch messages that describe current Microsoft and partner initiatives oriented toward consumer information security in addition to some useful general user security awareness message content. </li></ul></ul>
  15. 15. Using the Provided Security Awareness Materials <ul><li>Consumer Security Messaging Framework- Document </li></ul><ul><ul><li>This printable foldout document outlines messaging pillars, benefit statements, and top level support points that outline Microsoft’s efforts to improve end user security and security awareness. </li></ul></ul><ul><li>Family Safe Computing Group External Video- Video </li></ul><ul><ul><li>This video presents information for external audiences about the Family Safe Computing efforts by Microsoft to improve the family safety options available to consumers to protect their families online. </li></ul></ul><ul><li>Family Safe Computing Group Internal Video- Video </li></ul><ul><ul><li>This video presents information for internal audiences about Microsoft’s Family Safe Computing initiative that discusses the efforts and talking points relevant to the FSC initiative. </li></ul></ul><ul><li>Get Net Safe Deck- Presentation </li></ul><ul><ul><li>This PowerPoint presentation developed by Microsoft for the Get Net Safe Tour gives guidance to users about steps they can take to improve online security for themselves, their families, and their own computers. </li></ul></ul>
  16. 16. Using the Provided Security Awareness Materials <ul><li>Get Net Safe Posters: Blue & Green- Acrobat Document </li></ul><ul><ul><li>These posters were developed for the Get Net Safe Tour and outline simple steps users can follow to help them improve security at home with links for further information and help. </li></ul></ul><ul><li>Internet Security and Safety – Microsoft Ready- Presentation </li></ul><ul><ul><li>This Microsoft ready PowerPoint presentation gives useful end user guidance on steps they can take to improve security at home for safer internet usage for their family, themselves, and their computers. </li></ul></ul><ul><li>Internet Security and Safety – Partner Ready- Presentation </li></ul><ul><ul><li>This Microsoft partner ready PowerPoint presentation gives useful end user guidance on steps they can take to improve security at home for safer internet usage for their family, themselves, and their computers. </li></ul></ul><ul><li>Microsoft PSA Safety Radio- Acrobat Document </li></ul><ul><ul><li>This is a series of Microsoft sponsored public service announcement scripts for radio audiences that give some general security tips and links for more information. </li></ul></ul>
  17. 17. Using the Provided Security Awareness Materials <ul><li>Protect Your Family Brochures, factsheets, and videos: MS, Partner, and Elite – Acrobat Documents and video </li></ul><ul><ul><li>This series of materials offer end user guidance on steps they can take to help protect their families from online threats such as inappropriate content and online predators. </li></ul></ul><ul><li>Protect Your PC Brochures, factsheets, and videos: MS, Partner, and Elite – Acrobat Documents and video </li></ul><ul><ul><li>This series of materials offer end user guidance on steps people can take to help protect their computers at home from threats like viruses and spyware. </li></ul></ul><ul><li>Protect Yourself Brochures, factsheets, and videos: MS, Partner, and Elite – Acrobat Documents and video </li></ul><ul><ul><li>This series of materials offer end user guidance on steps people can take to help protect themselves from threats like identity theft and scams. </li></ul></ul>
  18. 18. Using the Provided Security Awareness Materials <ul><li>Windows Live Fact Sheet – Acrobat Document </li></ul><ul><ul><li>This fact sheet provides end user information about the security offerings available at Windows Live OneCare along with some tips about online safety and links to additional resources. </li></ul></ul><ul><li>Xbox Family Safety Brochure – Acrobat Document </li></ul><ul><ul><li>This brochure provides end user guidance about family safety features available for the Xbox gaming platform and some general guidance about ESRB game ratings and some other family safety tips. </li></ul></ul>
  19. 19. End User Security Awareness Resources <ul><li>Microsoft Security at Home – </li></ul><ul><li>Useful services, resources, and information to help users and families improve online safety. </li></ul><ul><li>Staysafe – </li></ul><ul><li>Home page for the non-profit Staysafe organization that offers online safety educational content for end users, educators, and families. </li></ul><ul><li>GetNetWise – </li></ul><ul><li>Home page for the GetNetWise non-profit organization with information about online safety for children and adults. </li></ul><ul><li>OnGuard Online – </li></ul><ul><li>Resources and information from a coalition of different governmental agencies concerning online safety and security awareness topics. </li></ul>
  20. 20. End User Security Awareness Resources <ul><li>i-SAFE – </li></ul><ul><li>Non-profit organization site dedicated to outreach and educational campaigns to keep children safe online, provides educational materials, services, and courses for teachers, students, parents, and law enforcement agencies. </li></ul><ul><li>NetSmartz – </li></ul><ul><li>Online partnership between the National Center for Missing & Exploited Children and the Boys and Girls Club of America that offers online child safety information and materials for educators, parents, law enforcement, and children. </li></ul><ul><li>CERT Coordination Center Home Network Tips – </li></ul><ul><li>This FAQ offers some more detailed technical information for end users about information security and what they can do to protect their home networks. </li></ul>
  21. 21. Best Practices <ul><li>Communicate to Users How this is important to them personally </li></ul><ul><li>People are more receptive to information that affects them personally or that they can identify with. When training give examples to how safe usage not only applies to the workplace but how it can be used at home as well. </li></ul><ul><li>Discuss Safe Practices in context with examples </li></ul><ul><li>Security awareness can seem dry to some people, keep everyone’s attention by citing examples the audience can identify with, use audience participation techniques, and convey the potential consequences with recent organizational incidents or recent high profile media events. </li></ul><ul><li>Inform users of security initiatives that may affect them </li></ul><ul><li>Keep everyone in the loop and keep communication lines open. Create an information security group with members from different business groups to establish lines of communication about security initiatives, get buy-in from management, and let the end user community know why security policies are necessary. </li></ul><ul><li>Understand the importance of End User Security Awareness Efforts </li></ul><ul><li>Remember that vulnerabilities are not only exploited from the outside, but can also be exploited from within your organization. Approach security awareness with the same seriousness as any other security related initiative, give the users the tools to help with security efforts. </li></ul>
  22. 22. Session Summary Remember that security awareness isn’t a one shot fix but a long term process designed to educate AND to change user behavior Deliver security information that users will view as being valuable to them personally and professionally Communicate with users, let them know why policies exist and why they are enforced for everyone Be mindful of security solutions that can impact usability and communicate the need to users whenever such solutions are implemented    
  23. 23. Next Steps <ul><li>More information on security topics: </li></ul><ul><li>Microsoft Security at Home Resources: </li></ul><ul><li>Find additional security training events: </li></ul><ul><ul><li> </li></ul></ul><ul><li>Sign up for security communications: </li></ul><ul><ul><li> </li></ul></ul><ul><li>Get additional security tools and content: </li></ul><ul><ul><li> </li></ul></ul><ul><li>Find additional e-learning clinics: </li></ul><ul><ul><li> </li></ul></ul>
  24. 24. Questions and Answers
  25. 25. BACKUP
  • AdelAnwar7

    Aug. 5, 2021
  • ChristineCruzCPCCPMA

    Dec. 6, 2020
  • KarenHunter15

    Mar. 24, 2020
  • DavidMcHale1

    Mar. 18, 2020
  • AlbetaJakabov

    Sep. 19, 2019
  • MushariAlamri

    Apr. 29, 2018
  • 4mwebdesign

    Mar. 8, 2018
  • satyapriyakollapudi

    Nov. 27, 2017
  • rajashilpi

    Nov. 27, 2017
  • abdulrahmanh

    Aug. 21, 2017

    Mar. 6, 2017
  • MichaelPierce58

    Oct. 6, 2016
  • calixtoong

    Sep. 24, 2016
  • HuynhCong

    Aug. 30, 2016
  • jiwanb

    Dec. 29, 2015
  • vishvastzaroo

    Sep. 7, 2015
  • HamdiAllaghi

    Jun. 1, 2015
  • m_hlayel

    May. 18, 2015
  • JetJequintoCISSPCISM

    Mar. 11, 2015
  • FocusBri

    Mar. 3, 2015

End User Security Awareness Presentation


Total de vistas


En Slideshare


De embebidos


Número de embebidos









Me gusta