Topics

Explore these resources to help you formulate your plan and find the materials you need to meet your training objectives. The materials referred to, and linked to, from this site are free (or were when they were found).


Computer Security

Objective: Demonstrate knowledge of computer security

Lock computer when not present

Install and activate software firewalls on all of your business systems

  1. Every computer in the network should have its own software firewall enabled.
  2. The Microsoft operating system has a built-in firewall, which can be easily located in the Control Panel. Ensure it is always turned on.
  3. For other commercial operating system, the operations manual should have instructions about the firewall options.
  4. For an added layer of security, commercial firewall software can be installed.
  5. Ensure that any employees working with office data at home also adhere to these rules.

Patch your operating systems and applications.

  1. Operating system should be automatically regularly updated with the latest patches and updates provided by the vendors. With Microsoft, this Automatic Update feature is set in the Control Panel, under Security or System.
  2. Major software applications like Microsoft Office should also be regularly updated.
  3. Other installed business applications should also be updated on a regular basis.

Source: Small business information security workbook, version 2.2. Lincke, 2011

How To

Lesson Plan

Teaching tip: Show how easy it is to lock your computer by trying one of the methods noted below. Other methods vary depending on the operating system.

1. Locking the Computer

a. Importance of locking the computer:
b. What you can do:

Discussion point: When you leave your computer unlocked, someone can easily use your computer to perpetrate criminal activity, for which you may be blamed.

Note: The material contained in this lesson plan was adapted from the case study "Awareness and Accountability in Information Security Training” (Mellor & Noyes, 2005) and used with permission.

Lessons

Title URL Duration
InfraGard Awareness Information Security Awareness Training Course - Lesson 8 Protecting your personal workspace Link 4 Mins,
48 Secs
InfraGard Awareness Information Security Awareness Training Course - Lesson 12 Acceptable use of electronic resources Link 6 Mins,
8 Secs
InfraGard Awareness Information Security Awareness Training Course - Lesson 13 Secure use of networks Link 2 Mins,
32 Secs

Policy Templates

Posters

Tutorials

Tutorials

Confidential Information

Objective: Demonstrate knowledge of proper handling of confidential information

Limit employee access to data and information

  1. When giving access to data, ensure the least privileges are assigned.
  2. Provide access to only the system or information required doing a job. This helps to avoid insider abuse.
  3. Segregation of duties should be followed while assigning roles and responsibilities. For example, an employee initiating a transaction should not be allowed to approve it as well.

Source: Small business information security workbook, version 2.2. Lincke, 2011

How To

Lesson Plan

Teaching tip: Ask the participants to name examples of confidential data and material and to describe what should be done to secure them.

1. Dangers

2. Confidential data and material
3. What you can do:

Discussion point: Ask the participants if they have seen any instances of information not being handled properly.

Note: The material contained in this lesson plan was adapted from the case study "Awareness and Accountability in Information Security Training” (Mellor & Noyes, 2005) and used with permission.

Lessons

Title URL Duration
InfraGard Awareness Information Security Awareness Training Course – Lesson 11 Protecting your workplace from identity theft Link 6 Mins,
50 Secs
NIH Privacy Awareness Course Link 30 Mins to 60 Mins

Tutorials

Title URL Duration
Protecting Personal Information: A Guide for Business (interactive tutorial) Link

Forms

Data Backup

Video: Backup Your Data - SOeC & FBI Cybersecurity Tips

2 Minutes, 1 Second


How To

Procedures

  1. Backup should be done (at least) once a week. If possible, store to removable media (e.g., DVD).
  2. The removable media should be big enough to hold 52 weeks of backup (e.g., 500GB) and retained separate from the original data, off-line.
  3. Do a full back up once a month and store it in off-site location. This would be useful in case of a disaster in your office (fire, theft, flood, etc.). On the removable media create 12 folders for each month.
  4. Backup data should be tested periodically to ensure reliability.

Email

Objective: Recognize email threats

Security concerns about e-mail attachments and e-mails requesting sensitive information:

  • Attachments should be opened only from trusted senders.
  • If you are not expecting an e-mail attachment from the sender, it is a good idea to call and confirm, before opening the attachment.
  • Spam e-mail often asks for sensitive information.

Source: Small business information security workbook, version 2.2. Lincke, 2011


How To

Lesson Plan

Teaching tip: Discuss where the acceptable use policy is located and bring a copy with you to show the employees, if possible.

1. Dangers

2. Confidential data and material
3. Monitoring
4. Policy

Discussion point: Ask the participants if they have seen any instances of information not being handled properly.

Note: The material contained in this lesson plan was adapted from the case study "Awareness and Accountability in Information Security Training” (Mellor & Noyes, 2005) and used with permission.

Lessons

Title URL Duration
InfraGard Awareness Information Security Awareness Training Course – Lesson 6 Safe and secure email use Link 6 Mins,
50 Secs

Internet Use

Objective: Recognize risks associated with using the Internet

Security considerations for web surfing

  1. Never use an admin account to surf the Web. If there was a compromise the malicious code would have admin rights.

Security considerations for web surfing

  1. Always used secure browser to do online activities. Before entering secure data, ensure a small lock appears in the bottom right of the screen.
  2. Frequently delete temp files, cookies, history, saved passwords etc. On Windows Internet Explorer this is accomplished via Tools->Options->General->Delete. On Mozilla Firefox use Tools->Clear Private Data, and Tools->Options->Privacy->Show Cookies->Remove All Cookies.

Source: Small business information security workbook, version 2.2. Lincke, 2011


How To

Lesson Plan

Teaching tip: This would be a great time to bring out a copy of company policy and point out to the participants the parts that pertain to this section.

1. Dangers

2. Internet usage
3. What you can do:

Discussion point: Ask the participants if they have seen any instances of information not being handled properly.

Note: The material contained in this lesson plan was adapted from the case study "Awareness and Accountability in Information Security Training” (Mellor & Noyes, 2005) and used with permission.

Lessons

Title URL Duration
InfraGard Awareness Information Security Awareness Training Course – Lesson 10 Safe and secure web use Link 6 Mins,
10 Secs
Internet Safety Link

Policy Templates

Presentations

Mobile Devices

Video: For Tips on the Go

Duration: 30 seconds


Games

Lesson

Title URL Duration
InfraGard Awareness Information Security Awareness Training Course – Lesson 9 Security outside the workplace Link 9 Mins,
Internet Safety Link

Policy Templates

Posters

Videos

Network Security

Router/Firewall Configurations

The recommended settings to provide security for your organization’s Internet connection:

  1. Install a hardware firewall between your office network and the Internet. Most of the routers have built-in firewall protection with an easy-to-use interface.
  2. Change the default password of the router, and if possible, change the default login name.
  3. Ensure that any employees working with office data at home also adhere to these rules.

Secure your wireless access point and networks

Recommendations to secure wireless access points include:

  1. Disable broadcasting of Service Set Identifier (SSID).
  2. Change default administrator password.
  3. Enable WiFi Protected Access 2 (WPA-2) using the Advanced Encryption Standard (AES) to ensure strong encryption is used while transmitting data.

Personal Security

Train your employees in basic security principles

  1. On the first day of work, employees should be given training on organizational security policies and how to protect sensitive data.
  2. Limit use of telephone, printers and other business-owned resources for personal use.
  3. Request employees sign a statement that they understand the policies and the penalties for not following them.
  4. Security training can also be provided by external sources, such as technical college or commercial training vendors.

Recommended personnel practices in hiring employees

  1. Do a comprehensive background check, including criminal background check, before hiring a new employee, particularly if they will have access to assets or secure information. Other useful checks include credit check and reference check.
  2. Change default administrator password.
  3. Enable WiFi Protected Access 2 (WPA-2) using the Advanced Encryption Standard (AES) to ensure strong encryption is used while transmitting data.

Phishing

Video: For Tips on the Go

Duration: 30 seconds


Objective: Recognize phishing attempts

Security concerns about web links in email, instant messages, social media, or other means

  1. Never click on a link in an e-mail attachment, except only when you are expecting it.
  2. If you are not expecting an e-mail link from the sender, it’s a good idea to call and confirm, before clicking on the e-mail link.
  3. If you hover the cursor over an e-mail’s Web link description, the link should be displayed on the bottom of the browser. Make sure both of them match and the Web link looks valid.

Security concerns about popup windows and other hacker tricks:

  1. Do not respond to pop ups while working online. For example, a malicious pop up message may say that you have a virus on the system. Close it by clicking on X in the upper right corner. If you click OK, it might install spyware or other malicious code.
  2. Infected USB drives are often left unattended by hackers in public places. They intend for unsuspecting people to take the USB home or to the office and unknowingly install the worm or malicious code. For additional protection, disable the “AutoRun” feature for USB drives.

Source: Small business information security workbook, version 2.2. Lincke, 2011.

Games

Lesson Plan

Teaching tip: The reason why Phishing scams are so successful is that they are able to pass as real web sites. Ensure that the participants understand this and are able to discuss prevention methods.

  1. Dangers
    1. Never send anything confidential through email.
    2. Never click on an attachment unless you trust the sender.
  2. Phishing
  3. Phishing scams can come in two main ways:

    1. Email – This happens when you receive a fraudulent email asking you to email the source a new password or to click on a link to change it.
    2. URL redirection – This happens when you click on a hyperlink in an email or on the web and it takes you to a fraudulent web site.
  4. What you can do
    1. Delete any emails requesting login or password information.
    2. Verify the legitimacy of web sites before entering any kind of personal information.

Discussion point: Ask the participants if they have had any experiences with Phishing scams.

Note: The material contained in this lesson plan was adapted from the case study "Awareness and Accountability in Information Security Training” (Mellor & Noyes, 2005) and used with permission.

Posters

  • Suspicious Links - http://www.stopthinkconnect.org/download/galleries/19/data/image.jpg

Posters

Personal Security

Objective: Identify methods of physical security (lock office, desk, cabinet)

Control physical access to your computers and network components

  1. Maintain good physical security (locked doors, private keys).
  2. Do not allow any unauthorized person to work on your computers.
  3. Position your computer’s display to hide information on the screen.
  4. Cleaning crew and network repair personnel are often unsupervised in work area. Take precautions.

Source: Small business information security workbook, version 2.2. Lincke, 2011

Lesson Plan

  1. Dangers
    1. a. If you don’t maintain proper physical security, you could be at risk for attacks. You never know if your colleague John is waiting for you to leave your workstation so he can access the system in your name or steal something of yours. Lock up and keep threats physically out of reach.
    2. People often impersonate legitimate employees or personnel to gain access to sensitive places and material. Be aware of who is really supposed to be there.
  2. Methods of Physical Security
    1. Properly lock up and secure your workstation upon leaving.
    2. Lock your office door. Close your cabinets and lock them too, if possible.
    3. Try and remind others to do the same thing. Sooner or later someone is bound to forget. Be a help, not a hindrance.

Discussion point: You wouldn’t leave your workplace for the day and not lock it, so why should you leave your work area unlocked or unprotected when it contains such sensitive information?

Note: The material contained in this lesson plan was adapted from the case study "Awareness and Accountability in Information Security Training” (Mellor & Noyes, 2005) and used with permission.

Policy Templates

Social Engineering

Objective: Recognize social engineering attempts

How to protect against Social Engineering:

  1. Providing sensitive information to strangers pretending to be a part of the organization should be avoided. Any such activity should be reported to the management.
  2. Employees should be trained against social engineering attacks from in-person, phone, e-mail, or other electronic methods.

Source: Small business information security workbook, version 2.2. Lincke, 2011.

Lesson Plan

    Teaching tip: Talk about possible social engineering situations that may happen at work.

  1. Dangers
    1. “Amateurs hack systems, professionals hack people” (Mellor & Noyes, 2005).
    2. A password or any other confidential information is only as confidential as people are willing to keep it.
    3. Social engineers often prey on sympathy or desire to avoid conflict.
  2. How to combat Social Engineering
    1. Social engineering is an attempt to manipulate legitimate users to gain unauthorized information.
    2. Always be aware of who you are communicating with and what information they are requesting from you.
    3. Don’t give out information (no matter how insignificant it seems) to someone who isn’t authorized to know it.
    4. Don’t offer supplemental information that is not necessary.
      e.g. If Linda is gone for the day and someone calls up and asks if she is in, don’t tell them that she always takes the third Friday off. Just tell them she is not in. Be aware and be careful.

Note: The material contained in this lesson plan was adapted from the case study "Awareness and Accountability in Information Security Training” (Mellor & Noyes, 2005) and used with permission.

Lessons

Title URL Duration
InfraGard Awareness Information Security Awareness Training Course Lesson 3 How your behavior can be exploited Link 9 Mins,
56 Sec
InfraGard Awareness Information Security Awareness Training Course – Lesson 5 Understanding and avoiding social engineering Link 4 mins,
5 Secs

Podcasts

Posters

Reading

Policy Templates

Forms (FIX ME DONOVAN!!!)

Storage Media

Objective: Recognize risks associated with storage media and portable computers

How to dispose of old computers and media

  1. Destroy a hard disk by drilling several holes into it and beating the hard disk platter with a hammer to ensure data is unrecoverable.
  2. Papers containing sensitive information should be shredded. Other removable media (like CD, DVD, USB, floppy drives) should be destroyed as well.
  3. When organizations do not follow the proper procedure to destroy sensitive data, identity theft can result.

How to get help with information security when you need it

  1. Help or advice should be obtained from a competent, specialized person, when needed.

Source: Small business information security workbook, version 2.2. Lincke, 2011.

Games

  1. Mission: Laptop Security - http://www.onguardonline.gov/media/game-0008-mission-laptop-security

How To

  1. Effectively Erasing Files - http://www.us-cert.gov/cas/tips/ST05-011.html
  2. Erasing Information and Disposal of Electronic Media: A Non-Technical Guide - http://msisac.cisecurity.org/resources/guides/documents/Erasing%20and%20Disposal%20Guide.pdf
  3. Protecting Portable Devices: Data Security - http://www.us-cert.gov/cas/tips/ST04-017.html
  4. Using Caution with USB Drives - http://www.us-cert.gov/cas/tips/ST08-001.html

Lesson Plan

Teaching tip: Ensure that the participants understand the importance of not storing confidential information on removable devices or portable computers.

  1. Dangers
    1. Storage media and portable computers are dangerous due to the ease that they can be stolen.
    2. Removable storage media can also be copied quickly without any kind of verification.
  2. Handling storage media and portable computers
    1. Storage media can be anything that stores data, including hard drives, CDs, and USB devices.
    2. Portable computers, such as laptops and PDAs.
  3. What you can do
  4. Avoid storing confidential information on removable storage devices or portable computers.
  5. Lock and properly secure removable storage devices at all times.

Discussion point:Discussion point: Ask the participants if they have ever seen any of these items left out around the workplace.

Note: The material contained in this lesson plan was adapted from the case study "Awareness and Accountability in Information Security Training” (Mellor & Noyes, 2005) and used with permission.

Unauthorized Programs

Objective: Understand issues in downloading software from the Internet

  1. Software download should be done only from trusted websites like Microsoft for Windows updates and Office application updates.
  2. Avoid downloading and using freeware or shareware, since most of them either do not come with technical support or full functionality.
  3. Identify types of unauthorized programs.
  4. Limit authority to install software. To restrict installation of software, ensure employees do not use administrative accounts as normal login.

Source: Small business information security workbook, version 2.2. Lincke, 2011.

Lesson Plan

Teaching tip: Ensure that the participants understand the importance of not storing confidential information on removable devices or portable computers.

  1. Dangers
    1. Unauthorized programs can serve as a launching point for viruses and Trojans.
    2. A virus could infect one computer or a whole network of computers.
    3. A Trojan could be used to send login and password information or other sensitive information to a third party.
  2. Unauthorized programs
    1. Any software that is not pre-installed on the computer system could potentially be an unauthorized program.
    2. Refer to the company acceptable use policy and strictly adhere to it.
    3. Follow the basic rule: If you are not sure, don’t do it or ask.
  3. What you can do
  4. Ask before loading any kind of software on your workstation.
  5. If a piece of software is allowed, make sure to obtain a copy from a trusted source.

Discussion point: Ask the participants if they have heard any stories of viruses being spread around due to installing unauthorized software on computer systems.

Note: The material contained in this lesson plan was adapted from the case study "Awareness and Accountability in Information Security Training” (Mellor & Noyes, 2005) and used with permission.

Policy Templates

  1. Software Installation Policy - http://www.sans.org/security-resources/policies/computer.php

Posters

  1. Software Installation Policy – Poster - http://www.sans.org/security-resources/policies/computer.php

Viruses and Malware

Objective: Protect information/systems/networks from damage by viruses, spyware, and other malicious code.

The recommendations to ensure computers in the office network are protected from virus, spyware, and other malicious code include:

  1. Anti-virus and anti-spyware software should be updated on a regular basis.
  2. Anti-virus should be set to auto update daily, for example at 12 midnight and then do a scan one half hour later.
  3. Anti-spyware should be set to auto update daily, for example at 2:30 AM and then a full system scan one half hour later. This procedure makes sure that only one activity is performed at a time.
  4. If the employees work from home, they should also have anti-virus and anti-spyware installed on their home computers.

Activities

Games

Glossaries

How To

Lessons

Title URL Duration
InfraGard Awareness Information Security Awareness Training Course – Lesson 7 Protecting against viruses, spyware, and spam Link 6 Mins,
30 Sec

Presentations

Videos

Password

Objective: Demonstrate knowledge of secure password management

Require individual user accounts for each employee on business computers and for business applications

  1. Every employee should have an individual login account.
  2. Employees should not be logged in as administrator, to avoid harmful actions if the computer is compromised.
  3. Passwords should be complex, including a combination of upper/lower case, numbers, and punctuation, and at least 8-10 characters long. Passwords should be changed every 3 months.
  4. Login IDs and passwords should not be shared.

Source: Small business information security workbook, version 2.2. Lincke, 2011.

Source: Creating a Secure Password - SOeC & FBI Cybersecurity Tips

Length: 2 Minutes, 31 Seconds


Lesson Plan

Teaching tip: The two most important areas to focus on are the importance of frequent password changes and selecting a strong password.

  1. Danagers
    1. “80% of all network security problems are caused by bad passwords” (Mellor & Noyes, 2005).
    2. Bad passwords can allow intruders access to your financial information and the possible theft of your identity.
  2. Passwords should contain:
    1. At least 8 characters
    2. Upper and lowercase letters
    3. Numbers
    4. Special characters such as: ! @ # , ) (
  3. Methods to remember extremely strong passwords:
    1. At least 8 characters
      1. Example: 17 years ago, I went to Italy translates into 17ya,IwtI
      2. Example: My little sister turned 7 this July! translates into Mlst7tJ!
    2. A password should be guarded with the utmost care and never divulged to anybody.
  4. 25 Worst Passwords on the Internet
    1. password
    2. 123456
    3. 12345678
    4. qwerty
    5. abc123
    6. monkey
    7. 1234567
    8. letmein
    9. trustno1
    10. dragon
    11. baseball
    12. iloveyou
    13. sunshine
    14. ashely
    15. bailey
    16. passwo0rd
    17. shadow
    18. 123123
    19. 654321
    20. superman
    21. qazwsx
    22. micheal
    23. football

    Source: ABC News, 2011.

  5. Activity “Check your password - is it strong?”
  6. https://www.microsoft.com/security/pc-security/password-checker.aspx

Discussion point: A simple password such as “Idaho” can be broken in less than two minutes. On the other hand, a more complex password, such as “Mlst7tJ!” would (theoretically) take almost 2,000 years to break (Mellor & Noyes, 2005).

Note: The material contained in this lesson plan was adapted from the case study "Awareness and Accountability in Information Security Training” (Mellor & Noyes, 2005) and used with permission.

Lesson

Title URL Duration
InfraGard Awareness Information Security Awareness Training Course – Lesson 4 Passwords Link 9 Mins,
23 Secs
Microsoft Digital Literacy, Computer Security and Privacy Course, Guidelines for Protecting Your Computer Topic Link
Passwords - The First Step to Safetyy Link

How To

Policy Templates

Posters

Tutorials

Forms

Courses

Browse free training courses.

View details »

Topics

Some training topics to help you get started.

View details »

Resources

View sample policies, tip sheets, and more.

View details »

Announcements

See what's new since you last visited.

View details »

Forms

Need help keeping track of your training? Browse our free forms.

View details »

Contact

Send us an email, share your thoughts.

View details »


Copyright KISS@ © 2015, All Rights Reserved