๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Building an information security awareness program : defending against social engineering hacks

โœ Scribed by Bill Gardner


Publisher
Syngress Media Inc, Syngress, Elsevier Inc
Year
2014
Tongue
English
Leaves
198
Edition
1
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organizations staff of the risk and educate them on how to protect your organizations data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up.

Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the process of developing an engaging and successful training program for your organization that will help you and your staff defend your systems, networks, mobile devices, and data.

Forewords written by Dave Kennedy and Kevin Mitnick!



  • The most practical guide to setting up a Security Awareness training program in your organization
  • Real world examples show you how cyber criminals commit their crimes, and what you can do to keep you and your data safe
  • Learn how to propose a new program to management, and what the benefits are to staff and your company
  • Find out about various types of training, the best training cycle to use, metrics for success, and methods for building an engaging and successful program

โœฆ Table of Contents


Content:
Front Matter, Pages i-ii
Copyright, Page iv
Dedications, Page v
Forewords, Pages xi-xiii
Preface, Page xv
About the Authors, Page xvii
Acknowledgments, Pages xix-xx
Chapter 1 - What Is a Security Awareness Program?, Pages 1-8
Chapter 2 - Threat, Pages 9-13
Chapter 3 - Cost of a Data Breach, Pages 15-24
Chapter 4 - Most Attacks Are Targeted, Pages 25-32
Chapter 5 - Who Is Responsible for Security?, Pages 33-38
Chapter 6 - Why Current Programs Don't Work, Pages 39-43
Chapter 7 - Social Engineering, Pages 45-63
Chapter 8 - Physical Security, Pages 65-80
Chapter 9 - Types of Training, Pages 81-88
Chapter 10 - The Training Cycle, Pages 89-93
Chapter 11 - Creating Simulated Phishing Attacks, Pages 95-107
Chapter 12 - Bringing It All Together, Pages 109-117
Chapter 13 - Measuring Effectiveness, Pages 119-124
Chapter 14 - Stories from the Front Lines, Pages 125-157
Appendices, Pages 159-190
Index, Pages 191-194


๐Ÿ“œ SIMILAR VOLUMES


Building an Information Security Awarene
โœ Mark B. Desman ๐Ÿ“‚ Library ๐Ÿ“… 2001 ๐ŸŒ English

In his latest book, a pre-eminent information security pundit confessed that he was wrong about the solutions to the problem of information security. It's not technology that's the solution, but the human factor-people. But even infosec policies and procedures are insufficient if employees don't kno

Defending APIs against Cyber Attack: Lea
โœ Colin Domoney ๐Ÿ“‚ Library ๐Ÿ“… 2023 ๐Ÿ› Packt Publishing Ltd. ๐ŸŒ English

Along with the exponential growth of API adoption comes a rise in security concerns about their implementation and inherent vulnerabilities. For those seeking comprehensive insights into building, deploying, and managing APIs as the first line of cyber defense, this book offers invaluable guidance.

Managing an Information Security and Pri
โœ Rebecca Herold ๐Ÿ“‚ Library ๐Ÿ“… 2010 ๐Ÿ› CRC Press ๐ŸŒ English

<P>Starting with the inception of an education program and progressing through its development, implementation, delivery, and evaluation, <STRONG>Managing an Information Security and Privacy Awareness and Training Program, Second Edition</STRONG> provides authoritative coverage of nearly everything

Building Secure Defenses Against Code-Re
โœ Lucas Davi, Ahmad-Reza Sadeghi (auth.) ๐Ÿ“‚ Library ๐Ÿ“… 2015 ๐Ÿ› Springer International Publishing ๐ŸŒ English

<p><p>This book provides an in-depth look at return-oriented programming attacks. It explores several conventional return-oriented programming attacks and analyzes the effectiveness of defense techniques including address space layout randomization (ASLR) and the control-flow restrictions implemente