Perimeter
Guest Blog // Selected Security Content Provided By Sophos
What's This?
9/10/2013
03:06 PM
Maxim Weinstein
Maxim Weinstein
Security Insights
Connect Directly
RSS
E-Mail
50%
50%

How To Train Your Users

Help users contribute to your organization's security by teaching them to protect The Four Cs: computers, credentials, connections, and content

Let's face it: Getting users to understand and practice good security is hard. Really hard. It would be difficult enough if the technology environment remained constant for a while, but we all know how often that happens.

That's why it's especially important that we focus on raising user awareness of basic security concepts that are independent of specific technologies. One example is helping people understand what needs to be protected and why. I have encapsulated the basics of this in a mnemonic I call "The Four Cs."

The Four Cs are computers, credentials, connections, and content. If you can get your users into a mind set of thinking about protection in these four areas, then it will be one small but important step toward a secure chair-to-keyboard interface.

Let's review each of the Cs in a bit more detail. I use the term "computers" as shorthand because it also includes smartphones and tablets. Users have to understand that sensitive data is only as secure as the device used to access it. Ask them to imagine an attacker who can see everything they do on their home PCs -- can the attacker see customer data or trade secrets? If so, what are users doing to make sure this doesn't happen?

Credentials include passwords, security tokens, and anything else users need to log into company or work-related systems. Again, ask your users to imagine the worst. What are users trusted to do or see on behalf of the company? What might a motivated enemy do with the same access? What would happen to the user whose credentials were used to carry out a successful attack?

With all the publicity around the NSA leaks, it should be easy to get users interested in connection security. Encourage them to shift their thinking from government snoops to garden-variety criminals and industrial saboteurs. Would your users (deliberately) leave customer data or proprietary information sitting unattended on a table in a hotel lobby? If not, they shouldn't leave it floating around unencrypted on the hotel Wi-Fi, either.

Content protection is about which data goes where. Remind users how easy it is to forward an email or send a file to someone, sometimes even accidentally. Perhaps they shouldn't make it that easy for a colleague or third party to do the same with patient records or customer credit card numbers. Content protection also ties into the previous three areas: should important information be stored someplace that requires only a single shared password to access it? Do users trust the security of their computers as much as the security of the company's servers?

Too often, user education about security starts with the how, skipping right over the what and the why. The Four Cs don't cover every important aspect of user behavior; resistance to social engineering, for example, is notably absent. They do, however, offer a solid base of understanding for how users contribute to an organization's collective security. Once this idea is in users' heads, the questions about how to protect the computers, credentials, connections, and content will inevitably follow.

And those are the questions that any security professional should be happy to hear. Maxim Weinstein, CISSP, is a technologist and educator with a passion for information security. He works in product marketing at Sophos, where he specializes in server protection solutions. He is also a board member and former executive director of StopBadware. Maxim lives ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Must Reads - September 25, 2014
Dark Reading's new Must Reads is a compendium of our best recent coverage of identity and access management. Learn about access control in the age of HTML5, how to improve authentication, why Active Directory is dead, and more.
Flash Poll
Title Partner’s Role in Perimeter Security
Title Partner’s Role in Perimeter Security
Considering how prevalent third-party attacks are, we need to ask hard questions about how partners and suppliers are safeguarding systems and data.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-6278
Published: 2014-09-30
GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and m...

CVE-2014-6805
Published: 2014-09-30
The weibo (aka magic.weibo) application 1.2 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6806
Published: 2014-09-30
The Thanodi - Setswana Translator (aka com.thanodi.thanodi) application 1.0.0 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6807
Published: 2014-09-30
The OLA School (aka com.conduit.app_00f9890a4f0145f2aae9d714e20b273a.app) application 1.2.7.132 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

CVE-2014-6808
Published: 2014-09-30
The Active 24 (aka com.zentity.app.active24) application 1.0.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
In our next Dark Reading Radio broadcast, we’ll take a close look at some of the latest research and practices in application security.