Home > DocuBase > Article

« All DocuBase Articles

 

Follow DocuTicker on Twitter Bookmark and Share   Feed

Saturday, 21st March 2009

DRAFT -- Information Security Training Requirements: A Role- and Performance-Based Model

DRAFT -- Information Security Training Requirements: A Role- and Performance-Based Model
Source: National Institute for Standards and Technology (NIST)

The comprehensive training methodology provided in this publication is intended to be used by federal information security professionals and instructional design specialists to design (1) role-based training courses or modules for personnel who have been identified as having significant responsibilities for information security, and (2) a basics and literacy course for all users of information systems.

We encourage readers to pay special attention to the Notes to Reviewers section, as we are looking for feedback on the many changes we have made to this document.

+ Full Report (PDF; 1.2 MB)


Category:

Source:

Views: 374




Please note: DocuTicker's editors collect citations for full-text PDF reports freely available on the web but we do not archive these reports. When you click a link to find and/or download the report, you are leaving the DocuTicker site. DocuTicker makes no representations regarding the ongoing availability of any report or any external resource. Links were accurate as of the date of posting.

« All DocuBase Articles

 

FreePint

FreePint supports the value of information in the enterprise. Read more »


FeedLatest FreePint Content:


  • Click to view the article Innography Comes of Age
    Wednesday, 20th August 2014

    Following her review of Innography and its key intellectual property products, Cathy Chiba considers the company's evolution and the value it offers its customers.

  • Click to view the article A User-Centred Approach to Privacy
    Wednesday, 20th August 2014

    There's been a lot of focus on data privacy recently and news stories often show how organisations are failing to protect their customers' data but are users doing enough to protect themselves? This article looks at how users and organisations can better protect personal data.

  • Click to view the article Due Diligence - from Business Burden to Business Benefit
    Tuesday, 19th August 2014

    Organisations face growing legal and reputational risks associated with doing business. These risks have become even more significant because of mounting pressure from regulators and an increase in business carried out in higher risk jurisdictions. Increasingly complex business regulations such as the US Foreign Corrupt Practices Act (FCPA) and the UK Bribery Act ensure that companies thoroughly examine third-party relationships to tackle the risk of money laundering, bribery and corruption and sanctions regimes. Mark Dunn looks at what the law says regarding Anti-Money Laundering and Anti-Bribery & Corruption, and how organisations can mitigate the risk of becoming involved in corruption through third parties (e.g. agents, suppliers) by implementing a simplified or Enhanced Due Diligence process.

  • ... more ...

All FreePint Content »
FreePint Topics »


A FreePint Subscription delivers articles and reports that support your organisation's information practice, content and strategy.

Find out more and order a FreePint Subscription by visiting the
completing our online form: Subscription Order page.


FreePint Testimonials

"FreePint's CoPs are: 'extremely relevant' and 'well worth attending'." Information Centre Manager, Financial, Government

Read more testimonials and supply yours »







 

 
 
 

Subscribe

Receive the DocuTicker Newsletter each week.

Find out more »

Article Categories

All Article Categories »

Sources

All DocuBase Sources »

Source Categories

All Source Categories »

Archive

All Archives »