Educational aspect of security information system

Assignment Help Software Engineering
Reference no: EM131486440

Reply to this article.

Educational Aspect of Security Information system security education has continued to be a challenging endeavor due to computer users not being motivated to learn how to maintain security and/or lack the knowledge to understand threats to security (Jakobsson & Ramzan, 2008).

Users also have different levels of security knowledge, requiring education to be adapted to the audience. Individuals are more likely to understand and adopt security practices if taught on his or her level, otherwise the information is neither understood nor utilized. Likewise, if the education is intended for IT personnel and the approach is too basic, the personnel will be prone to ignore the information all together (Johnson, 2015).

It is also important to have experienced instructors to gauge the audience and adjust where appropriate, and not hinder the training. This is true with all teachers and instructors; inexperience can negatively affect the audience, due to the educator's higher expectation of knowledge. "Not many of you should become teachers, my brothers, for you know that we who teach will be judged with greater strictness" (James 3:1).

Traditional educational approaches do not usually accommodate different ways of learning. Everyone learns in various ways which suggests the need for diverse approaches. The security training approach should also be tailored based on job level, level of awareness, and technical skill level (Johnson, 2015).

Failure to explain reasons for specific security policies creates another issue typically encountered with traditional educational approaches. The goal of education is to develop user awareness and skills that promote information system security, therefore varied approaches would benefit an organization immensely.

Research-driven content selection, accessibility, immersion, and adaptability are the core principles for effective security education. By utilizing these principles when delivering security training, organizations will increase user compliance with security policy (Jakobsson & Ramzan, 2008).

By mending the issues with information system security education, the health of organizational security will grow stronger. "Behold, I will bring to it health and healing, and I will heal them and reveal to them abundance of prosperity and security" (Jeremiah 33:6).

God provides us with so much, including security, but we must allow God to be part of our lives each and every day for this to be possible. Likewise, we must demonstrate security practices each day to establish information system security in our organizations. References Jakobsson, M., & Ramzan, Z. (2008).

Crimeware: Understanding new attacks and defenses. Boston, MA: Addison-Wesley Longman, Inc. Johnson, R. (2015). Security policies and implementation issues. (2nd ed.). Burlington, MA: Jones and Bartlett Learning

Verified Expert

This assignment was about the educational perspective of information security system and the various shortcomings of the existing practices of teaching information security to students. One such reason pointed out in the assignment was due to the lack of a proper educational and teaching model that should be proposed by the ISA"

Reference no: EM131486440

Questions Cloud

What specific events are detailed in the article : How do you believe that the tourism authorities should commemorate or promote the remembrance of the atrocities committed by the Nazis in Rome?
Explain what is a parametric machine learning algorithm : Explain what is a parametric machine learning algorithm and how is it different from a nonparametric machine learning algorithm.
Task in hiring initial lawyer for formation-structure issue : Discuss UCMBA's committee's task in hiring the initial lawyer for formation and structure issues.
West muskegon machining : He expects the general rate of inflation to be 2.5%. Should Wally proceed with this project?
Educational aspect of security information system : Educational Aspect of Security Information system security education has continued to be a challenging endeavor due to computer users not being motivated to learn how to maintain security
Evaluation of the potential system users and stakeholders : CSIT814 - Group Project Report. Your group is to write a professional report outlining the evaluation of the potential system users and stakeholders
Obtain your investment goals : Assume you must choose an investment that will help you obtain your investment goals. Rank the following investments from 1 (low) to 5 (high).
Describe use case dependency for making an account transfer : Describe (in a one to two page narrative) a use case dependency for making an account transfer. Illustrate this use case with Visio or a similar product.
Economic struggles during the industrial period : In what ways did Carbon energy play a vital role in shaping up political and economic struggles during the industrial period?

Reviews

inf1486440

5/30/2017 5:22:54 AM

Expertsmind made a genuine stand up work with regards to, made the rectifications rapidly, and delivered a decent item that spoke to my solicitation. Subsequently I have submitted payment for the second paper. Thanks

len1486440

5/6/2017 4:42:49 AM

Likewise, we must demonstrate security practices each day to establish information system security in our organizations. References Jakobsson, M., & Ramzan, Z. (2008). Crimeware: Understanding new attacks and defenses. Boston, MA: Addison-Wesley Longman, Inc. Johnson, R. (2015). Security policies and implementation issues. (2nd ed.). Burlington, MA: Jones and Bartlett Learning

len1486440

5/6/2017 4:42:37 AM

I have to reply to this article. Educational Aspect of Security Information system security education has continued to be a challenging endeavor due to computer users not being motivated to learn how to maintain security and/or lack the knowledge to understand threats to security (Jakobsson & Ramzan, 2008).

Write a Review

Software Engineering Questions & Answers

  Describing rfid systems used in inventory control

Illustrate how are RFID systems used in inventory control and supply chain management? What kinds of relationships are possible in relational database?

  Finding example of source code

Discover one example of each label in the following source code and write the line number of the example next to the label.

  Produce a plan using a gantt chart

Produce a plan, using a Gantt chart, indicating how you might schedule the work of developing the system. Your schedule should clearly be related to delivering the requirements of ABC Stores plc and should reflect RUP/USDP practice - Explain in wo..

  Write a script that creates a directory

Write a script that asks the user to enter a number between 20 and 30. If the user enters an invalid number or a non-number, ask again. Repeat until a satisfactory number is entered.

  Sketch the dependency diagram

Sketch the dependency diagram. There are suitable examples in reading assignments of dependence diagrams. In what normal form is this table? Describe why.

  Why the client machine is so vulnerable

Discuss some of the reasons as to why the client machine is so vulnerable by way of the www - Discuss a few guidelines that might be put into place to help increase security within the client machine.

  Implications of new knowledge gained

The final paper should demonstrate an understanding of the materials in this course, as well as the implications of new knowledge gained. The 3-4-page paper should integrate new learning into the target company example and internship work. It may ..

  Cryptography

Give your opinion of whether cryptography should be a part of every email security strategy or if there are specific characteristics of organizations where such measures are not needed. Justify your answer.

  Apa formatting techniques

What is the difference between forward and reverse engineering? How would you recommend this be used in our Project? Would CASE tools be helpful in forward/reverse engineering?

  When is a predictive life cycle such as waterfall life cycle

When is a predictive life cycle such as the waterfall life cycle model most appropriate to use to develop an information system?

  Develop the initial product backlog for the project

Take the project description and develop the initial product backlog for the project. Make sure each Product Backlog Item (user story) has a name, description, acceptance criteria, priority and initial estimate.

  What was the first mud

What was the first MUD? What were the different types of MUDs? Do people still play MUDs today? What modern game genre has largely replaced MUDs?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd