Читать книгу Security Awareness For Dummies - Ira Winkler - Страница 3
Security Awareness For Dummies® To view this book's Cheat Sheet, simply go to www.dummies.com and search for “Security Awareness For Dummies Cheat Sheet” in the Search box. Table of Contents
Оглавление1 Cover
4 Introduction About This Book Foolish Assumptions Icons Used in This Book Beyond the Book Where to Go from Here
5 Part 1: Getting to Know Security Awareness Chapter 1: Knowing How Security Awareness Programs Work Understanding the Benefits of Security Awareness Knowing How Security Awareness Programs Work Recognizing the Role of Awareness within a Security Program Disputing the Myth of the Human Firewall Chapter 2: Starting On the Right Foot: Avoiding What Doesn’t Work Making a Case Beyond Compliance Standards Treating Compliance as a Must Limiting the Popular Awareness Theories Distinguishing Social Engineering from Security Awareness Addressing Mental Models That Don’t Work Making Perfection the Stated Goal Measuring from the Start Prioritizing Program Over Product Choosing Substance Over Style Understanding the Role of Security Awareness Chapter 3: Applying the Science Behind Human Behavior and Risk Management Achieving Common Sense through Common Knowledge Borrowing Ideas from Safety Science Applying Accounting Practices to Security Awareness Applying the ABCs of Awareness Benefiting from Group Psychology Remembering That It’s All About Risk
6 Part 2: Building a Security Awareness Program Chapter 4: Creating a Security Awareness Strategy Identifying the Components of an Awareness Program Figuring Out How to Pay for It All Chapter 5: Determining Culture and Business Drivers Understanding Your Organization’s Culture Identifying Subcultures Interviewing Stakeholders Partnering with Other Departments Chapter 6: Choosing What to Tell The Users Basing Topics on Business Drivers Incorporating Personal Awareness Topics Motivating Users to Do Things “Right” Common Topics Covered in Security Awareness Programs Chapter 7: Choosing the Best Tools for the Job Identifying Security Ambassadors Knowing the Two Types of Communications Tools Exploring Your Communications Arsenal Chapter 8: Measuring Performance Knowing the Hidden Cost of Awareness Efforts Meeting Compliance Requirements Collecting Engagement Metrics Measuring Improved Behavior Demonstrating a Tangible Return on Investment Recognizing Intangible Benefits of Security Awareness Knowing Where You Started: Day 0 Metrics
7 Part 3: Putting Your Security Awareness Program Into Action Chapter 9: Assembling Your Security Awareness Program Knowing Your Budget Choosing to Implement One Program or Multiple Programs Gaining Support from Management Devising a Quarterly Delivery Strategy Deciding Whether to Include Phishing Simulations Planning Which Metrics to Collect and When Branding Your Security Awareness Program Chapter 10: Running Your Security Awareness Program Nailing the Logistics Getting All Required Approvals Getting the Most from Day 0 Metrics Creating Meaningful Reports Reevaluating Your Program Redesigning Your Program Considering Breaking News and Incidents Chapter 11: Implementing Gamification Understanding Gamification Identifying the Four Attributes of Gamification Figuring Out Where to Gamify Awareness Examining Some Tactical Gamification Examples Putting Together a Gamification Program Promoting the Program Chapter 12: Running Phishing Simulation Campaigns Knowing Why Phishing Simulations Matter Setting Goals for Your Phishing Program Planning a Phishing Program Choosing a Phishing Tool Implementing a Phishing Simulation Program Running a Phishing Simulation Tracking Metrics and Identifying Trends Dealing with Repeat Offenders Management Reporting
8 Part 4: The Part of Tens Chapter 13: Ten Ways to Win Support for Your Awareness Program Finding Yourself a Champion Setting the Right Expectations Addressing Business Concerns Creating an Executive Program Starting Small and Simple Finding a Problem to Solve Establishing Credibility Highlighting Actual Incidents Being Responsive Looking for Similar Programs Chapter 14: Ten Ways to Make Friends and Influence People Garnering Active Executive Support Courting the Organization’s Influencers Supporting Another Project That Has Support Choosing Topics Important to Individuals Having Some Fun Events Don’t Promise Perfection Don’t Overdo the FUD Factor Scoring an Early Win Using Real Gamification Integrating the Organization’s Mission Statement Chapter 15: Ten Fundamental Awareness Topics Phishing Business Email Compromise Mobile Device Security Home Network and Computer Security Password Security Social Media Security Physical Security Malware and Ransomware Social Engineering It Can Happen to You Chapter 16: Ten Helpful Security Awareness Resources Security Awareness Special Interest Group CybSafe Research Library Cybersecurity Culture Guidelines RSA Conference Library You Can Stop Stupid The Work of Sydney Dekker Human Factors Knowledge Area People-Centric Security Human Security Engineering Consortium How to Run a Security Awareness Program Course
9 Appendix: Sample Questionnaire Questions for the CISO or Similar Position Questions for All Employees Questions for the HR Department Questions for the Legal Department Questions for the Communications Department Questions Regarding the Appropriate Person for Physical Security
10 Index