Perimeter
Guest Blog // Selected Security Content Provided By Sophos
What's This?
9/10/2013
03:06 PM
Maxim Weinstein
Maxim Weinstein
Security Insights
50%
50%

How To Train Your Users

Help users contribute to your organization's security by teaching them to protect The Four Cs: computers, credentials, connections, and content

Let's face it: Getting users to understand and practice good security is hard. Really hard. It would be difficult enough if the technology environment remained constant for a while, but we all know how often that happens.

That's why it's especially important that we focus on raising user awareness of basic security concepts that are independent of specific technologies. One example is helping people understand what needs to be protected and why. I have encapsulated the basics of this in a mnemonic I call "The Four Cs."

The Four Cs are computers, credentials, connections, and content. If you can get your users into a mind set of thinking about protection in these four areas, then it will be one small but important step toward a secure chair-to-keyboard interface.

Let's review each of the Cs in a bit more detail. I use the term "computers" as shorthand because it also includes smartphones and tablets. Users have to understand that sensitive data is only as secure as the device used to access it. Ask them to imagine an attacker who can see everything they do on their home PCs -- can the attacker see customer data or trade secrets? If so, what are users doing to make sure this doesn't happen?

Credentials include passwords, security tokens, and anything else users need to log into company or work-related systems. Again, ask your users to imagine the worst. What are users trusted to do or see on behalf of the company? What might a motivated enemy do with the same access? What would happen to the user whose credentials were used to carry out a successful attack?

With all the publicity around the NSA leaks, it should be easy to get users interested in connection security. Encourage them to shift their thinking from government snoops to garden-variety criminals and industrial saboteurs. Would your users (deliberately) leave customer data or proprietary information sitting unattended on a table in a hotel lobby? If not, they shouldn't leave it floating around unencrypted on the hotel Wi-Fi, either.

Content protection is about which data goes where. Remind users how easy it is to forward an email or send a file to someone, sometimes even accidentally. Perhaps they shouldn't make it that easy for a colleague or third party to do the same with patient records or customer credit card numbers. Content protection also ties into the previous three areas: should important information be stored someplace that requires only a single shared password to access it? Do users trust the security of their computers as much as the security of the company's servers?

Too often, user education about security starts with the how, skipping right over the what and the why. The Four Cs don't cover every important aspect of user behavior; resistance to social engineering, for example, is notably absent. They do, however, offer a solid base of understanding for how users contribute to an organization's collective security. Once this idea is in users' heads, the questions about how to protect the computers, credentials, connections, and content will inevitably follow.

And those are the questions that any security professional should be happy to hear. Maxim Weinstein, CISSP, is a technologist and educator with a passion for information security. He works in product marketing at Sophos, where he specializes in server protection solutions. He is also a board member and former executive director of StopBadware. Maxim lives ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-9710
Published: 2015-05-27
The Btrfs implementation in the Linux kernel before 3.19 does not ensure that the visible xattr state is consistent with a requested replacement, which allows local users to bypass intended ACL settings and gain privileges via standard filesystem operations (1) during an xattr-replacement time windo...

CVE-2014-9715
Published: 2015-05-27
include/net/netfilter/nf_conntrack_extend.h in the netfilter subsystem in the Linux kernel before 3.14.5 uses an insufficiently large data type for certain extension data, which allows local users to cause a denial of service (NULL pointer dereference and OOPS) via outbound network traffic that trig...

CVE-2015-1157
Published: 2015-05-27
CoreText in Apple iOS 8.x through 8.3 allows remote attackers to cause a denial of service (reboot and messaging disruption) via crafted Unicode text that is not properly handled during display truncation in the Notifications feature, as demonstrated by Arabic characters in (1) an SMS message or (2)...

CVE-2015-2666
Published: 2015-05-27
Stack-based buffer overflow in the get_matching_model_microcode function in arch/x86/kernel/cpu/microcode/intel_early.c in the Linux kernel before 4.0 allows context-dependent attackers to gain privileges by constructing a crafted microcode header and leveraging root privileges for write access to t...

CVE-2015-2830
Published: 2015-05-27
arch/x86/kernel/entry_64.S in the Linux kernel before 3.19.2 does not prevent the TS_COMPAT flag from reaching a user-mode task, which might allow local users to bypass the seccomp or audit protection mechanism via a crafted application that uses the (1) fork or (2) close system call, as demonstrate...

Dark Reading Radio
Archived Dark Reading Radio
After a serious cybersecurity incident, everyone will be looking to you for answers -- but you’ll never have complete information and you’ll never have enough time. So in those heated moments, when a business is on the brink of collapse, how will you and the rest of the board room executives respond?