Building an Information Security Awareness Program :Defending Against Social Engineering and Technical Threats

Publication subTitle :Defending Against Social Engineering and Technical Threats

Author: Gardner   Bill;Thomas   Valerie  

Publisher: Elsevier Science‎

Publication year: 2014

E-ISBN: 9780124199811

P-ISBN(Paperback): 9780124199675

P-ISBN(Hardback):  9780124199675

Subject: TP3 Computers;TP309 安全保密

Language: ENG

Access to resources Favorite

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Description

The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up.

Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data.

Forewords written by Dave Kennedy and Kevin Mitnick!

  • The most practical guide to setting up a Security Awareness training program in your organization
  • Real world examples show you how cyber criminals commit their crimes, and what you can do to keep you and your data safe
  • Learn how to propose a new program to management, and what the benefits are to staff and your company
  • Find out about various types of training, the best training cycle to use, metrics for success, and methods for building

Chapter

Forewords

Preface

About the Authors

Acknowledgments

Chapter 1: What Is a Security Awareness Program?

Introduction

Policy Development

Policy Enforcement

Cost Savings

Production Increases

Management Buy-In

Notes

Chapter 2: Threat

The Motivations of Online Attackers

Money

Industrial Espionage/Trade Secrets

Hacktivism

Cyber War

Bragging Rights

Notes

Chapter 3: Cost of a Data Breach

Ponemon Institute

HIPAA

The Payment Card Industry Data Security Standard (PCI DSS)

State Breach Notification Laws

Notes

Chapter 4: Most Attacks Are Targeted

Targeted Attacks

Recent Targeted Attacks

Targeted Attacks Against Law Firms

Operation Shady Rat

Operation Aurora

Night Dragon

Watering Hole Attacks

Common Attack Vectors: Common Results

Notes

Chapter 5: Who Is Responsible for Security?

Information Technology (IT) Staff

The Security Team

The Receptionist

The CEO

Accounting

The Mailroom/Copy Center

The Runner/Courier

Everyone Is Responsible for Security

Notes

Chapter 6: Why Current Programs Don't Work

The Lecture Is Dead as a Teaching Tool

The Seven Learning Styles

Notes

Chapter 7: Social Engineering

What Is Social Engineering?

Who Are Social Engineers?

Why Does It Work?

How Does It Work?

Information Gathering

The Company Website

Social Media

Search Engines

The Dumpster

The Popular Lunch Spot

Attack Planning and Execution

Jerry the Attacker

The Spear Phishing E-mail

Hello, Help Desk?

The Social Engineering Defensive Framework (SEDF)

Determine Exposure

Evaluate Defenses

Employees

Defenders

Educate Employees

Streamline Existing Technology and Policy

Planning a Tabletop Exercise

The Design Phase

The Execution Phase

The After-action Phase

Preventative Tips

Putting It All Together

Where can I Learn More About Social Engineering?

Notes

Chapter 8: Physical Security

What Is Physical Security?

Outer Perimeter Security

Inner Perimeter Security

Interior Security

Physical Security Layers

Deterrence

Control

Detection

Identification

Threats to Physical Security

Why Physical Security Is Important to an Awareness Program

How Physical Attacks Work

Reconnaissance

Off-site Reconnaissance

Maps

The Company Website

Additional Sources

On-Site Reconnaissance

Surveillance

Real Estate Meeting

RFID Credential Stealing

Attack Planning

Attack Execution

Minimizing the Risk of Physical Attacks

Preparing for a Physical Assessment

Set an Objective

Declare Off-Limits Areas

Schedule

Authorization Letter

Can't Afford a Physical Security Assessment?

Notes

Chapter 9: Types of Training

Training Types

Formal Training

In-Person Training

Advantages

Disadvantages

Computer-Based Training

Advantages

Disadvantages

Web-Based Training

Advantages

Disadvantages

Video Training

Advantages

Disadvantages

Informal Training

Lunch and Learn Sessions

Homemade Video Campaign

Posters

Notes

Chapter 10: The Training Cycle

The Training Cycle

New Hire

Quarterly

Why Quarterly?

Biannual

Continual

Point of Failure

Targeted Training

Sample Training Cycles

Minimal

Moderate

Robust

Adjusting Your Training Cycle

Notes

Chapter 11: Creating Simulated Phishing Attacks

Simulated Phishing Attacks

Understanding the Human Element

Methodology

Open-source Tool, Commercial Tool, or Vendor Performed?

Open-Source Tool

Pros

Cons

Commercial Tool

Pros

Cons

Selecting a Commercial Tool

Vendor Performed

Pros

Cons

Before You Begin

Determine Attack Objective

Select Recipients

Select a Type of Phishing Attack

General

Company-Specific

Spear Phishing

Composing the E-Mail

Formatting the Link

Creating the Landing Page

Sending the E-Mail

Timing is Everything

Tracking Results

Post Assessment Follow-up

Notes

Chapter 12: Bringing It All Together

Create a Security Awareness Website

Sample Plans

Low Budget

New Hire Training

Biannual Training

Continual Training

Phishing Assessment

Moderate Budget

New Hire Training

Biannual Training

Continual Training

Phishing Assessment

Large Budget

New Hire Training

Biannual Training

Continual Training

Phishing Assessment

Promoting Your Awareness Program

Contests and Prizes

Announcements

National Cyber Security Awareness Month

Notes

Chapter 13: Measuring Effectiveness

Measuring Effectiveness

Measurements vs. Metrics

Creating Metrics

Metric Name

What Is Measured

How It's Measured

When It's Measured

Who Measures

Additional Measurements

Reporting Metrics

Building Your Presentation

Introduction

How Metrics Were Derived

The Metrics

Notes

Chapter 14: Stories from the Front Lines

Phil Grimes

Amanda Berlin

Jimmy Vo

Security Research at Large Information Security Company

Harry Regan

Tess Schrodinger

Security Analyst at a Network Security Company

Ernie Hayden

Appendices

Appendix A: Government Resources

NIST Special Publication 800-16

NIST Special Publication 800-16 Appendix A-D

NIST Special Publication 800-16 Appendix E

Statement of Work Computer Security Awareness and Training: April 2000

NIST Special Publication 800-50: Building an Information Technology Security Awareness and Training Program

US Department of Health and Human Services: Security Awareness and Training

National Initiative for Cybersecurity Careers and Studies

NIH Information Security Awareness Course

National Cyber Security Awareness Month

Cyber Security Tips: US-CERT

Cyber Security Alerts: US-CERT

Information Security Awareness Training for Texas

Florida Department of Children and Families

Information Security Awareness Training Family Educational Rights and Privacy Act (FERPA)

Appendix B: Security Awareness Tips

Stop.Think.Connect

StaySafeOnline

Appendix C: Sample Policies

SANS: Information Security Policy Templates

Open-Source Security Awareness Training Resources

Appendix D: Commercial Security Awareness Training Resources

SANS: Securing The Human

The Security Awareness Company

Kevin Mitnick Security Awareness Training: KnowBe4

The Roer Group: The Security Culture Company

Appendix E: Other Web Resources and Links

SANS: The Importance of Security Awareness Training

Schneier on Security: Security Awareness Training

Building a Security Awareness Program: Cyberguard

Security Awareness Toolbox: The Information Warfare Site

SANS Reading Room: Security Awareness Section

Security Awareness Posters

Cyber Security Awareness Challenge 2.0

Appendix F: Technical Tools That Can Be Used to Test Security Awareness Programs

Kali Linux

Social-Engineer Toolkit

SpearPhisher

Appendix G: The Security Awareness Training Framework

Purpose/Project Charter

Deliverables

Components and Subteams

Taxonomy/Classification Team

Documentation/Artifact Team

Research/Outreach Team

Communications/Social Media Team

The History of the Security Awareness Training Framework

The Mission of the Security Awareness Training Framework

Define the Components

Understand How People Learn Information Security Awareness

Develop Feedback Mechanisms and Standardized Reporting Metrics

Appendix H: Building a Security Awareness Training Program Outline

Appendix I: State Security Breach Notification Laws

Appendix J: West Virginia State Breach Notification Laws, W.V. Code 46A-2A-101 ET SEQ

Appendix K: HIPAA Breach Notification Rule

Definition of Breach

Unsecured Protected Health Information and Guidance

Breach Notification Requirements

Individual Notice

Media Notice

Notice to the Secretary

Notification by a Business Associate

Administrative Requirements and Burden of Proof

Instructions for Submitting Notice of a Breach to the Secretary

Breaches Affecting 500 or More Individuals

Breaches Affecting Fewer than 500 Individuals

Federal Trade Commission (FTC) Health Breach Notification Rule

Appendix L: Complying with the FTC Health Breach Notification Rule

Who's Covered by the Health Breach Notification Rule

You're not a Vendor of Personal Health Records If You're Covered by HIPAA

Third-Party Service Provider

What Triggers the Notification Requirement

What to Do If a Breach Occurs

Who You Must Notify and When You Must Notify Them

How to Notify People

What Information to Include

Answers to Questions About the Health Breach Notification Rule

We're an HIPAA Business Associate, but We Also Offer Personal Health Record Services to the Public. Which Rule Applies to Us?

What's the Penalty for Violating the FTC Health Breach Notification Rule?

Law Enforcement Officials Have Asked Us to Delay Notifying People About the Breach. What Should We Do?

Where Can I Learn More About the FTC Health Breach Notification Rule? Visit www.ftc.gov/healthbreach.

Your Opportunity to Comment

Appendix L: Information Security Conferences

Appendix M: Recorded Presentations on How to Build an Information Security Awareness Program

Appendix N: Articles on How to Build an Information Security Awareness Program

Index

The users who browse this book also browse