DocumentCode :
2347898
Title :
Protecting information assets through effective computer security training
Author :
Walsh, Thomas R.
Author_Institution :
Dept. of Energy, Sci. Applications Int. Corp., Albuquerque, NM, USA
fYear :
1994
fDate :
12-14 Oct 1994
Firstpage :
126
Lastpage :
127
Abstract :
Once you give users access to your computer systems, you´re vulnerable! Giving untrained users access to your computer information systems is like giving the keys of a Lamborghini to a teenager! Your computer systems are an accident waiting to happen, unless you have an effective computer security training program embedded within your high-technology security. Because computer security training is usually mandatory, employee attitude affects what they´ll get out of the training. Employees dread (and resist) computer security training. The author discusses how to deliver computer security training to users, to reduce the risks to your information systems
Keywords :
DP management; information systems; security of data; training; computer information systems; computer security training; high-technology security; information systems; training program; Computer security; Data security; Information systems; Software management; Training;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Security Technology, 1994. Proceedings. Institute of Electrical and Electronics Engineers 28th Annual 1994 International Carnahan Conference on
Conference_Location :
Albuquerque, NM
Print_ISBN :
0-7803-1479-4
Type :
conf
DOI :
10.1109/CCST.1994.363782
Filename :
363782
Link To Document :
بازگشت