Skip to main content

Moving from Consciousness to Culture: Creating an Environment of Security Awareness

Although the aftermath of September 11th has brought to the forefront the realization that security threats are real, most companies are still far from creating a culture of security awareness within their organizations. This is particularly true with information security even though recent surveys have shown that corporations are worried about the financial impact of threats and attacks against their computer systems. Unfortunately, many of these same organizations are still focusing primarily on technical solutions such as firewalls, anti-virus software, patches, biometric devices and the like, to protect themselves against these threats. They have failed to take an overall holistic approach to security by combining technology with awareness. Most have recognized the importance of having clear and enforceable policies, but have stopped short of developing a comprehensive, ongoing awareness program. Security professionals and administrators are often left with the undefined task of making sure that procedures and processes are in place to ensure these policies are carried out. There are many considerations to weigh and steps that can be taken to improve security awareness in your own organization. The ultimate goal is to inspire change to create a culture of security awareness.

1439 (PDF, 2.07MB)

25 Jul 2004
ByMary Munley
Share
All papers are copyrighted

No re-posting of papers is permitted

Related Content

Metrics-Driven Information Security Framework as Part of Information Security Management

Research Paper

This paper presents a model of creating an actual accurate metrics-based security reporting model that is tied closely to the security management model used at the company.

  • 22 Mar 2022

Denial of Service Deterrence

Research Paper

Denial of Service has been a very useful practice for attackers and continues to remain prevalent...

  • 1 Apr 2015

Practical El Jefe

Research Paper

El Jefe is open source process monitoring software for Windows. With this tool, incident handlers...

  • 31 Mar 2015

Using Influence Strategies to Improve Security Awareness Programs

Research Paper

Even companies with extensive, well-funded security awareness programs fall victim to attacks...

  • 25 Oct 2013

Talking Out Both Sides of Your Mouth: Streamlining Communication via Metaphor

Research Paper

As Security is a relatively new field, we are still learning how to communicate what we know with...

  • 4 Oct 2013

Information Risks and Risk Management

Research Paper

This brief will cover the various exposures that companies now face as they increasingly rely on...

  • 1 May 2013

Surfing the Web Anonymously - The Good and Evil of the Anonymizer

Research Paper

Companies of all sizes spend large amounts of time, resources, and money to ensure that their...

  • 8 Oct 2012

Robots.txt

Research Paper

Although this GIAC gold paper is not about search engine optimization, or SEO, this paper will...

  • 31 May 2012

A Process for Continuous Improvement Using Log Analysis

Research Paper

Good security is a moving target. Walls and castles were once good defenses against attackers, but...

  • 26 Oct 2011

Measuring Psychological Variables of Control In Information Security

Research Paper

The effects of an individual's personal feelings of control over aspects of their health have been...

  • 12 Jan 2011

Which Disney(c) Princess are YOU?

Research Paper

Social engineering for identity theft has always been around. But now, with the advent of social...

  • 18 Mar 2010

Prelude as a Hybrid IDS Framework

Research Paper

Organizations both Large and Small are constantly looking to improve their posture on security....

  • 24 Mar 2009

The Importance of Security Awareness Training

Research Paper

One of the best ways to make sure company employees will not make costly errors in regard to...

  • 14 Jan 2009

Vendor-Supplied Backdoor Passwords - A Continuing Vulnerability

Research Paper

Vendor-Supplied Backdoor Passwords - A Continuing Vulnerability

  • 26 Sep 2008

Making Security Awareness Efforts Work for You

Research Paper

Making Security Awareness Efforts Work for You

  • 20 May 2008

The Controlled Event Framework for Information Asset Security

Research Paper

The Controlled Event Framework for Information Asset Security

  • 20 Feb 2008

Data Leakage - Threats and Mitigation

Research Paper

Data Leakage - Threats and Mitigation

  • 24 Oct 2007

Identity Theft

Research Paper

The act of identity theft can be performed by anyone, it could be family, friends or spouses. The...

  • 2 Jul 2007

Social Engineering Your Employees to Information Security

Research Paper

This paper will examine the role and value of Information Security Awareness efforts in the...

  • 19 Dec 2006

Building a Security Policy Framework for a Large, Multi-national Company

Research Paper

Information Security is not just technology. It is a process, a policy, and a culture. Our...

  • 5 May 2005

Subscribe to GIAC’s Monthly Newsletter

Receive expert insights, priority access to certifications, essential updates on regulatory changes and industry developments.