Title :
Protecting information assets through effective computer security training
Author :
Walsh, Thomas R.
Author_Institution :
Dept. of Energy, Sci. Applications Int. Corp., Albuquerque, NM, USA
Abstract :
Once you give users access to your computer systems, you´re vulnerable! Giving untrained users access to your computer information systems is like giving the keys of a Lamborghini to a teenager! Your computer systems are an accident waiting to happen, unless you have an effective computer security training program embedded within your high-technology security. Because computer security training is usually mandatory, employee attitude affects what they´ll get out of the training. Employees dread (and resist) computer security training. The author discusses how to deliver computer security training to users, to reduce the risks to your information systems
Keywords :
DP management; information systems; security of data; training; computer information systems; computer security training; high-technology security; information systems; training program; Computer security; Data security; Information systems; Software management; Training;
Conference_Titel :
Security Technology, 1994. Proceedings. Institute of Electrical and Electronics Engineers 28th Annual 1994 International Carnahan Conference on
Conference_Location :
Albuquerque, NM
Print_ISBN :
0-7803-1479-4
DOI :
10.1109/CCST.1994.363782