Security Awareness For Dummies. Ira Winkler
Чтение книги онлайн.

Читать онлайн книгу Security Awareness For Dummies - Ira Winkler страница 3

СКАЧАТЬ Simple Finding a Problem to Solve Establishing Credibility Highlighting Actual Incidents Being Responsive Looking for Similar Programs Chapter 14: Ten Ways to Make Friends and Influence People Garnering Active Executive Support Courting the Organization’s Influencers Supporting Another Project That Has Support Choosing Topics Important to Individuals Having Some Fun Events Don’t Promise Perfection Don’t Overdo the FUD Factor Scoring an Early Win Using Real Gamification Integrating the Organization’s Mission Statement Chapter 15: Ten Fundamental Awareness Topics Phishing Business Email Compromise Mobile Device Security Home Network and Computer Security Password Security Social Media Security Physical Security Malware and Ransomware Social Engineering It Can Happen to You Chapter 16: Ten Helpful Security Awareness Resources Security Awareness Special Interest Group CybSafe Research Library Cybersecurity Culture Guidelines RSA Conference Library You Can Stop Stupid The Work of Sydney Dekker Human Factors Knowledge Area People-Centric Security Human Security Engineering Consortium How to Run a Security Awareness Program Course

      9  Appendix: Sample Questionnaire Questions for the CISO or Similar Position Questions for All Employees Questions for the HR Department Questions for the Legal Department Questions for the Communications Department Questions Regarding the Appropriate Person for Physical Security

      10  Index

      11  About the Author

      12  Advertisement Page

      13  Connect with Dummies

      14  End User License Agreement

      List of Illustrations

      1 Chapter 3FIGURE 3-1: The ABCs of awareness.FIGURE 3-2: The ABCs of behavioral science.FIGURE 3-3: The Forgetting Curve.

      2 Chapter 9FIGURE 9-1: A sample quarterly awareness program interspersing topics.

      3 Chapter 10FIGURE 10-1: Consolidated metrics dashboard.FIGURE 10-2: Mobile device loss.FIGURE 10-3: Phishing results bar graph.

      Guide

      1  Cover

      2  Title Page

      3  Copyright

      4 Table of Contents

      5  Begin Reading

      6  Appendix: Sample Questionnaire

      7  Index

      8  About the Author

      Pages

      1  i

      2  ii

      3  1

      4  2

СКАЧАТЬ