SlideShare a Scribd company logo
2
Most read
3
Most read
5
Most read
Security Program and
Policies
Principles and Practices
by Sari Stern Greene
Chapter 6: Human Resources Security
Copyright 2014 Pearson Education, Inc. 2
Objectives
❑ Define the relationship between information
security and personnel practices
❑ Recognize the stages of the employee lifecycle
❑ Describe the purpose of confidentiality and
acceptable use agreements
❑ Understand appropriate security education,
training, and awareness programs
❑ Create personnel-related security policies and
procedures
The Employee Lifecycle
■ Represents stages in the employee’s career
■ Lifecycle models can vary but most include
the following stages
❑ Recruitment
❑ Onboarding
❑ User provisioning
❑ Orientation
❑ Career development
❑ Termination
Copyright 2014 Pearson Education, Inc. 3
Copyright 2014 Pearson Education, Inc. 4
What Does Recruitment Have to Do
with Security?
❑ Risks and rewards of posting online employment
ads:
■ A company can reach a wider audience
■ A company can publish an ad that gives too much
information:
❑ About the network infrastructure and therefore allow a
hacker to footprint the internal network easily and stealthily
❑ About the company itself, inviting social engineering attacks
Copyright 2014 Pearson Education, Inc. 5
Job Postings
■ Job descriptions are supposed to:
❑ Convey the mission of the organization
❑ Describe the position in general terms
❑ Outline the responsibilities attached to said position
❑ Outline the company’s commitment to security via the use of such terms
as non-disclosure agreement
■ Job descriptions are NOT supposed to:
❑ Include information about specific systems, software versions, security
configurations, or access controls
■ It’s harder to hack a network if one doesn’t know what hardware & software
❑ If the above information is deemed necessary, two versions of the
position can be created. The second, more detailed version should be
posted internally and shared with candidates that have made the “first
cut”
Candidate Application Data
■ Companies are responsible for protecting the
data and privacy of the job seeker
■ Non-public personal information (NPPI)
should not be collected if possible
Copyright 2014 Pearson Education, Inc. 6
Copyright 2014 Pearson Education, Inc. 7
The Interview
■ Job Interview:
❑ The interviewer should be concerned about
revealing too much about the company during the
interview
❑ Job candidates should never gain access to
secured areas
❑ A job interview is a perfect foot-printing
opportunity for hackers and social engineers
Copyright 2014 Pearson Education, Inc. 8
Screening Prospective Employees
❑ An organization should protect itself by running
extensive background checks on potential
employees at all levels of the hierarchy
❑ Some higher level positions may require even
more in-depth checks
❑ Many U.S. government jobs require prospective
employees have the requisite clearance level
Copyright 2014 Pearson Education, Inc. 9
Types of Background Checks
❑ The company should have a basic background
check level to which all employees are subjected
❑ Information owners may require more in-depth
checks for specific roles
❑ Workers also have a right to privacy: Not all
information is fair game to gather – only
information relevant to the actual work they
perform
❑ Companies should seek consent from employees
before launching a background check
Copyright 2014 Pearson Education, Inc. 10
Types of Background Checks Cont.
❑ Educational records fall under FERPA. Schools
must first have written authorization before they
can provide student-related information
❑ Motor vehicle records fall under DPPA, which
means that the DMV – or its employees – are not
allowed to disclose information obtained by the
department
❑ The FTC allows the use of credit reports prior to
hiring employees as long as companies do so in
accordance with the Fair Credit Reporting Act
Copyright 2014 Pearson Education, Inc. 11
Types of Background Checks Cont.
❑ Bankruptcies may not be used as the SOLE
reason to not hire someone according to Title 11
of the U.S. Bankruptcy Code
❑ Criminal history: The use of this sort of information
varies from state to state
❑ Worker’s compensation records: In most states,
these records are public records, but their use
may not violate the Americans with Disabilities Act
What Happens in the Onboarding
Phase?
■ The new hire is added to the organization’s
payroll and benefit systems
■ New employees must provide
❑ Proof of identity
❑ Work authorization
❑ Tax identification
■ Two forms that must be completed
❑ Form I-9
❑ Form W-4
Copyright 2014 Pearson Education, Inc. 12
What Is User Provisioning?
■ The process of:
❑ Creating user accounts and group memberships
❑ Providing company identification
❑ Assigning access rights and permissions
❑ Assigning access devices such as tokens and/or
smartcards
■ The user should be provided with and
acknowledge the terms and conditions of the
Acceptable Use Agreement before being
granted access
Copyright 2014 Pearson Education, Inc. 13
What Should an Employee Learn
During Orientation?
■ His responsibilities
■ Information handling standards and privacy
protocols
■ Ask questions
Copyright 2014 Pearson Education, Inc. 14
Copyright 2014 Pearson Education, Inc. 15
The Importance of Employee
Agreements
❑ Confidentiality or non-disclosure agreements
■ Agreement between employees and organization
■ Defines what information may not be disclosed by
employees
■ Goal: To protect sensitive information
■ Especially important in these situations:
❑ When an employee is terminated or leaves
❑ When a third-party contractor was employed
The Importance of Employee
Agreements cont.
■ Acceptable Use Agreement
❑ A policy contract between the company and information systems
user
■ Components of an Acceptable Use Agreement
❑ Introduction
❑ Data classifications
❑ Applicable policy statement
❑ Handling standards
❑ Contacts
❑ Sanctions for violations
❑ acknowledgment
Copyright 2014 Pearson Education, Inc. 16
Copyright 2014 Pearson Education, Inc. 17
The Importance of Security
Education and Training
■ Training employees
❑ According to NIST: “Federal agencies […] cannot
protect […] information […] without ensuring that
all people involved […]:
■ Understand their role and responsibilities related to the
organization’s mission
■ Understand the organization’s IT security policy,
procedures and practices
■ Have at least adequate knowledge of the various
management, operational and technical controls
required and available to protect the IT resources for
which they are responsible”
Copyright 2014 Pearson Education, Inc. 18
The Importance of Security
Education and Training cont.
■ Hackers adapt: If it is easier to use social
engineering – i.e., targeting users – rather
than hack a network device, that is the road
they will take
■ Only securing network devices and
neglecting to train users on information
security topics is ignoring half of the threats
against the company
Copyright 2014 Pearson Education, Inc. 19
What Is the SETA Model?
■ What is SETA?
❑ Security Education Training and Awareness
❑ Awareness is not training: It is focusing the
attention of employees on security topics to
change their behavior
❑ Security awareness campaigns should be
scheduled regularly
❑ Security training “seeks to teach skills” (per NIST)
❑ Security training should NOT be dispensed only to
the technical staff but to all employees
Copyright 2014 Pearson Education, Inc. 20
Summary
❑ A security policy that does not include personnel
as a permanent threat to the data owned by the
company is incomplete. Social engineering is
more virulent than ever.
❑ Failing to train users on security topics is a bad
mistake and may result in a lack of compliance for
some federal mandates.
❑ All users should sign the Acceptable Use
Agreement before receiving access to company’s
systems and equipment

More Related Content

PDF
What is ISO 27001 ISMS
PPTX
Iso 27001 isms presentation
PPSX
Security policies
PDF
A to Z of Information Security Management
PPTX
Human resources security
 
PPTX
Information risk management
PPT
ISO 27001 - Information Security Management System
What is ISO 27001 ISMS
Iso 27001 isms presentation
Security policies
A to Z of Information Security Management
Human resources security
 
Information risk management
ISO 27001 - Information Security Management System

What's hot (20)

PPTX
Chapter 11: Information Security Incident Management
PPTX
ISO 27001 - three years of lessons learned
PDF
Combined MITRE Presentation.pdf
PPTX
ISO 27001 - information security user awareness training presentation -part 2
PPTX
ISO_ 27001:2022 Controls & Clauses.pptx
PDF
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
PDF
Understanding Cyber Attack - Cyber Kill Chain.pdf
PDF
Cybersecurity roadmap : Global healthcare security architecture
PPT
Security policy
PDF
Chapter 11 laws and ethic information security
PPTX
27001.pptx
PDF
ISMS_of ISO 27001-2022-awareness training
PPT
Information security management
PDF
NIST cybersecurity framework
PPTX
All you wanted to know about iso 27000
PDF
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
PDF
003. Business Information System
PPT
Overview of ISO 27001 ISMS
Chapter 11: Information Security Incident Management
ISO 27001 - three years of lessons learned
Combined MITRE Presentation.pdf
ISO 27001 - information security user awareness training presentation -part 2
ISO_ 27001:2022 Controls & Clauses.pptx
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding Cyber Attack - Cyber Kill Chain.pdf
Cybersecurity roadmap : Global healthcare security architecture
Security policy
Chapter 11 laws and ethic information security
27001.pptx
ISMS_of ISO 27001-2022-awareness training
Information security management
NIST cybersecurity framework
All you wanted to know about iso 27000
NIST Cybersecurity Framework Intro for ISACA Richmond Chapter
003. Business Information System
Overview of ISO 27001 ISMS
Ad

Viewers also liked (14)

PPTX
Chapter 8: Communications and Operations Security
PPTX
Chapter 5: Asset Management
PPTX
Chapter 1: Understanding Policy
PPTX
Chapter 12: Business Continuity Management
PPTX
Chapter 2: Policy Elements and style
PPTX
Chapter 10: Information Systems Acquisition, Development, and Maintenance
PPTX
Chapter 9: Access Control Management
PPTX
Chapter 4: Governance and Risk Management
PPTX
Chapter 7: Physical & Environmental Security
PPTX
Chapter 13: Regulatory Compliance for Financial Institutions
PPTX
Chapter 14: Regulatory Compliance for the Healthcare Sector
PPT
Chapter 3: Information Security Framework
PPTX
Chapter 15: PCI Compliance for Merchants
PPT
Chapter 6 HRM,
Chapter 8: Communications and Operations Security
Chapter 5: Asset Management
Chapter 1: Understanding Policy
Chapter 12: Business Continuity Management
Chapter 2: Policy Elements and style
Chapter 10: Information Systems Acquisition, Development, and Maintenance
Chapter 9: Access Control Management
Chapter 4: Governance and Risk Management
Chapter 7: Physical & Environmental Security
Chapter 13: Regulatory Compliance for Financial Institutions
Chapter 14: Regulatory Compliance for the Healthcare Sector
Chapter 3: Information Security Framework
Chapter 15: PCI Compliance for Merchants
Chapter 6 HRM,
Ad

Similar to Chapter 6: Human Resources Security (20)

DOCX
Security Program and PoliciesPrinciples and Practicesby Sari.docx
PPTX
Human Factors_MODULE_2.pptx
PPTX
Pli workplace privacy in the year 2013 2013-6-13
PPT
computer security principles and practice - human factor
PPT
Ch14 Policies and Legislation
PPT
Hrm ethics
PPTX
HRIS Issues
PPTX
Digital Literacy Fundamentals Part 2.pptx
DOCX
Project Plan CreationInclude the following components in an M.docx
PDF
Information Security Awareness
PDF
Workplace Privacy
PDF
Rothke stimulating your career as an information security professional
PDF
Hiring Guide to the Information Security Profession
PDF
Welcome to the Team! Recruiting and Hiring, Including Restrictive Covenants
PPTX
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
PPTX
Hiring and firing in the digital age
PDF
Welcome to the Team! Recruiting and Hiring, Including Restrictive Covenants (...
PPTX
People are the biggest risk
PDF
Recruiting and Hiring, Including Restrictive Covenants (Series: Protecting Yo...
PPTX
Security Awareness and Training
Security Program and PoliciesPrinciples and Practicesby Sari.docx
Human Factors_MODULE_2.pptx
Pli workplace privacy in the year 2013 2013-6-13
computer security principles and practice - human factor
Ch14 Policies and Legislation
Hrm ethics
HRIS Issues
Digital Literacy Fundamentals Part 2.pptx
Project Plan CreationInclude the following components in an M.docx
Information Security Awareness
Workplace Privacy
Rothke stimulating your career as an information security professional
Hiring Guide to the Information Security Profession
Welcome to the Team! Recruiting and Hiring, Including Restrictive Covenants
Electronic Eavesdropping in the Workplace: Can We? Should We? What Could Poss...
Hiring and firing in the digital age
Welcome to the Team! Recruiting and Hiring, Including Restrictive Covenants (...
People are the biggest risk
Recruiting and Hiring, Including Restrictive Covenants (Series: Protecting Yo...
Security Awareness and Training

More from Nada G.Youssef (16)

PPTX
مجلة 1
PPTX
Chapter Tewlve
PPTX
Chapter Eleven
PPTX
Chapter Ten
PPTX
Chapter Nine
PPTX
Chapter Eight
PPTX
Chapter Seven
PPTX
Chapter Six
PPTX
Chapter Five
PPTX
Chapter Four
PPTX
Chapter Three
PPTX
Chapter Two
PPTX
Chapter one
PPTX
Preparatory Year of Saudi Electronic University
PPT
Chapter 12
PPTX
Chapter 11
مجلة 1
Chapter Tewlve
Chapter Eleven
Chapter Ten
Chapter Nine
Chapter Eight
Chapter Seven
Chapter Six
Chapter Five
Chapter Four
Chapter Three
Chapter Two
Chapter one
Preparatory Year of Saudi Electronic University
Chapter 12
Chapter 11

Recently uploaded (20)

PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
RMMM.pdf make it easy to upload and study
PDF
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PDF
01-Introduction-to-Information-Management.pdf
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Anesthesia in Laparoscopic Surgery in India
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PPTX
Cell Structure & Organelles in detailed.
PPTX
Lesson notes of climatology university.
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Paper A Mock Exam 9_ Attempt review.pdf.
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PPTX
Cell Types and Its function , kingdom of life
PPTX
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
PDF
Yogi Goddess Pres Conference Studio Updates
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
RMMM.pdf make it easy to upload and study
ChatGPT for Dummies - Pam Baker Ccesa007.pdf
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
01-Introduction-to-Information-Management.pdf
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Anesthesia in Laparoscopic Surgery in India
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
Cell Structure & Organelles in detailed.
Lesson notes of climatology university.
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Microbial diseases, their pathogenesis and prophylaxis
Paper A Mock Exam 9_ Attempt review.pdf.
Final Presentation General Medicine 03-08-2024.pptx
UNIT III MENTAL HEALTH NURSING ASSESSMENT
Cell Types and Its function , kingdom of life
Introduction-to-Literarature-and-Literary-Studies-week-Prelim-coverage.pptx
Yogi Goddess Pres Conference Studio Updates

Chapter 6: Human Resources Security

  • 1. Security Program and Policies Principles and Practices by Sari Stern Greene Chapter 6: Human Resources Security
  • 2. Copyright 2014 Pearson Education, Inc. 2 Objectives ❑ Define the relationship between information security and personnel practices ❑ Recognize the stages of the employee lifecycle ❑ Describe the purpose of confidentiality and acceptable use agreements ❑ Understand appropriate security education, training, and awareness programs ❑ Create personnel-related security policies and procedures
  • 3. The Employee Lifecycle ■ Represents stages in the employee’s career ■ Lifecycle models can vary but most include the following stages ❑ Recruitment ❑ Onboarding ❑ User provisioning ❑ Orientation ❑ Career development ❑ Termination Copyright 2014 Pearson Education, Inc. 3
  • 4. Copyright 2014 Pearson Education, Inc. 4 What Does Recruitment Have to Do with Security? ❑ Risks and rewards of posting online employment ads: ■ A company can reach a wider audience ■ A company can publish an ad that gives too much information: ❑ About the network infrastructure and therefore allow a hacker to footprint the internal network easily and stealthily ❑ About the company itself, inviting social engineering attacks
  • 5. Copyright 2014 Pearson Education, Inc. 5 Job Postings ■ Job descriptions are supposed to: ❑ Convey the mission of the organization ❑ Describe the position in general terms ❑ Outline the responsibilities attached to said position ❑ Outline the company’s commitment to security via the use of such terms as non-disclosure agreement ■ Job descriptions are NOT supposed to: ❑ Include information about specific systems, software versions, security configurations, or access controls ■ It’s harder to hack a network if one doesn’t know what hardware & software ❑ If the above information is deemed necessary, two versions of the position can be created. The second, more detailed version should be posted internally and shared with candidates that have made the “first cut”
  • 6. Candidate Application Data ■ Companies are responsible for protecting the data and privacy of the job seeker ■ Non-public personal information (NPPI) should not be collected if possible Copyright 2014 Pearson Education, Inc. 6
  • 7. Copyright 2014 Pearson Education, Inc. 7 The Interview ■ Job Interview: ❑ The interviewer should be concerned about revealing too much about the company during the interview ❑ Job candidates should never gain access to secured areas ❑ A job interview is a perfect foot-printing opportunity for hackers and social engineers
  • 8. Copyright 2014 Pearson Education, Inc. 8 Screening Prospective Employees ❑ An organization should protect itself by running extensive background checks on potential employees at all levels of the hierarchy ❑ Some higher level positions may require even more in-depth checks ❑ Many U.S. government jobs require prospective employees have the requisite clearance level
  • 9. Copyright 2014 Pearson Education, Inc. 9 Types of Background Checks ❑ The company should have a basic background check level to which all employees are subjected ❑ Information owners may require more in-depth checks for specific roles ❑ Workers also have a right to privacy: Not all information is fair game to gather – only information relevant to the actual work they perform ❑ Companies should seek consent from employees before launching a background check
  • 10. Copyright 2014 Pearson Education, Inc. 10 Types of Background Checks Cont. ❑ Educational records fall under FERPA. Schools must first have written authorization before they can provide student-related information ❑ Motor vehicle records fall under DPPA, which means that the DMV – or its employees – are not allowed to disclose information obtained by the department ❑ The FTC allows the use of credit reports prior to hiring employees as long as companies do so in accordance with the Fair Credit Reporting Act
  • 11. Copyright 2014 Pearson Education, Inc. 11 Types of Background Checks Cont. ❑ Bankruptcies may not be used as the SOLE reason to not hire someone according to Title 11 of the U.S. Bankruptcy Code ❑ Criminal history: The use of this sort of information varies from state to state ❑ Worker’s compensation records: In most states, these records are public records, but their use may not violate the Americans with Disabilities Act
  • 12. What Happens in the Onboarding Phase? ■ The new hire is added to the organization’s payroll and benefit systems ■ New employees must provide ❑ Proof of identity ❑ Work authorization ❑ Tax identification ■ Two forms that must be completed ❑ Form I-9 ❑ Form W-4 Copyright 2014 Pearson Education, Inc. 12
  • 13. What Is User Provisioning? ■ The process of: ❑ Creating user accounts and group memberships ❑ Providing company identification ❑ Assigning access rights and permissions ❑ Assigning access devices such as tokens and/or smartcards ■ The user should be provided with and acknowledge the terms and conditions of the Acceptable Use Agreement before being granted access Copyright 2014 Pearson Education, Inc. 13
  • 14. What Should an Employee Learn During Orientation? ■ His responsibilities ■ Information handling standards and privacy protocols ■ Ask questions Copyright 2014 Pearson Education, Inc. 14
  • 15. Copyright 2014 Pearson Education, Inc. 15 The Importance of Employee Agreements ❑ Confidentiality or non-disclosure agreements ■ Agreement between employees and organization ■ Defines what information may not be disclosed by employees ■ Goal: To protect sensitive information ■ Especially important in these situations: ❑ When an employee is terminated or leaves ❑ When a third-party contractor was employed
  • 16. The Importance of Employee Agreements cont. ■ Acceptable Use Agreement ❑ A policy contract between the company and information systems user ■ Components of an Acceptable Use Agreement ❑ Introduction ❑ Data classifications ❑ Applicable policy statement ❑ Handling standards ❑ Contacts ❑ Sanctions for violations ❑ acknowledgment Copyright 2014 Pearson Education, Inc. 16
  • 17. Copyright 2014 Pearson Education, Inc. 17 The Importance of Security Education and Training ■ Training employees ❑ According to NIST: “Federal agencies […] cannot protect […] information […] without ensuring that all people involved […]: ■ Understand their role and responsibilities related to the organization’s mission ■ Understand the organization’s IT security policy, procedures and practices ■ Have at least adequate knowledge of the various management, operational and technical controls required and available to protect the IT resources for which they are responsible”
  • 18. Copyright 2014 Pearson Education, Inc. 18 The Importance of Security Education and Training cont. ■ Hackers adapt: If it is easier to use social engineering – i.e., targeting users – rather than hack a network device, that is the road they will take ■ Only securing network devices and neglecting to train users on information security topics is ignoring half of the threats against the company
  • 19. Copyright 2014 Pearson Education, Inc. 19 What Is the SETA Model? ■ What is SETA? ❑ Security Education Training and Awareness ❑ Awareness is not training: It is focusing the attention of employees on security topics to change their behavior ❑ Security awareness campaigns should be scheduled regularly ❑ Security training “seeks to teach skills” (per NIST) ❑ Security training should NOT be dispensed only to the technical staff but to all employees
  • 20. Copyright 2014 Pearson Education, Inc. 20 Summary ❑ A security policy that does not include personnel as a permanent threat to the data owned by the company is incomplete. Social engineering is more virulent than ever. ❑ Failing to train users on security topics is a bad mistake and may result in a lack of compliance for some federal mandates. ❑ All users should sign the Acceptable Use Agreement before receiving access to company’s systems and equipment