Cargando…

Advanced persistent training : take your security awareness program to the next level /

Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that ta...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Schroeder, Jordan (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: [United States] : Apress, 2017.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ii 4500
001 OR_ocn990182942
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cnu|||unuuu
008 170616s2017 xxu ob 001 0 eng d
040 |a N$T  |b eng  |e rda  |e pn  |c N$T  |d N$T  |d EBLCP  |d GW5XE  |d OCLCF  |d UAB  |d YDX  |d NJR  |d MERER  |d ESU  |d OCLCQ  |d NUI  |d COO  |d AZU  |d UPM  |d OCLCQ  |d VT2  |d IOG  |d K6U  |d IDB  |d MERUC  |d OCLCA  |d LIV  |d U3W  |d D6H  |d CAUOI  |d OCLCQ  |d VVB  |d KSU  |d AU@  |d WYU  |d UKMGB  |d UMI  |d TOH  |d UKAHL  |d C6I  |d LEAUB  |d UHL  |d LEATE  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO  |d OCLCQ  |d AUD  |d OCLCQ  |d OCLCO 
015 |a GBB8M4564  |2 bnb 
016 7 |a 019140070  |2 Uk 
019 |a 990518591  |a 996413002  |a 1005809827  |a 1011908770  |a 1058532663  |a 1066550676  |a 1076922407  |a 1086505454  |a 1112860400  |a 1112955201  |a 1122817049  |a 1125688864  |a 1136362950 
020 |a 9781484228357  |q (electronic bk.) 
020 |a 1484228359  |q (electronic bk.) 
020 |a 1484228340 
020 |a 9781484228340 
020 |z 9781484228340 
024 7 |a 10.1007/978-1-4842-2835-7  |2 doi 
024 3 |a 9781484228340 
029 1 |a AU@  |b 000060467047 
029 1 |a CHNEW  |b 000962018 
029 1 |a CHVBK  |b 491706480 
029 1 |a UKMGB  |b 019140070 
029 1 |a AU@  |b 000065065747 
029 1 |a AU@  |b 000066230520 
029 1 |a AU@  |b 000072973048 
029 1 |a AU@  |b 000069009859 
035 |a (OCoLC)990182942  |z (OCoLC)990518591  |z (OCoLC)996413002  |z (OCoLC)1005809827  |z (OCoLC)1011908770  |z (OCoLC)1058532663  |z (OCoLC)1066550676  |z (OCoLC)1076922407  |z (OCoLC)1086505454  |z (OCoLC)1112860400  |z (OCoLC)1112955201  |z (OCoLC)1122817049  |z (OCoLC)1125688864  |z (OCoLC)1136362950 
037 |a 9781484228340  |b 00152887 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 053000  |2 bisacsh 
072 7 |a UR  |2 bicssc 
072 7 |a UR  |2 thema 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Schroeder, Jordan,  |e author. 
245 1 0 |a Advanced persistent training :  |b take your security awareness program to the next level /  |c Jordan Schroeder. 
264 1 |a [United States] :  |b Apress,  |c 2017. 
264 2 |a New York, NY :  |b Distributed to the Book trade worldwide by Springer 
264 4 |c ©2017 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
504 |a Includes bibliographical references and index. 
588 0 |a Online resource; title from PDF title page (Ebsco; title viewed on June 20, 2017). 
505 0 |a At a Glance; Contents; About the Author; About the Technical Reviewer; Acknowledgments; Foreword; Chapter 1: Challenges Faced by Organizations; Effective Training Is Difficult; Knowledge Is Not Enough; Chapter 2: Active Feedback; Gamification; Active Feedback Element: Clearly Define the Goal; Active Feedback Element: Score Progress Toward the Goal; Active Feedback Element: Provide Frequent Feedback; Active Feedback Element: Habits to Reach the Goal; Active Feedback Element: Habit Coaching; Multiple Habits; Awards, Rewards, and Recognition; Gaming the System. 
505 8 |a Chapter 3: Behavioral ModificationShaping, Not Shaming; Volunteered Behaviors; Positive Reinforcement; Incident Response and Security Awareness; "That User"; Attackers Use Behavioral Tricks; Chapter 4: Persistent Training; Benefits of Persistent Training; Graduated Learning; Spaced Repetition; Integration with Active Feedback; A Warning About Persistent Training; Chapter 5: Metrics and Measures; Objective Metrics; Subjective Metrics; Chapter 6: Pro Tips; The Millennial Factor; How Near-Miss Bias Affects Security Awareness Training; Lie; Customize; The Home Front; Show Real Attacks. 
505 8 |a CopywritingMindfulness; Each One Teach One; The Attacker's Mind-Set; Chapter 7: Security Culture; Making Security as Sexy as Brushing Your Teeth; Stickers, Lipstick, Joysticks, Sticks; Create a Subculture of Change; A Vocal Team of Interconnected Volunteers; Find the Big Idea; The Five Whys; Align to Business Goals; Recruit Volunteers; Support the Volunteers; Volunteers Draft the Plan; Tell Their Stories; Rinse, Repeat; Will It Work?; Accelerate; Storebrand Case Study; Security Operation Center Case Study; Chapter 8: Take Your Program to the Next Level; Appendix A: Lessons from the Masters. 
505 8 |a Wombat Security TechnologiesPhishLine; Rapid7; Curricula; How to Implement Third-Party Training; Wombat Security Technologies' Joe Ferrara; PhishLine's Mark Chapman; Rapid7's Todd Lefkowitz; Curricula's Nick Santora; References; Index. 
520 |a Gain greater compliance with corporate training by addressing the heart of the very awareness vs. compliance problem: people are human. People have incredible strengths and incredible weaknesses, and as a Information Security professional, you need to recognize and devise training strategies that take advantage of both. This concise book introduces two such strategies, which combined, can take a security awareness program to the next level of effectiveness, retention, compliance, and maturity. Security policies and procedures are often times inconvenient, technically complex, and hard to understand. Advanced Persistent Training provides numerous tips from a wide range of disciplines to handle these especially difficult situations. Many information security professionals are required by regulation or policy to provide security awareness training within the companies they work for, but many believe that the resulting low compliance with training does not outweigh the costs of delivering that training. There are also many who believe that this training is crucial, if only it could be more effective. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Computer networks  |x Security measures. 
650 1 4 |a Computer Science. 
650 2 4 |a Security. 
650 2 4 |a Computer Applications. 
650 2 4 |a Systems and Data Security. 
650 6 |a Sécurité informatique. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Information technology: general issues.  |2 bicssc 
650 7 |a Computer security.  |2 bicssc 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
776 0 8 |i Printed edition:  |z 9781484228340 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781484228357/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33062903 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL4877842 
938 |a EBSCOhost  |b EBSC  |n 1534769 
938 |a YBP Library Services  |b YANK  |n 14580486 
994 |a 92  |b IZTAP