SlideShare a Scribd company logo
Improving Delivery Effectiveness of Information Security Learning Continuum
Improving Delivery Effectiveness of Information Security Learning Continuum
Mansoor Faridi
Fort Hays State University
July 28, 2015
Author Note
Mansoor Faridi, Department of Informatics, Fort Hays State University.
Mansoor Faridi is a graduate student at Fort Hays State University specializing in
Information Assurance Management. He lives in Toronto and can be contacted at
[m_faridi@mail.fhsu.edu].
Improving Delivery Effectiveness of Information Security Learning Continuum ii
Table of Contents
Abstract .......................................................................................................................................1
Introduction ..................................................................................................................................2
Components of Information Security Learning Continuum ........................................................3
Awareness …………………………………………………………………....................3
Education ………………………………………………………………………. ............3
Training ………………………………………………………………………................4
Critical Success Factors ...............................................................................................................5
People ……………………………………………………………...................................6
Process ……………………………………………………………. ................................7
Technology ……………………………………………………………. .........................7
Improving Effectiveness ...............................................................................................................7
Baselining Pre-training Results ........................................................................................8
Continuous Improvement .................................................................................................9
Rebaselining Post-training Results ..................................................................................9
Shortcomings and Best Practices .....................................................................................9
Conclusion ................................................................................................................................10
References ..................................................................................................................................11
Improving Delivery Effectiveness of Information Security Learning Continuum 1
Abstract
Users in all organizations globally are either the strongest or the weakest link, when it comes to
ensuring confidentiality, integrity, and availability of critical data. Various organizations design,
develop, and implement information security learning programs, however, effectiveness of their
implementation levels vary owing to a variety of factors.
This research paper proposes a model to improve delivery effectiveness of information
security learning continuum. The research is aimed at identification, analysis, and evaluation of
the essential ingredients required by this learning model, such as, a detailed methodology, critical
success factors, and organizational best practices. The success of this model lies by being
dynamic in nature; its continuous feedback collection mechanism is aimed at finding
efficiencies, and incorporating those efficiencies (on a continuing basis), to ultimately improve
the delivery of organizational learning activities.
Among the numerous best practices, developing and quantifying metrics is paramount to
the success delivery of the information security learning program, and continuous improvements
(based on the collected feedback) to the continuum is the key to successful program delivery.
Keywords: information security awareness, information security governance, information
security education, continuous improvement
Improving Delivery Effectiveness of Information Security Learning Continuum 2
Improving Delivery Effectiveness of Information Security Learning Continuum
Mansoor Faridi
Fort Hays State University
Introduction
This research paper proposes a model to improve delivery effectiveness of information
security learning continuum. The research is aimed at identification, analysis, and evaluation of
the essential ingredients required by this learning model, such as, a detailed methodology, critical
success factors, and organizational best practices. The success of this model lies by being
dynamic in nature; its continuous feedback collection mechanism is aimed at finding
efficiencies, and incorporating those efficiencies (on a continuing basis), to ultimately improve
the delivery of organizational learning activities.
Components of Information Security Learning Continuum section describes the three
essential components of information security learning continuum, including awareness,
education, and training.
Critical Success Factors section established people, process, and technology and their
overlap to produce the sweet-spot which helps establish critical success factors for improving the
delivery effectiveness of information security learning continuum.
Improving Effectiveness section delves into the details for improving the effectiveness of
information security learning continuum through baselining, engaging in continuous
improvement activities (based on the results of which), and rebaselining the learning program. It
concludes by presenting a list of shortcomings and best practices to address those shortcomings.
Conclusion section presents a summarized conclusion of this report while highlighting
the importance and relevance of this topic.
Improving Delivery Effectiveness of Information Security Learning Continuum 3
Components of Information Security Learning Continuum
Information Security (or InfoSec) is the practice of ensuring confidentiality, integrity, and
availability of data from unauthorized access. In order to improve the effectiveness of an
organization’s information security, the quality of education, awareness, and learning activities
should be designed and developed with due care to improve its delivery effectiveness.
In most organizations, Information Security learning activities comprise of awareness,
education, and training in some shape or form. All three elements entail both formal and
informal activities that are discussed below in more detail. It is important that all three stages are
designed and developed by a qualified professional with an intimate familiarity with the nuances
of adult education. Most common dominant learning styles (visual vs. auditory) should be kept in
view when designing the learning activities. In addition, it has been proven that adults learn more
effectively by performing (and discovering) the task at hand in social settings, hence these
known trends need to be incorporated for fun learning experience (Michigan, 2015).
Awareness
This component is the most important of all (others being Education and Training), as
this is the starting point where users attention is focused on security issues, their
acknowledgement of security issues. At this stage, users are normally the recipients of
information, and do not actively participate (NIST, 1998, p.15). Aids used in awareness
campaigns depend on the scope, breadth, and budget; however, the common items include
newsletters, posters, brochures, flyers, videos, promotional slogans, trinkets, mouse-pads, etc. An
effective awareness campaign will stress the ever-changing threat landscape, identify threat-
vectors, and demand timely adjustments to the awareness contents being delivered
Education
Improving Delivery Effectiveness of Information Security Learning Continuum 4
After awareness comes Education. At this stage, users are aware about the security issues
that exist and are looking forward to educate themselves. This stage integrates all of the security
skills and competencies of the various functional specialties into a common body of knowledge.
It also adds a multi-disciplinary study of concepts, issues, and principles (technological and
social).This stage strives to produce users capable of recognizing the threats and being proactive
in their response (NIST, 1998, p.16). An important characteristic of education is that users must
understand why information security is important for the organization (Schlienger & Teufel,
2003).
Training
This is the third and final stage in the learning life cycle. By this time, the users have
been educated on the security issues and now they are ready to get trained on how to behave
securely in the information security context. This level strives to produce relevant and needed
security skills and competency by practitioners of functional specialties other than IT security
(e.g., management, auditing). Training of special security tools (or features) within applications
must be also be offered (NIST, 1998; Schlienger & Teufel, 2003).
Another important aspect of these learning programs is the adoption of a multi-level
approach vis-à-vis test design. For example, users should only be asked to recall, recognize,
and/or understand information security concepts at this initial level (or Primary State). For
example, confidentiality, integrity, availability, and non-repudiation.
The next intermediate level (or Secondary State) of learning should test users’ ability to
apply the learned concepts to real-life situations, to enhance their understanding of the issues at
hand. For example, identity and access management workflows, data retention issues, evolving
threat vectors, need for data quarantine and sanitization, etc.
Improving Delivery Effectiveness of Information Security Learning Continuum 5
The advanced level (or Target State) of testing should encourage users to synthesize
learning in order to analyze and interpret real-life information security situations, and draw
meaningful conclusions. This also helps users become proactive participants by supporting
organizational security initiatives, and raise flag in case of any abnormal online activity.
Users having attained the Target State will seek knowledge proactively. This target level
of expertise goes way beyond exploring basic information security concepts, and should be the
ultimate sweet-spot that trainers should aim for when designing test exercises.
Critical Success Factors
The integration of people, process, and technology entities form an important troika; an
overlap of which leads to the creation of critical success factors (See Figure 1 below). All three
elements entail both formal and informal activities necessary for effective implementation of the
learning program. Each entity represents various essential components, discussed below in more
detail.
Figure 1. Troika – People, Process, Technology
Improving Delivery Effectiveness of Information Security Learning Continuum 6
People
First and foremost, effective implementation of information security learning program
requires executive sponsorship to set the ‘tone-from-top’, which helps secure the required
resources, and highlights the importance of this important initiative. Executive sponsors can also
influence their counterparts in ensuring that the message is received positively across the
organization.
While Executive sponsorship is a must-have, however, the delegation of sponsorship at a
local level (e.g. local Business Unit Champion) does wonders. It is important that this local
sponsor be at the management level with a good amount of influence.
Secondly, users are always deemed to be the weakest link. However, it is important for
individual users to buy-in to the idea, realize the importance of this mission-critical initiative,
and be able to view themselves as an empowered user that makes a significant difference,
protecting the organization’s critical assets, on a daily basis.
Users should be sent short quizzes over time. The responses, both correct and incorrect,
are a gold-mine of information to identify users' understanding of various information security
issues, and to reinforce concepts which most users failed to fully comprehend.
Unannounced drills, such as, planned fishing attacks in coordination with IT should be
executed (and data collected) to determine level of readiness and by analyzing the number of
users who fell prey to such attacks. This data will help remediate the understanding of
information security concepts, and reinforce those concepts as well.
Finally, subject matter experts (SMEs) delivering the program play an important role in
delivering relevant, appropriate, and engaging contents, to produce a well-informed class of
Improving Delivery Effectiveness of Information Security Learning Continuum 7
users. It is paramount to select SMEs with the right qualifications, most importantly with
superior communications skills to deliver an effective learning experience.
Process
This entails formalization of policies, procedures, and standards, while defining metrics,
measurements and feedback mechanism in order to integrate the overall learning program. An
important aspect of this component is the sharing of knowledge and information via an internally
shared repository. Various aspects defined here will be discussed in further detail in later
sections.
Technology
Various technologies can be leveraged, suiting the size of organization. A small
organization may want to measure and report manually, whereas, an enterprise-level
organization may choose to automate the entire process, end-to-end.
Regardless of the size, organizations should have tools to record, measure, and report on
metrics, such as, non-compliances, course completion statistics, and continuous monitoring (e.g.
accessing in-appropriate web-sites) of users' online activities. Technology should also be
leveraged to solicit user-feedback on various issues, and to share knowledge and information via
online spaces (e.g. Wikis, SharePoint, intranet, etc.). With the aid of Active Directory
authentication, technology should also help with Role-based Access (RBAC) Controls,
segregation of duties, least privilege, need to know, limited time access to only let authorized
users in.
Improving Effectiveness
Figure 2 (below) represents information security learning continuum, which
conceptualizes a proposed model to baseline, monitor, improve, and re-baseline the program on a
Improving Delivery Effectiveness of Information Security Learning Continuum 8
continuing basis. According to this model, a gap assessment should be performed to compare
current state with desired future state. This target setting promotes competition, while serving as
a roadmap towards the final destination (i.e. Target state). This model also requires
quantification of the time horizon to set milestones and deliverable, and metric definition to
baseline against.
Figure 2. Information security learning continuum
Baselining (Pre-training Results)
Next step is to consolidate and baseline in-scope organizational metrics. To perform this,
current measurements need to be recorded. This starting point serves as an indicator throughout
the learning continuum vis-à-vis organization current state, and the remaining ‘distance’ to the
target state. It is recommended that half-way through the journey, feedback is formally solicited
from all stakeholders, in addition to the measurements obtained for the pre-defined metrics. This
step helps in determining if any changes/modifications are warranted to any part of the process
and/or the overall learning program.
Improving Delivery Effectiveness of Information Security Learning Continuum 9
It is recommended that, half-way through the journey, user-feedback is formally solicited
from all stakeholders, in addition to the measurements obtained for the pre-defined metrics
(Greaux, 2013). This step helps in determining if any changes/modifications are warranted to any
part of the process. Some of the suggested metrics are as follows:
Table 1. Metrics and their rationale
Metric Data Collected & Reviewed
Use engagement
Successfully reaching out to all uses and the rate of completion of all education,
training, and awareness activities as they are rolled out during the course of a year.
Quality of responses
It is important to identify wrong responses for all learning activities, and then draw out
trends for subsequent analysis. This enables developers identify user strengths, and
also identify areas that require further emphasis to readily address knowledge gaps.
Security breaches (internal)
Internal security breaches should be recorded for later root cause analysis. This will
serve as an input when designing learning activities.
Periodic testing
Data from testing activities (e.g. internally generated fishing emails) should be
analyzed to gauge users’ knowledge level vis-à-vis InfoSec issues.
Continuous Improvement
After baselining, the program needs the continuously monitored and improved. Input can
be in the form of automated monitoring, user feedback, process change requests, etc. Refer to
Figure 2 for mechanisms in place vis-à-vis feedback, process change requests, etc.
Re-baselining (Post-Training Results)
After formal training delivery, measurements need to be taken again, which should be
compared against the initial readings taken when baselining. The delta between the two will help
determine the level of implementation effectiveness of the overall program, while identifying
specific opportunities for improvements.
Shortcomings and Best Practices
Following table (Table 2) lists some reasons why information security controls fail
(SANS, 2015; Thacker, 2013; Winkler & Manke, 2013) and the best practices that can be
developed and implemented to address these shortcomings.
Improving Delivery Effectiveness of Information Security Learning Continuum 10
Table 2. Reasons for shortcomings and best practices
Reasons Shortcomings and Best Practices
Lack of user
awareness
Shortcoming: Simple ‘box-checking’ without understanding the concepts hinders the spirit of
defenses.
Best practice: Different learning activities can help raise user’s awareness level.
Lack of
engagement
Shortcoming: Users are provided with literature, but not tested formally.
Best practice: Users should complete mandatory learning activities to ascertain their
knowledge levels via testing activities.
Operating
without metrics
Shortcoming: In the absence of metrics (quantification), it is impossible to determine if learning
activities are being rolled out, completed, shortcomings being identified, and addressed.
Best Practice: Designing and implement appropriate metrics to quantify activities.
Misplaced
accountabilities
Shortcoming: Business often relinquishes data protection aspects to their IT function, including
governance and oversight.
Best Practice: Data owners (business) need to be continuously involved in all aspects of data
protection, in conjunction with IT. They need to take the ownership of their data, and clearly
understand IT function as mere custodian of their data.
Conclusion
This research paper proposes a model to improve delivery effectiveness of information
security learning continuum. It presents three essential components of information security
learning continuum, including awareness, education, and training. The troika of people, process,
and technology is established as the required component to improve delivery effectiveness of
information security learning continuum. This is achieved by baselining, continuous
improvement, and rebaselining the learning program. Finally, some shortcomings that hinder the
successful implementation are highlighted and suggested best practices are listed to address those
shortcomings.
With proper awareness, users can be the strongest defense, supporting the overall
delivery effectiveness of information security learning continuum; leading the paradigm shift
from static to dynamic mode of learning.
Improving Delivery Effectiveness of Information Security Learning Continuum 11
References
Ashford, W. (February 13, 2015). Data breaches up by 49% in 2014. ComputerWeekly.com.
Retrieved from http://www.computerweekly.com/news/2240240346/Data-breaches
-up-49-in-2014-exposing-more-than-a-billion-records
Awan, I. (2014). Debating the term cyber-terrorism: Issues and problems. Internet Journal of
Criminology. Retrieved from http://www.internetjournalofcriminology.com/Awan_
Debating_The_Term_Cyber-Terrorism_IJC_Jan_2014.pdf
Council of Europe. (2015). Standards: the convention and its protocol. Retrieved from
http://www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp
Cyberwarfare. (2015). In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Cyberwarfare
Cyberwarfare In the United States. (2015). In Wikipedia. Retrieved from http://en.wikipedia.org/
wiki/Cyberwarfare_in_the_United_States
Defence IQ. (2010, May 26). CIA, US military step up cyber space security strategies.
Retrieved from http://www.defenceiq.com/defence-technology/articles/cia-us-military-
step-up-cyber-space-security-strat/
Feldman, N. (2015). Brainy quote. Retrieved from http://www.brainyquote.com/
quotes/keywords/cyber.html
Glennon, M. (2013). The dark future of international cybersecurity regulation. Journal of
National Security Law & Policy, 4, 563-570. Retrieved from http://jnslp.com/wp-c
ontent/uploads/2013/04/The-Dark-Future-of-International-Cybersecurity-Regulation.pdf
Greaux, S. (October 15, 2013). Use metrics to measure and improve security awareness.
PHISHME. Retrieved from http://phishme.com/use-metrics-measure-improve-
effectiveness-security-awareness/
Improving Delivery Effectiveness of Information Security Learning Continuum 12
Hathaway, O., Crootof, R., Levitz, P., Proctor, H., Nowlan, E., Perdue, W., Spiegel, J. (2011).
The law of cyber-attack. Yale Law & Economics Research Paper No. 453, 100 (4), 1-76.
Retrieved from http://www.law.yale.edu/documents/pdf/cglc/LawOfCyberAttack.pdf
ICJ. (2015). Jurisdiction. Retrieved from http://www.icj-cij.org/jurisdiction/index.php?p1=5
IMPACT. (2015). Mission & vision. Retrieved from http://www.impact- alliance.org/
aboutus/mission-&-vision.html
InfoSec Institute. (2013). 2013 - The impact of cybercrime. Retrieved from
http://resources.infosecinstitute.com/2013-impact-cybercrime/
INTERPOL. (2015). Cybercrime. Retrieved from http://www.interpol.int/ Crime-areas/
Cybercrime/Cybercrime
Kanuck, S. (2010). Sovereign discourse on cyber conflict under international law, Texas Law
Review, 88, 1570-1597. Retrieved from https://www.law.upenn.edu/institutes/cerl/
conferences/cyberwar/papers/reading/Kanuck.pdf
McAfee. (2013). The economic impact of cybercrime and cyber espionage. Retrieved from
http://www.mcafee.com/ca/resources/reports/rp-economic-impact-cybercrime-
summary.pdf
Michigan State University. (2015). Design for adult learning, Teaching and Learning Theory,
Feedback. Retrieved from http://learndat.tech.msu.edu/teach/teaching_styles
OAS. (2015). Cyber-security program. Retrieved fromhttps://www.sites.oas.org/
cyber/en/Pages/default.aspx
Ophardt, J. (2010). Cyber warfare and the crime of aggressions: The need for individual
accountability on tomorrow's battlefield. Duke Law & Technology Review, 9(2), 1-27.
Retrieved from http://scholarship.law.duke.edu/dltr/vol9/iss1/2
Improving Delivery Effectiveness of Information Security Learning Continuum 13
Passeri, P. (2015, April 13). March 2015 Cyber Attacks Statistics. Retrieved from
http://hackmageddon.com/category/security/cyber-attacks-statistics/
SANS. (2015). Resources: measuring results. Retrieved from
http://www.securingthehuman.org/resources/metrics
Schjolberg, S. (2007). Terrorism in cyberspace - myth or reality?. Retrieved from
http://www.cybercrimelaw.net/documents/Cyberterrorism.pdf
Shinder, D. (2011, January 26). What makes cybercrime laws so difficult to enforce. Tech
Republic. Retrieved from http://www.techrepublic.com/blog/it-security/what-makes-
cybercrime-laws-so-difficult-to-enforce/
Stockton, P., Goldman, M., (2014). Prosecuting cyberterrorists: Applying traditional
jurisdictional frameworks to a modern threat. Stanford Law & Policy Review, 25, 211-
268. Retrieved from https://journals.law.stanford.edu/sites/default/files/stanford-law-
policy-review/print/2014/06/stockton_goldman_25_stan._l._poly_rev._211.pdf
Thacker, N. (2013). Top 10 reasons information security defences fail. TRUSTMARQUE.
Retrieved from http://www.trustmarque.com/top-10-reasons-information-security-
defences-fail/
Wegener, H. (2014). Regulating cyber behaviour: Some Initial Reflections on Codes of Conduct
and Confidence-Building Measures. Retrieved from https://www.unibw.de/infosecur/
publications/individual_publications/wegener_regulating_cyber_behaviour_paper_2014
Winkler, I., Manke, S. (July 10, 2013). 7 reasons for security awareness of failure.
CSOONLINE. Retrieved from http://www.csoonline.com/article/2133697/metrics-
budgets/7-reasons-for-security-awareness-failure.html

More Related Content

PDF
Recapitulating the development initiatives of a robust information security s...
PDF
Information Security Governance: Concepts, Security Management & Metrics
PDF
Issues on Management and Governance of Data Security In HEIs
PPSX
Information Security Governance: Concepts, Security Management & Metrics
DOC
report on Mobile security
PDF
Information Security Management System: Emerging Issues and Prospect
PDF
Five principles for improving your cyber security
PPT
Building Tech Capacity through Assessing Capability
Recapitulating the development initiatives of a robust information security s...
Information Security Governance: Concepts, Security Management & Metrics
Issues on Management and Governance of Data Security In HEIs
Information Security Governance: Concepts, Security Management & Metrics
report on Mobile security
Information Security Management System: Emerging Issues and Prospect
Five principles for improving your cyber security
Building Tech Capacity through Assessing Capability

What's hot (6)

PDF
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
PDF
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
PPT
Security and personnel bp11521
PDF
Si pi, 02, kiki kusumayadi ahadiyat, hapzi ali, the application of data and i...
PPTX
PDF
An information security governance framework
MANAGING SECURITY AND COMPLIANCE RISKS OF OUTSOURCED IT PROJECTS
WIRELESS SECURITY MEASUREMENT USING DATA VALUE INDEX
Security and personnel bp11521
Si pi, 02, kiki kusumayadi ahadiyat, hapzi ali, the application of data and i...
An information security governance framework
Ad

Viewers also liked (17)

PPTX
07. Палітыка беларусізацыі
DOCX
Detection and Rectification of Distorted Fingerprints
PPTX
Ozone Gaming Presentation - VIE
PDF
221 ___-1-
DOCX
RANDYLEE RICE April 8
DOCX
nơi nào thiết kế phim quảng cáo công ty
DOC
Abhishek_Solanki
PPS
Минский экспериментально фурнитурный завод
PDF
CB_Presentation_OperatingLeases_FINAL
PDF
Drugs, pregnancy, and lactation: ondansetron--troubling data.
PDF
Goetz History Thesis Final
PDF
TalkToStrangers
PPTX
Buying or Selling a Small Business? What You Need to Know.
DOCX
El manejo de word
PDF
Moore, Rebekah E_Public Work Sample_LR
PPTX
Oates 501(c)(3) press.pptx
PPT
Saxen van coller on wild photography
07. Палітыка беларусізацыі
Detection and Rectification of Distorted Fingerprints
Ozone Gaming Presentation - VIE
221 ___-1-
RANDYLEE RICE April 8
nơi nào thiết kế phim quảng cáo công ty
Abhishek_Solanki
Минский экспериментально фурнитурный завод
CB_Presentation_OperatingLeases_FINAL
Drugs, pregnancy, and lactation: ondansetron--troubling data.
Goetz History Thesis Final
TalkToStrangers
Buying or Selling a Small Business? What You Need to Know.
El manejo de word
Moore, Rebekah E_Public Work Sample_LR
Oates 501(c)(3) press.pptx
Saxen van coller on wild photography
Ad

Similar to Improving Delivery Effectiveness of Information Security Learning Continuum (20)

PDF
DHS National Summit Full CHAIR Geoff Shively
PDF
How To Promote Security Awareness In Your Company
PPT
End User Security Awareness Presentation
PDF
The human factor
PPTX
Towards a Structured Information Security Awareness Programme
PPTX
IS Chap 1 by whitman chapter 1 pptx.pptx
PDF
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
PDF
Clasify information in education field
PPTX
Information security Chap 1 whitman.pptx
PPTX
Human Factors_MODULE_2.pptx
PPTX
Security Awareness and Training
PDF
Why Traditional Security has Failed
PDF
Human Impact on Information Security - Computer Society of India Conference, ...
PDF
Discuss the requirements for developing a Security Education, Tranin.pdf
PDF
Wp 2019 security_awareness_report
PDF
The Three Dimensions of Security
PPT
Security Awareness Training for Community Colleges 2009
PDF
Information Security Maturity Model
PDF
Best Practices for Security Awareness and Training
PDF
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...
DHS National Summit Full CHAIR Geoff Shively
How To Promote Security Awareness In Your Company
End User Security Awareness Presentation
The human factor
Towards a Structured Information Security Awareness Programme
IS Chap 1 by whitman chapter 1 pptx.pptx
AN EFFECTIVE METHOD FOR INFORMATION SECURITY AWARENESS RAISING INITIATIVES
Clasify information in education field
Information security Chap 1 whitman.pptx
Human Factors_MODULE_2.pptx
Security Awareness and Training
Why Traditional Security has Failed
Human Impact on Information Security - Computer Society of India Conference, ...
Discuss the requirements for developing a Security Education, Tranin.pdf
Wp 2019 security_awareness_report
The Three Dimensions of Security
Security Awareness Training for Community Colleges 2009
Information Security Maturity Model
Best Practices for Security Awareness and Training
Reducing Security Risks Due to Human Error - Information Security Summit, Kua...

Improving Delivery Effectiveness of Information Security Learning Continuum

  • 1. Improving Delivery Effectiveness of Information Security Learning Continuum Improving Delivery Effectiveness of Information Security Learning Continuum Mansoor Faridi Fort Hays State University July 28, 2015 Author Note Mansoor Faridi, Department of Informatics, Fort Hays State University. Mansoor Faridi is a graduate student at Fort Hays State University specializing in Information Assurance Management. He lives in Toronto and can be contacted at [m_faridi@mail.fhsu.edu].
  • 2. Improving Delivery Effectiveness of Information Security Learning Continuum ii Table of Contents Abstract .......................................................................................................................................1 Introduction ..................................................................................................................................2 Components of Information Security Learning Continuum ........................................................3 Awareness …………………………………………………………………....................3 Education ………………………………………………………………………. ............3 Training ………………………………………………………………………................4 Critical Success Factors ...............................................................................................................5 People ……………………………………………………………...................................6 Process ……………………………………………………………. ................................7 Technology ……………………………………………………………. .........................7 Improving Effectiveness ...............................................................................................................7 Baselining Pre-training Results ........................................................................................8 Continuous Improvement .................................................................................................9 Rebaselining Post-training Results ..................................................................................9 Shortcomings and Best Practices .....................................................................................9 Conclusion ................................................................................................................................10 References ..................................................................................................................................11
  • 3. Improving Delivery Effectiveness of Information Security Learning Continuum 1 Abstract Users in all organizations globally are either the strongest or the weakest link, when it comes to ensuring confidentiality, integrity, and availability of critical data. Various organizations design, develop, and implement information security learning programs, however, effectiveness of their implementation levels vary owing to a variety of factors. This research paper proposes a model to improve delivery effectiveness of information security learning continuum. The research is aimed at identification, analysis, and evaluation of the essential ingredients required by this learning model, such as, a detailed methodology, critical success factors, and organizational best practices. The success of this model lies by being dynamic in nature; its continuous feedback collection mechanism is aimed at finding efficiencies, and incorporating those efficiencies (on a continuing basis), to ultimately improve the delivery of organizational learning activities. Among the numerous best practices, developing and quantifying metrics is paramount to the success delivery of the information security learning program, and continuous improvements (based on the collected feedback) to the continuum is the key to successful program delivery. Keywords: information security awareness, information security governance, information security education, continuous improvement
  • 4. Improving Delivery Effectiveness of Information Security Learning Continuum 2 Improving Delivery Effectiveness of Information Security Learning Continuum Mansoor Faridi Fort Hays State University Introduction This research paper proposes a model to improve delivery effectiveness of information security learning continuum. The research is aimed at identification, analysis, and evaluation of the essential ingredients required by this learning model, such as, a detailed methodology, critical success factors, and organizational best practices. The success of this model lies by being dynamic in nature; its continuous feedback collection mechanism is aimed at finding efficiencies, and incorporating those efficiencies (on a continuing basis), to ultimately improve the delivery of organizational learning activities. Components of Information Security Learning Continuum section describes the three essential components of information security learning continuum, including awareness, education, and training. Critical Success Factors section established people, process, and technology and their overlap to produce the sweet-spot which helps establish critical success factors for improving the delivery effectiveness of information security learning continuum. Improving Effectiveness section delves into the details for improving the effectiveness of information security learning continuum through baselining, engaging in continuous improvement activities (based on the results of which), and rebaselining the learning program. It concludes by presenting a list of shortcomings and best practices to address those shortcomings. Conclusion section presents a summarized conclusion of this report while highlighting the importance and relevance of this topic.
  • 5. Improving Delivery Effectiveness of Information Security Learning Continuum 3 Components of Information Security Learning Continuum Information Security (or InfoSec) is the practice of ensuring confidentiality, integrity, and availability of data from unauthorized access. In order to improve the effectiveness of an organization’s information security, the quality of education, awareness, and learning activities should be designed and developed with due care to improve its delivery effectiveness. In most organizations, Information Security learning activities comprise of awareness, education, and training in some shape or form. All three elements entail both formal and informal activities that are discussed below in more detail. It is important that all three stages are designed and developed by a qualified professional with an intimate familiarity with the nuances of adult education. Most common dominant learning styles (visual vs. auditory) should be kept in view when designing the learning activities. In addition, it has been proven that adults learn more effectively by performing (and discovering) the task at hand in social settings, hence these known trends need to be incorporated for fun learning experience (Michigan, 2015). Awareness This component is the most important of all (others being Education and Training), as this is the starting point where users attention is focused on security issues, their acknowledgement of security issues. At this stage, users are normally the recipients of information, and do not actively participate (NIST, 1998, p.15). Aids used in awareness campaigns depend on the scope, breadth, and budget; however, the common items include newsletters, posters, brochures, flyers, videos, promotional slogans, trinkets, mouse-pads, etc. An effective awareness campaign will stress the ever-changing threat landscape, identify threat- vectors, and demand timely adjustments to the awareness contents being delivered Education
  • 6. Improving Delivery Effectiveness of Information Security Learning Continuum 4 After awareness comes Education. At this stage, users are aware about the security issues that exist and are looking forward to educate themselves. This stage integrates all of the security skills and competencies of the various functional specialties into a common body of knowledge. It also adds a multi-disciplinary study of concepts, issues, and principles (technological and social).This stage strives to produce users capable of recognizing the threats and being proactive in their response (NIST, 1998, p.16). An important characteristic of education is that users must understand why information security is important for the organization (Schlienger & Teufel, 2003). Training This is the third and final stage in the learning life cycle. By this time, the users have been educated on the security issues and now they are ready to get trained on how to behave securely in the information security context. This level strives to produce relevant and needed security skills and competency by practitioners of functional specialties other than IT security (e.g., management, auditing). Training of special security tools (or features) within applications must be also be offered (NIST, 1998; Schlienger & Teufel, 2003). Another important aspect of these learning programs is the adoption of a multi-level approach vis-à-vis test design. For example, users should only be asked to recall, recognize, and/or understand information security concepts at this initial level (or Primary State). For example, confidentiality, integrity, availability, and non-repudiation. The next intermediate level (or Secondary State) of learning should test users’ ability to apply the learned concepts to real-life situations, to enhance their understanding of the issues at hand. For example, identity and access management workflows, data retention issues, evolving threat vectors, need for data quarantine and sanitization, etc.
  • 7. Improving Delivery Effectiveness of Information Security Learning Continuum 5 The advanced level (or Target State) of testing should encourage users to synthesize learning in order to analyze and interpret real-life information security situations, and draw meaningful conclusions. This also helps users become proactive participants by supporting organizational security initiatives, and raise flag in case of any abnormal online activity. Users having attained the Target State will seek knowledge proactively. This target level of expertise goes way beyond exploring basic information security concepts, and should be the ultimate sweet-spot that trainers should aim for when designing test exercises. Critical Success Factors The integration of people, process, and technology entities form an important troika; an overlap of which leads to the creation of critical success factors (See Figure 1 below). All three elements entail both formal and informal activities necessary for effective implementation of the learning program. Each entity represents various essential components, discussed below in more detail. Figure 1. Troika – People, Process, Technology
  • 8. Improving Delivery Effectiveness of Information Security Learning Continuum 6 People First and foremost, effective implementation of information security learning program requires executive sponsorship to set the ‘tone-from-top’, which helps secure the required resources, and highlights the importance of this important initiative. Executive sponsors can also influence their counterparts in ensuring that the message is received positively across the organization. While Executive sponsorship is a must-have, however, the delegation of sponsorship at a local level (e.g. local Business Unit Champion) does wonders. It is important that this local sponsor be at the management level with a good amount of influence. Secondly, users are always deemed to be the weakest link. However, it is important for individual users to buy-in to the idea, realize the importance of this mission-critical initiative, and be able to view themselves as an empowered user that makes a significant difference, protecting the organization’s critical assets, on a daily basis. Users should be sent short quizzes over time. The responses, both correct and incorrect, are a gold-mine of information to identify users' understanding of various information security issues, and to reinforce concepts which most users failed to fully comprehend. Unannounced drills, such as, planned fishing attacks in coordination with IT should be executed (and data collected) to determine level of readiness and by analyzing the number of users who fell prey to such attacks. This data will help remediate the understanding of information security concepts, and reinforce those concepts as well. Finally, subject matter experts (SMEs) delivering the program play an important role in delivering relevant, appropriate, and engaging contents, to produce a well-informed class of
  • 9. Improving Delivery Effectiveness of Information Security Learning Continuum 7 users. It is paramount to select SMEs with the right qualifications, most importantly with superior communications skills to deliver an effective learning experience. Process This entails formalization of policies, procedures, and standards, while defining metrics, measurements and feedback mechanism in order to integrate the overall learning program. An important aspect of this component is the sharing of knowledge and information via an internally shared repository. Various aspects defined here will be discussed in further detail in later sections. Technology Various technologies can be leveraged, suiting the size of organization. A small organization may want to measure and report manually, whereas, an enterprise-level organization may choose to automate the entire process, end-to-end. Regardless of the size, organizations should have tools to record, measure, and report on metrics, such as, non-compliances, course completion statistics, and continuous monitoring (e.g. accessing in-appropriate web-sites) of users' online activities. Technology should also be leveraged to solicit user-feedback on various issues, and to share knowledge and information via online spaces (e.g. Wikis, SharePoint, intranet, etc.). With the aid of Active Directory authentication, technology should also help with Role-based Access (RBAC) Controls, segregation of duties, least privilege, need to know, limited time access to only let authorized users in. Improving Effectiveness Figure 2 (below) represents information security learning continuum, which conceptualizes a proposed model to baseline, monitor, improve, and re-baseline the program on a
  • 10. Improving Delivery Effectiveness of Information Security Learning Continuum 8 continuing basis. According to this model, a gap assessment should be performed to compare current state with desired future state. This target setting promotes competition, while serving as a roadmap towards the final destination (i.e. Target state). This model also requires quantification of the time horizon to set milestones and deliverable, and metric definition to baseline against. Figure 2. Information security learning continuum Baselining (Pre-training Results) Next step is to consolidate and baseline in-scope organizational metrics. To perform this, current measurements need to be recorded. This starting point serves as an indicator throughout the learning continuum vis-à-vis organization current state, and the remaining ‘distance’ to the target state. It is recommended that half-way through the journey, feedback is formally solicited from all stakeholders, in addition to the measurements obtained for the pre-defined metrics. This step helps in determining if any changes/modifications are warranted to any part of the process and/or the overall learning program.
  • 11. Improving Delivery Effectiveness of Information Security Learning Continuum 9 It is recommended that, half-way through the journey, user-feedback is formally solicited from all stakeholders, in addition to the measurements obtained for the pre-defined metrics (Greaux, 2013). This step helps in determining if any changes/modifications are warranted to any part of the process. Some of the suggested metrics are as follows: Table 1. Metrics and their rationale Metric Data Collected & Reviewed Use engagement Successfully reaching out to all uses and the rate of completion of all education, training, and awareness activities as they are rolled out during the course of a year. Quality of responses It is important to identify wrong responses for all learning activities, and then draw out trends for subsequent analysis. This enables developers identify user strengths, and also identify areas that require further emphasis to readily address knowledge gaps. Security breaches (internal) Internal security breaches should be recorded for later root cause analysis. This will serve as an input when designing learning activities. Periodic testing Data from testing activities (e.g. internally generated fishing emails) should be analyzed to gauge users’ knowledge level vis-à-vis InfoSec issues. Continuous Improvement After baselining, the program needs the continuously monitored and improved. Input can be in the form of automated monitoring, user feedback, process change requests, etc. Refer to Figure 2 for mechanisms in place vis-à-vis feedback, process change requests, etc. Re-baselining (Post-Training Results) After formal training delivery, measurements need to be taken again, which should be compared against the initial readings taken when baselining. The delta between the two will help determine the level of implementation effectiveness of the overall program, while identifying specific opportunities for improvements. Shortcomings and Best Practices Following table (Table 2) lists some reasons why information security controls fail (SANS, 2015; Thacker, 2013; Winkler & Manke, 2013) and the best practices that can be developed and implemented to address these shortcomings.
  • 12. Improving Delivery Effectiveness of Information Security Learning Continuum 10 Table 2. Reasons for shortcomings and best practices Reasons Shortcomings and Best Practices Lack of user awareness Shortcoming: Simple ‘box-checking’ without understanding the concepts hinders the spirit of defenses. Best practice: Different learning activities can help raise user’s awareness level. Lack of engagement Shortcoming: Users are provided with literature, but not tested formally. Best practice: Users should complete mandatory learning activities to ascertain their knowledge levels via testing activities. Operating without metrics Shortcoming: In the absence of metrics (quantification), it is impossible to determine if learning activities are being rolled out, completed, shortcomings being identified, and addressed. Best Practice: Designing and implement appropriate metrics to quantify activities. Misplaced accountabilities Shortcoming: Business often relinquishes data protection aspects to their IT function, including governance and oversight. Best Practice: Data owners (business) need to be continuously involved in all aspects of data protection, in conjunction with IT. They need to take the ownership of their data, and clearly understand IT function as mere custodian of their data. Conclusion This research paper proposes a model to improve delivery effectiveness of information security learning continuum. It presents three essential components of information security learning continuum, including awareness, education, and training. The troika of people, process, and technology is established as the required component to improve delivery effectiveness of information security learning continuum. This is achieved by baselining, continuous improvement, and rebaselining the learning program. Finally, some shortcomings that hinder the successful implementation are highlighted and suggested best practices are listed to address those shortcomings. With proper awareness, users can be the strongest defense, supporting the overall delivery effectiveness of information security learning continuum; leading the paradigm shift from static to dynamic mode of learning.
  • 13. Improving Delivery Effectiveness of Information Security Learning Continuum 11 References Ashford, W. (February 13, 2015). Data breaches up by 49% in 2014. ComputerWeekly.com. Retrieved from http://www.computerweekly.com/news/2240240346/Data-breaches -up-49-in-2014-exposing-more-than-a-billion-records Awan, I. (2014). Debating the term cyber-terrorism: Issues and problems. Internet Journal of Criminology. Retrieved from http://www.internetjournalofcriminology.com/Awan_ Debating_The_Term_Cyber-Terrorism_IJC_Jan_2014.pdf Council of Europe. (2015). Standards: the convention and its protocol. Retrieved from http://www.coe.int/t/DGHL/cooperation/economiccrime/cybercrime/default_en.asp Cyberwarfare. (2015). In Wikipedia. Retrieved from http://en.wikipedia.org/wiki/Cyberwarfare Cyberwarfare In the United States. (2015). In Wikipedia. Retrieved from http://en.wikipedia.org/ wiki/Cyberwarfare_in_the_United_States Defence IQ. (2010, May 26). CIA, US military step up cyber space security strategies. Retrieved from http://www.defenceiq.com/defence-technology/articles/cia-us-military- step-up-cyber-space-security-strat/ Feldman, N. (2015). Brainy quote. Retrieved from http://www.brainyquote.com/ quotes/keywords/cyber.html Glennon, M. (2013). The dark future of international cybersecurity regulation. Journal of National Security Law & Policy, 4, 563-570. Retrieved from http://jnslp.com/wp-c ontent/uploads/2013/04/The-Dark-Future-of-International-Cybersecurity-Regulation.pdf Greaux, S. (October 15, 2013). Use metrics to measure and improve security awareness. PHISHME. Retrieved from http://phishme.com/use-metrics-measure-improve- effectiveness-security-awareness/
  • 14. Improving Delivery Effectiveness of Information Security Learning Continuum 12 Hathaway, O., Crootof, R., Levitz, P., Proctor, H., Nowlan, E., Perdue, W., Spiegel, J. (2011). The law of cyber-attack. Yale Law & Economics Research Paper No. 453, 100 (4), 1-76. Retrieved from http://www.law.yale.edu/documents/pdf/cglc/LawOfCyberAttack.pdf ICJ. (2015). Jurisdiction. Retrieved from http://www.icj-cij.org/jurisdiction/index.php?p1=5 IMPACT. (2015). Mission & vision. Retrieved from http://www.impact- alliance.org/ aboutus/mission-&-vision.html InfoSec Institute. (2013). 2013 - The impact of cybercrime. Retrieved from http://resources.infosecinstitute.com/2013-impact-cybercrime/ INTERPOL. (2015). Cybercrime. Retrieved from http://www.interpol.int/ Crime-areas/ Cybercrime/Cybercrime Kanuck, S. (2010). Sovereign discourse on cyber conflict under international law, Texas Law Review, 88, 1570-1597. Retrieved from https://www.law.upenn.edu/institutes/cerl/ conferences/cyberwar/papers/reading/Kanuck.pdf McAfee. (2013). The economic impact of cybercrime and cyber espionage. Retrieved from http://www.mcafee.com/ca/resources/reports/rp-economic-impact-cybercrime- summary.pdf Michigan State University. (2015). Design for adult learning, Teaching and Learning Theory, Feedback. Retrieved from http://learndat.tech.msu.edu/teach/teaching_styles OAS. (2015). Cyber-security program. Retrieved fromhttps://www.sites.oas.org/ cyber/en/Pages/default.aspx Ophardt, J. (2010). Cyber warfare and the crime of aggressions: The need for individual accountability on tomorrow's battlefield. Duke Law & Technology Review, 9(2), 1-27. Retrieved from http://scholarship.law.duke.edu/dltr/vol9/iss1/2
  • 15. Improving Delivery Effectiveness of Information Security Learning Continuum 13 Passeri, P. (2015, April 13). March 2015 Cyber Attacks Statistics. Retrieved from http://hackmageddon.com/category/security/cyber-attacks-statistics/ SANS. (2015). Resources: measuring results. Retrieved from http://www.securingthehuman.org/resources/metrics Schjolberg, S. (2007). Terrorism in cyberspace - myth or reality?. Retrieved from http://www.cybercrimelaw.net/documents/Cyberterrorism.pdf Shinder, D. (2011, January 26). What makes cybercrime laws so difficult to enforce. Tech Republic. Retrieved from http://www.techrepublic.com/blog/it-security/what-makes- cybercrime-laws-so-difficult-to-enforce/ Stockton, P., Goldman, M., (2014). Prosecuting cyberterrorists: Applying traditional jurisdictional frameworks to a modern threat. Stanford Law & Policy Review, 25, 211- 268. Retrieved from https://journals.law.stanford.edu/sites/default/files/stanford-law- policy-review/print/2014/06/stockton_goldman_25_stan._l._poly_rev._211.pdf Thacker, N. (2013). Top 10 reasons information security defences fail. TRUSTMARQUE. Retrieved from http://www.trustmarque.com/top-10-reasons-information-security- defences-fail/ Wegener, H. (2014). Regulating cyber behaviour: Some Initial Reflections on Codes of Conduct and Confidence-Building Measures. Retrieved from https://www.unibw.de/infosecur/ publications/individual_publications/wegener_regulating_cyber_behaviour_paper_2014 Winkler, I., Manke, S. (July 10, 2013). 7 reasons for security awareness of failure. CSOONLINE. Retrieved from http://www.csoonline.com/article/2133697/metrics- budgets/7-reasons-for-security-awareness-failure.html