19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

S 2.197 Drawing up a training concept for <strong>IT</strong> security<br />

Initiation responsibility: <strong>IT</strong> Security Management Team<br />

Implementation responsibility: Line managers, <strong>IT</strong> Security Management<br />

Team<br />

<strong>The</strong> shared task of "<strong>IT</strong> security" can only be performed in the proper manner if<br />

everyone involved in the <strong>IT</strong> security process has a reasonable level of<br />

knowledge about <strong>IT</strong> security generally and in particular about the dangers and<br />

countermeasures in their own particular work areas. Although ultimately all<br />

users should be motivated to keep up-to-date on their own initiative,<br />

nevertheless it is up to line managers to help them do this by providing<br />

suitable training courses. Given the large range of possible training topics and<br />

the importance of <strong>IT</strong> security, a co-ordinated approach is required in the<br />

selection of training content. This must be presented and documented in<br />

training concepts.<br />

In larger organisations with heterogeneous workstations, a single concept will<br />

generally not be sufficient. Instead, it will be necessary to tailor training<br />

concepts by scope and content to the importance and complexity of <strong>IT</strong> use in<br />

each target group. For example, an <strong>IT</strong> administrator or software developer<br />

obviously needs to know more about <strong>IT</strong> security than a commercial person or<br />

a typist. <strong>The</strong> first stage in drafting an <strong>IT</strong> security training concept is therefore<br />

to assign the staff of an organisation to target groups so that a separate<br />

training concept can be prepared for each of them. It is important to ensure<br />

here that every employee whose field of work involves <strong>IT</strong> either directly or<br />

indirectly is allocated to one of these groups, that implementation of this<br />

concept is verifiable and that evidence that training has taken place is retained.<br />

This ensures that training is of the appropriate breadth and depth.<br />

<strong>The</strong> <strong>IT</strong> security training concepts must be prepared in close co-ordination with<br />

the other training concepts of a company/agency, especially with training<br />

courses for <strong>IT</strong> users. <strong>The</strong> extent to which it is possible to integrate training<br />

topics on <strong>IT</strong> security into courses for <strong>IT</strong> users should be considered here.<br />

Including <strong>IT</strong> security within the syllabus of such courses has the advantage<br />

that <strong>IT</strong> security is perceived directly as another aspect of the use of <strong>IT</strong>. It is<br />

essential here that the lecturers demonstrably have the right skills and<br />

expertise. In the design of training courses it is critical that the "<strong>IT</strong> security"<br />

component is given sufficient coverage within the overall plan. A brief talk on<br />

the subject on a Friday between 1 p.m. and 2 p.m. is definitely not sufficient.<br />

An <strong>IT</strong> security training concept should contain as a minimum the following<br />

points for all <strong>IT</strong> users:<br />

- Risks and threats in <strong>IT</strong> use<br />

- Basic terms and basic parameters of <strong>IT</strong> security<br />

- <strong>The</strong> organisation-wide <strong>Information</strong> Security Policy - what does this mean<br />

to my everyday work?<br />

- Responsibilities and reporting channels in our organisation (to include<br />

introducing the <strong>IT</strong> Security Officer)<br />

- How can I contribute to <strong>IT</strong> security?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Sufficiently<br />

knowledgeable<br />

Specific requirements<br />

Target groups<br />

Integration with existing<br />

training concepts<br />

Minimum content

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!