19.12.2012 Views

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

IT Baseline Protection Manual - The Information Warfare Site

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Safeguard Catalogue - Organisation Remarks<br />

____________________________________________________________________ .........................................<br />

- How can I tell if a security-relevant incident has occurred and what should<br />

I do?<br />

- How can I educate and inform myself in matters of <strong>IT</strong> security?<br />

Depending on the type and depth of <strong>IT</strong> use, additional topics should be<br />

included for particular target groups, for example:<br />

- secure electronic communication,<br />

- security aspects of particular <strong>IT</strong> systems and applications,<br />

- secure software development and<br />

- drawing up and audit of <strong>IT</strong> security concepts.<br />

In each case it is necessary to check which subjects can be handled by inhouse<br />

staff and which ones would be better dealt with through external<br />

courses. External courses are especially necessary for fields of work where <strong>IT</strong><br />

penetration and complexity are high, and for the training of staff who will be<br />

responsible for <strong>IT</strong> security, whose training is particularly critical.<br />

Due to the speed at which <strong>IT</strong> changes, knowledge previously acquired rapidly<br />

becomes out of date. New <strong>IT</strong> systems, and also new threats, vulnerabilities<br />

and possible defensive measures make it imperative that knowledge of <strong>IT</strong><br />

security matters is continually refreshed and extended. Training provision on<br />

these matters should therefore not be directed solely at new staff but refresher<br />

and supplementary courses should be provided at regular intervals for<br />

experienced <strong>IT</strong> users as well. With this in mind, it is important that the<br />

training concepts are updated regularly and modified to new circumstances as<br />

necessary.<br />

To keep training knowledge constantly updated it is important to closely coordinate<br />

training courses and measures aimed at promoting awareness of <strong>IT</strong><br />

security issues (see also S 2.198 Making staff aware of <strong>IT</strong> security issues).<br />

Thus, for example, training courses should refer to existing information<br />

sources and especially to the possibilities available for further private study<br />

(self-study courses, books etc). An example of a target group-specific training<br />

concept will be found on the CD-ROM (see appendix on Additional Aids, in<br />

German only).<br />

Additional controls:<br />

- Are written <strong>IT</strong> and <strong>IT</strong> security training concepts available for all <strong>IT</strong> user<br />

groups in the organisation?<br />

- Is the <strong>IT</strong> Security Management Team involved in the planning and delivery<br />

of <strong>IT</strong> training?<br />

- Do update plans exist for training concepts and are these adhered to?<br />

____________________________________________________________________ .........................................<br />

<strong>IT</strong>-<strong>Baseline</strong> <strong>Protection</strong> <strong>Manual</strong>: Oktober 2000<br />

Specific content<br />

Selection of suitable<br />

lecturers<br />

Updating of knowledge<br />

Training and security<br />

awareness

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!