Educational aspect of security information system

Assignment Help Software Engineering
Reference no: EM131486440

Reply to this article.

Educational Aspect of Security Information system security education has continued to be a challenging endeavor due to computer users not being motivated to learn how to maintain security and/or lack the knowledge to understand threats to security (Jakobsson & Ramzan, 2008).

Users also have different levels of security knowledge, requiring education to be adapted to the audience. Individuals are more likely to understand and adopt security practices if taught on his or her level, otherwise the information is neither understood nor utilized. Likewise, if the education is intended for IT personnel and the approach is too basic, the personnel will be prone to ignore the information all together (Johnson, 2015).

It is also important to have experienced instructors to gauge the audience and adjust where appropriate, and not hinder the training. This is true with all teachers and instructors; inexperience can negatively affect the audience, due to the educator's higher expectation of knowledge. "Not many of you should become teachers, my brothers, for you know that we who teach will be judged with greater strictness" (James 3:1).

Traditional educational approaches do not usually accommodate different ways of learning. Everyone learns in various ways which suggests the need for diverse approaches. The security training approach should also be tailored based on job level, level of awareness, and technical skill level (Johnson, 2015).

Failure to explain reasons for specific security policies creates another issue typically encountered with traditional educational approaches. The goal of education is to develop user awareness and skills that promote information system security, therefore varied approaches would benefit an organization immensely.

Research-driven content selection, accessibility, immersion, and adaptability are the core principles for effective security education. By utilizing these principles when delivering security training, organizations will increase user compliance with security policy (Jakobsson & Ramzan, 2008).

By mending the issues with information system security education, the health of organizational security will grow stronger. "Behold, I will bring to it health and healing, and I will heal them and reveal to them abundance of prosperity and security" (Jeremiah 33:6).

God provides us with so much, including security, but we must allow God to be part of our lives each and every day for this to be possible. Likewise, we must demonstrate security practices each day to establish information system security in our organizations. References Jakobsson, M., & Ramzan, Z. (2008).

Crimeware: Understanding new attacks and defenses. Boston, MA: Addison-Wesley Longman, Inc. Johnson, R. (2015). Security policies and implementation issues. (2nd ed.). Burlington, MA: Jones and Bartlett Learning

Verified Expert

This assignment was about the educational perspective of information security system and the various shortcomings of the existing practices of teaching information security to students. One such reason pointed out in the assignment was due to the lack of a proper educational and teaching model that should be proposed by the ISA"

Reference no: EM131486440

Questions Cloud

What specific events are detailed in the article : How do you believe that the tourism authorities should commemorate or promote the remembrance of the atrocities committed by the Nazis in Rome?
Explain what is a parametric machine learning algorithm : Explain what is a parametric machine learning algorithm and how is it different from a nonparametric machine learning algorithm.
Task in hiring initial lawyer for formation-structure issue : Discuss UCMBA's committee's task in hiring the initial lawyer for formation and structure issues.
West muskegon machining : He expects the general rate of inflation to be 2.5%. Should Wally proceed with this project?
Educational aspect of security information system : Educational Aspect of Security Information system security education has continued to be a challenging endeavor due to computer users not being motivated to learn how to maintain security
Evaluation of the potential system users and stakeholders : CSIT814 - Group Project Report. Your group is to write a professional report outlining the evaluation of the potential system users and stakeholders
Obtain your investment goals : Assume you must choose an investment that will help you obtain your investment goals. Rank the following investments from 1 (low) to 5 (high).
Describe use case dependency for making an account transfer : Describe (in a one to two page narrative) a use case dependency for making an account transfer. Illustrate this use case with Visio or a similar product.
Economic struggles during the industrial period : In what ways did Carbon energy play a vital role in shaping up political and economic struggles during the industrial period?

Reviews

inf1486440

5/30/2017 5:22:54 AM

Expertsmind made a genuine stand up work with regards to, made the rectifications rapidly, and delivered a decent item that spoke to my solicitation. Subsequently I have submitted payment for the second paper. Thanks

len1486440

5/6/2017 4:42:49 AM

Likewise, we must demonstrate security practices each day to establish information system security in our organizations. References Jakobsson, M., & Ramzan, Z. (2008). Crimeware: Understanding new attacks and defenses. Boston, MA: Addison-Wesley Longman, Inc. Johnson, R. (2015). Security policies and implementation issues. (2nd ed.). Burlington, MA: Jones and Bartlett Learning

len1486440

5/6/2017 4:42:37 AM

I have to reply to this article. Educational Aspect of Security Information system security education has continued to be a challenging endeavor due to computer users not being motivated to learn how to maintain security and/or lack the knowledge to understand threats to security (Jakobsson & Ramzan, 2008).

Write a Review

 

Software Engineering Questions & Answers

  Currency conversion event

Expand the Currency Conversion event to have a menu of 5-currencies that allows the user to choose which currency they wish to display in its equivalency to the United States dollars.

  Explain task that would occur in each step if use sdlc model

Consider a different SDLC Model (4 step or 12 step). Describe the events/tasks that would occur in each step if your company were to use this SDLC model instead. - 2 pages

  Estimate the average weight of an adult male

Suppose we want to estimate the average weight of an adult male in Dekalb County, Georgia. We draw a random sample of 1,000 men from a population of 1,000,000 men and weigh them. We find that the average man in our sample weighs 180 pounds

  Similarities and differences in the structure of the memory

Include the following discussion with the assignment: Similarities and differences in the structure of the memory map and Comparison of cost per Kbyte.

  What would you do in each case what would you want your

what would you do in each case? what would you want your employees to do?a fellow employee is being harassed at work

  Create a presentation that summarizes the agile manifesto

Create an 8- to 12-slide Microsoft PowerPoint presentation that summarizes the Agile Manifesto. Present at least two points of criticism.

  Create the diagram 0 dfd for new century

Create the diagram 0 DFD for New Century. Make sure to illustrate numbered processes for handling appointment processing, payment and insurance processing.

  Describing the judgmental or commonsense part of problem

What stage of the manufacturing process has been described as "the mapping of function onto form"?What is the term used for describing the judgmental or commonsense part of problem solving?

  Create state diagram-handles login-security for application

You are designing module which handles login and security for application. Create state diagram which explains the above actions. Make sure that you name each state and include triggers which cause transitions as well as any conditions that may app..

  Advantage of managing input and output

Explain why a DMA channel would or would not be useful in a computer without an interrupt-based I/O system.

  List the tasks on the critical path

Furthermore, initial indications from suppliers was that there would be an additional two week delay on shipping Production hardware as it would have to be specially ordered from Singapore.

  Develop the initial product backlog for the project

Take the project description and develop the initial product backlog for the project. Make sure each Product Backlog Item (user story) has a name, description, acceptance criteria, priority and initial estimate.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd