Information Security Awareness Levels of TAFE South Australia Employees Hong Chan Bachelor of IT ( Honours ) Supervisor: Dr Sameera Mubarak.

Slides:



Advertisements
Similar presentations
What is Primary Research and How do I get Started?
Advertisements

Integrity and impartiality
Head Teacher Forum 23 June 2010 Managing your business! Code of Conduct Update Tina Renshaw – Regional Human Resources Manager.
a ADOPTION OF E-LEARNING BY THE ACADEMIC AND INDUSTRY STAFF
Unit 4- Assignment 3 P5, P6, M2 BTEC Business Level 3.
EXTERNAL Corruption Prevention NetworkJuly 2007Fraud Control Planning Tax Office Fraud Control Planning: Tools and Techniques PRESENTED BY: Annalissa Hilton.
Corporate Social Responsibility in the Road Sector Dr Andy Southern -Atkins (UK) Alexander Walcher -Asfinag (Austria)
Confidentiality & Records Management. What is Information Governance? What is Records Management?
Security Controls – What Works
1 Pertemuan 17 Organisational Back Up Matakuliah:A0334/Pengendalian Lingkungan Online Tahun: 2005 Versi: 1/1.
RESEARCH QUESTIONS, AIMS AND OBJECTIVES
The phases of research Dimitra Hartas. The phases of research Identify a research topic Formulate the research questions (rationale) Review relevant studies.
Electronic EDI e-EDI. The EDI has been in use since 1999 using a paper-based system and computerized spreadsheets to collect and manage EDI data. Over.
Business and Management Research
NETWORK RECRUITMENT IT SKILLS SURVEY March, 2013 NITESKE MARSHALL Network Recruitment MD DEVELOPING RELATIONSHIPS, DELIVERING RESULTS
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
Program Objective Security Basics
Sasa Aksentijevic, MBA IT Ph.d. Business Economy cnd./ ICT Manager / C(I)SO / ICT Court Forensic Expert LinkedIn: linkedin.com/sasaaksentijevic Information.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
General Awareness Training
Information Literacy in the workplace: implications for trainers By Dr. Mark Hepworth Department of Information Science Loughborough University.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
Tourism Skills Delivery: Sharing Tourism Knowledge Online 1.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Copyright 2009 Trend Micro Inc. Classification 9/9/ Corporate End User Study Employee Online Behavior.
IT Security for Users By Matthew Moody.
1.1 System Performance Security Module 1 Version 5.
Privacy and Security of Protected Health Information NorthPoint Health & Wellness Center 2011.
How to write a research protocol Corlia van Vuuren February 2011.
Bruce White Ruth Geer University of South Australia.
Undergraduate Dissertation Preparation – Research Strategy.
National Cyber Security Awareness Month October 20, 2011 Cyber Security – Our Shared Responsibility.
Professor Norah Jones Dr. Esyin Chew Social Software for Learning – The Institutional Policy of the University of Glamorgan ICHL 2012, China
Information Systems Security Operational Control for Information Security.
Presentation to HAUC (UK) Wednesday 30 May 2012 RINA London.
LEARNING INTENTION Students will be able to: Respond to task/action words in exam questions We know we can do this when: Students address exam questions.
John Carpenter & lecture & Information Security 2008 Lecture 1: Subject Introduction and Security Fundamentals.
STARTFINISH DisposePrint & ScanShareStore Protect information and equipment ClassifyProtect.
Dr Jamal Roudaki Faculty of Commerce Lincoln University New Zealand.
Suzanne Curyer Manager, Career Services The Australian experience: Developing an Employability Skills e-portfolio.
 Introduction to Computing  Computer Programming  Terrorisom.
The use of information and communication technology to support physiotherapy students M. Rowe and Professor P. Struthers Department of Physiotherapy University.
Fraud and corruption prevention on-line tools and techniques Dr Robert Lang Chief Executive Officer.
CYBER CRIMES PREVENTIONS AND PROTECTIONS Presenters: Masroor Manzoor Chandio Hira Farooq Qureshi Submitted to SIR ABDUL MALIK ABBASI SINDH MADRESA TUL.
ORGANISATIONAL CULTURE ORGANISATION MUST PROVIDE FOR INFORMATION SECURITY FAILING TO PLAN, IS PLANNING TO FAIL ASPECTS THAT SHOULD BE ADRESSED DURING.
Supporting your professional development
By Bernard Ikoli.  Introduction  What is Internet?  Impact of the Internet in the society  What is Ethic ?  Applying Ethic to the internet  Conclusion.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Acceptance of Social Media Marketing in the Sanitary Market Marcus Diedrich 6. November 2015.
ACTION RESEARCH By Toni McConnell Rachel Milliken Sarah Montefiore Biljana Milovanovic.
Overall NSW Health 2011 YourSay Survey Results YourSay - NSW Health Workplace Survey Results Presentation NSW Health Overall Presented by: Robyn Burley.
Threats To Data 30 Threats To Data 30. Threats To Data 30 We’re now going to look at a range of different threats to people’s data: Opportunity Threats.
SAACTA 13 th Annual Conference October 2010 Performance auditing: Where are we? By Dr. Shalini Singh Department Operations and Quality Management.
Cyber-Security among American Local Governments Donald F. Norris, Anupam Joshi and Timothy Finin University of Maryland, Baltimore County Baltimore, Maryland.
Outline Structure of Action Research Project Trudy Corrigan October 2008.
Handling Personal Data & Security of Information Paula Trim, Information Officer, Children’s Strategic Services, Mon – Thurs 9:15-2:15.
Course Work 2: Critical Reflection GERALDINE DORAN B
Application Outsourcing: Achieving Success & Avoiding Risk
Literature Surveys Source : : Keshav P. Dahal (Bradford University)
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Business and Management Research
Supervision and creating culture of reflective practice
Prepared By: Mr. Eleazer Fianko Ofei
Cybersecurity Am I concerned?
“WIL-Africa Conference 2018”
LO1 - Know about aspects of cyber security
Collaboration & Evaluation
Handling information 14 Standard.
Presentation transcript:

Information Security Awareness Levels of TAFE South Australia Employees Hong Chan Bachelor of IT ( Honours ) Supervisor: Dr Sameera Mubarak

Outline  Background Information  Research Question  Methodology  Results  Conclusion

Information Security  Confidentiality – prevent unauthorised access  Integrity – accuracy and correctness  Availability – authorised access when needed  Ensure business continuity  Minimise damage and liability  Ethical and legal responsibility Information security plans or policies are needed, usually consist of technical controls Background Information

Information Security Awareness – Human Aspects  Employee knowledge of information security concepts  Management knowledge of information security concepts  Consciousness of security plans Literature suggests positive relationship between awareness and security plan success. Should be included in plans. Background Information

TAFE South Australia  Largest vocational education provider in SA  2400 employees across over 50 campuses Suitable for this research  All aspects of the business are conducted using information systems.  Holds vast amount of confidential student data.  Recently implemented new student information system Background Information

Motivation for Research  Gap in literature  Australian Context  Personal interest as an employee Background Information

Potential Contributions  Directly benefit TAFE SA  Finalised report (thesis) to be given to TAFE SA  Provide insight into other similar Australian Organisations Background Information

To gain an insight into the information security awareness levels of TAFE SA Employees in order to identify areas that need improvement Does not look into improving awareness through “best practices” Research Question

Online Questionnaire  Knowledge of concepts = Awareness of threats  Behavioural questions = Employee actions which may cause breaches  Consciousness of policies’ existence Quantitative Methods Used  Tabulated percentages Methodology

Population: 2400 staff Sample: 308 responses 13% of entire organisation responded Demographics  Management ( 19% )  General Staff (81%)  Mushroom ?? Results

Knew what Phishing is Knew what Spam is Results YesNo Management32%68% General Employees23%77% YesNo Management78%22% General Employees87%13%

Has clicked on unknown links embedded in external third party s Knew what Social Engineering is Results YesNo Management24%76% General Employees16%84% YesNo Management78%22% General Employees73%27%

Knew what a strong password should be Has given away passwords or logged someone in Questionnaire may have prompted ICT’s action ?? Results YesNo Management64%36% General Employees66%34% YesNo Management56%44% General Employees52%48%

Has left computer unlocked and unattended Used appropriate methods for password storage Results YesNo Management73%27% General Employees78%22% YesNo Management68%32% General Employees65%35%

Knew the importance of data/information integrity Has amended data without due process Results YesNo Management93%7% General Employees91%9% YesNo Management7%93% General Employees8%92%

Has discussed work related issues on social networking sites Very few research into this topic, that is, social media can be a source of data/information leakage Results YesNo Management7%93% General Employees8%92%

Awareness of existence of information security policy Awareness of existence of password policy Results YesNo Management59%41% General Employees37%63% YesNo Management41%59% General Employees31%69%

TAFE SA needs improvements  Passwords given to colleagues  Leaving computers unlocked and unattended  Lack of awareness of policies Conclusion

Limitations  TAFE SA’s Chief Executive’s disapproval of question  “Social Engineering” is an ambiguous term Conclusion

Future Research  How awareness can be improved  Explore adoption of awareness programs  Look into Including awareness as part of an overall security strategy Conclusion

My Telstra Story   Potential for malicious acts is huge!

Thank You Tip: If you work fulltime, do not commence a research degree. I am actually 19 but I look 40. -Hong Chan