Chapter 6: Personnel Security. 2 Objectives  Describe the role of security in personnel practices  Develop secure recruiting & interviewing procedures.

Slides:



Advertisements
Similar presentations
The Role of the IRB An Institutional Review Board (IRB) is a review committee established to help protect the rights and welfare of human research subjects.
Advertisements

St. Louis Public Schools Human Resources Support for District Improvement Initiatives (Note: The bullets beneath each initiative indicate actions taken.
Work-based learning Click on the speaker on each slide to learn more!
What is HIPAA? This presentation was created by The University of Arizona Privacy Office, The Office for the Responsible Conduct of Research on March 5,
Ethics Ethics are the rules of personal behavior and conduct established by a social group for those existing within the established framework of the social.
CREATED BY: HMIS Security Awareness Approved 1/10/2012 Revised 1/29/2013 Revised 3/15/2013.
Chapter 4: Security Policy Documents & Organizational Security Policies.
Security and Personnel
Hands-On Ethical Hacking and Network Defense
Environmental Management Systems An Overview With Practical Applications.
Security Controls – What Works
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
Stephen S. Yau 1CSE Fall 2006 Personnel Security.
TEL382 Greene Chapter 6. 2 Outline Introduction First Contact Employee Agreements Training Security Education, Training and Awareness Security Incident.
Computer Security: Principles and Practice
Computer Security Fundamentals
Network security policy: best practices
Developing a Security Policy Chapter 2. Learning Objectives Understand why a security policy is an important part of a firewall implementation Determine.
Employee Orientation and Training
Computer Security: Principles and Practice
Module 3 1x1 Class Mock Interview  Structured Interview ◦ Uses a set of standardized questions asked of all job applicants. ◦ Useful for initial.
SEC835 Database and Web application security Information Security Architecture.
SUPERVISING STUDENT EMPLOYEES August 13, 2002 Office of Human Resources Office of the General Counsel.
HIPAA PRIVACY AND SECURITY AWARENESS.
Implementing Security Education, Training, and Awareness Programs
SECURITY POLICIES Indu Ramachandran. Outline General idea/Importance of security policies When security policies should be developed Who should be involved.
An Educational Computer Based Training Program CBTCBT.
Human Resources Federal Regulations and Review Findings.
1 General Awareness Training Security Awareness Module 1 Overview and Requirements.
Security Awareness: Applying Practical Security in Your World Chapter 1: Introduction to Security.
Coding Compliance Plan July 12, Benefits of a compliance program  To demonstrate our commitment to honest and responsible conduct, decrease the.
Corporate Responsibility Regulatory Compliance “Systems that ensure all students are aware of laws and regulations and act in accordance of those regulations”
Policy Review (Top-Down Methodology) Lesson 7. Policies From the Peltier Text, p. 81 “The cornerstones of effective information security programs are.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Human Resource Management, 8th Edition
Information Security Governance and Risk Chapter 2 Part 3 Pages 100 to 141.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
Roadmap For An Effective Compliance And Ethics Program The Top Ten Things the Board Must Know [Name of Presenter] [Title] [Date]
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Chapter 11: Policies and Procedures Security+ Guide to Network Security Fundamentals Second Edition.
Chapter 16 Presented By: Stephen Lambert Disaster Recovery and Business Continuity.
1 Privacy Plan of Action © HIPAA Pros 2002 All rights reserved.
Networked Systems Survivability CERT ® Coordination Center Software Engineering Institute Carnegie Mellon University Pittsburgh, PA © 2002 Carnegie.
Security Training and Awareness Brad Reed, IT Security Analyst OIT – Information Security Office Securing the University – ITSS 2015.
CHAPTER 6 Selecting Employees and Placing Them in Jobs
Data Ethics Levette Williams Associate Superintendent Technology Services Brad Bryant, State Superintendent of Schools “We will lead the nation in improving.
HIPAA Compliance Case Study: Establishing and Implementing a Program to Audit HIPAA Compliance Drew Hunt Network Security Analyst Valley Medical Center.
FERPA: An introduction to the Family Educational Rights and Privacy Act Presented by: Kristy Giacomelli Assistant Registrar
© BLR ® —Business & Legal Resources 1501 Essential HR For Those Who Have Recently Assumed HR Responsibilities.
Employment Workshop - Work Basics Facilitator- C.Piggott Women’s Group.
Implementing Security Education, Training, and Awareness Programs By: Joseph Flynn.
Introduction to SEPAP: An Explanation of the Program  Importance of employee participation in the appraisal process  Learn the three phases of SEPAP.
Did you find the instructor contact information and office hours? Have you reviewed the upcoming assignments and due dates? Any questions on the grading.
Lecturer: Eng. Mohamed Adam Isak PH.D Researcher in CS M.Sc. and B.Sc. of Information Technology Engineering, Lecturer in University of Somalia and Mogadishu.
The Health Insurance Portability and Accountability Act (HIPAA) requires Plumas County to train all employees in covered departments about the County’s.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Roadmap For An Effective Compliance And Ethics Program
Data Sharing, Storage, & Consent
IS4680 Security Auditing for Compliance
Chapter 3: IRS and FTC Data Security Rules
Chapter 11 Managing Human Resource Systems
Data Sharing, Storage, & Consent
Human Resource Management, 8th Edition
County HIPAA Review All Rights Reserved 2002.
Human Resources Management Policies and Procedures
Drew Hunt Network Security Analyst Valley Medical Center
Legal Issues and School Leadership
Recruitment & Selection Process For Talent Acquisition
Presentation transcript:

Chapter 6: Personnel Security

2 Objectives  Describe the role of security in personnel practices  Develop secure recruiting & interviewing procedures  Evaluate confidentiality & employee security agreements  Understand appropriate security education, training & awareness programs  Design an incident reporting program  Create personnel-related security policies and procedures

3 Introduction Personnel-related policies are mostly the responsibility of the Human Relations (HR) department Aspects of personnel security may involve the training department, legal counsel and employee unions or associations Employees are simultaneously the organization’s most valuable assets and its most dangerous risks Employees must receive information security training

4 First Contact  Risks and rewards of posting online employment ads: A company can reach a wider audience A company can publish an ad that gives too much information:  About the network infrastructure and therefore allow a hacker to footprint the internal network easily and stealthily  About the company itself, inviting social engineering attacks

5 Job Descriptions Job descriptions are supposed to:  Convey the mission of the organization  Describe the position in general terms  Outline the responsibilities attached to said position  Outline the company’s commitment to security via the use of such terms as non-disclosure agreement

6 Job Descriptions Cont. Job descriptions are NOT supposed to:  Include information about the internal network, such as types of servers deployed, types of routers deployed, and any other information that would allow a hacker to map the infrastructure of the internal network It’s harder to hack a network if one doesn’t know the types of hardware & software  If the above information is deemed necessary, make the ad be anonymous

7 The Interview Job Interview:  The interviewer should be concerned about revealing too much about the company during the interview  Job candidates should never gain access to secured areas  A job interview is a perfect foot-printing opportunity for hackers and social engineers

8 Who Is This Person?  An organization should protect itself by running extensive background checks on potential employees at all levels of the hierarchy  Some higher level positions may require even more in-depth checks  In the military, information and users have a clearance level Note that clearance level is not all they need: they also need a demonstrated need to know to access data

9 Types of Background Checks  The company should have a basic background check level to which all employees are subjected  Information owners may require more in-depth checks for specific roles  Workers also have a right to privacy: not all information is fair game to gather – only information relevant to the actual work they perform  Companies should seek consent from employees before launching a background check

10 Types of Background Checks Cont.  Educational records fall under FERPA. Schools must first have written authorization before they can provide student-related information  Motor vehicle records fall under DPPA, which means that the DMV – or its employees – are not allowed to disclose information obtained by the department  The FTC allows the use of credit reports prior to hiring employees as long as companies do so in accordance with the Fair Credit Reporting Act

11 Types of Background Checks Cont.  Bankruptcies may not be used as the SOLE reason to not hire someone according to Title 11 of the US Bankruptcy Code  Criminal history: the use of this sort of information varies from state to state  Worker’s compensation records: in most states, these records are public records, but their use may not violate the Americans with Disabilities Act

12 The Importance of Employee Agreements  Confidentiality agreements Agreement between employees and organization Defines what information may not be disclosed by employees Goal: to protect sensitive information Especially important in these situations:  When an employee is terminated or leaves  When a third-party contractor was employed

13 The Importance of Employee Agreements Cont. Affirmation Agreements  Focuses on why acceptable use policies were created and the importance of compliance  It is a teaching tool that serves as a guideline when an employee is faced with a situation not explicitly covered in the policy

14 The Importance of Employee Agreements Cont. Affirmation Agreements  Should include the following topics: Acceptable use of information resources Internet use use Incidental use of information resources Password management Portable computers

15 The Importance of Employee Agreements Cont. Affirmation Agreements  Agreement should end with a commitment paragraph acknowledging that: The user has read the agreement The user understands the agreement The user understands the consequences of violating the agreement The user agrees to act in accordance with the policies set forth

16 The Importance of Employee Agreements Cont. Affirmation Agreements  The agreement should be dated and signed by the employee.  The signing of the agreement should be witnessed  An appendix of definitions should be provided to the user

17 Training Important? Training employees  According to NIST: “Federal agencies […] cannot protect […] information […] without ensuring that all people involved […]: Understand their role and responsibilities related to the organization’s mission Understand the organization’s IT security policy, procedures and practices Have at least adequate knowledge of the various management, operational and technical controls required and available to protect the IT resources for which they are responsible”

18 Training Important? Cont. Hackers adapt: if it is easier to use social engineering – i.e. targeting users – rather than hack a network device, that is the road hackers will take Only securing network devices and neglecting to train users on information security topics is ignoring half of the threats against the company

19 SETA for All What is SETA?  Security Education Training and Awareness  Awareness is not training: it is focusing the attention of employees on security topics in order to change their behavior  Security awareness campaigns should be scheduled regularly  Security training “seeks to teach skills” (per NIST)  Security training should NOT be only dispensed to the technical staff but to all employees

20 SETA for All Cont. What is SETA?  Education: a common body of knowledge should be developed for all employees  Specific bodies of knowledge should be developed for specific roles in the company  SETA funding should be codified in the security policy so that it is not slashed at the first opportunity  GLBA and HIPAA both include security training requirements as part of compliance

21 Security Incident Reporting Is Everyone’s Responsibility  It is the responsibility of ALL employees to report security incidents  Anytime data confidentiality, integrity and/or availability is threatened, a security incident report should be filed  Users must be vigilant and trained to recognize and report security incidents  Reporting security incidents must become a part of the corporate culture

22 Security Incident Reporting Is Everyone’s Responsibility Cont.  A security incident reporting program should feature the following three ingredients: Training users to recognize suspicious incidents Implementing an easy incident reporting system Staff involved in the investigation of the incident should report back to the employees who reported it to show that the report was not dismissed and encourage future reports

23 Testing the Procedures  The security incident reporting program should be tested to make sure that it works and that it provides investigators with the information they need  Testing should not occur without knowledge and approval from senior management  Testing should NOT be advertised to employees to get accurate results

24 Testing the Procedures Cont.  Testing the security incident reporting system should focus on the two following topics: How did the employees respond to the incident?  Did they apply techniques and procedures learned during training? Did the employees report the incident?  Results should be documented and analyzed. If necessary, training material should be edited for clarity or new procedures

25 Summary  A security policy that does not include personnel as a permanent threat to the data owned by the company is incomplete. Social engineering is more virulent than ever.  Failing to train users on security topics is a bad mistake, and may result in a lack of compliance for some federal mandates.  Regular awareness campaigns should be conducted. An incident reporting system should be created and tested.