FY 2016 Information Security Awareness and Rules of Behavior Training
October 1, 2015
Incident Reporting ................................................................................................................................ 17
Phishing ..................................................................................................................................................... 17
Cookies ....................................................................................................................................................... 18
Mobile Code .............................................................................................................................................. 19
Knowledge Check #4 ........................................................................................................................... 19
Peer-to-Peer (P2P) ............................................................................................................................... 20
P2P Vulnerabilities ............................................................................................................................... 20
Rules of Behavior – P2P File Sharing ........................................................................................... 21
Rules of Behavior – Software ........................................................................................................... 21
Knowledge Check #5 ........................................................................................................................... 22
Lesson 3: Malicious Code ........................................................................................................................ 22
Email and Attachments ...................................................................................................................... 23
Hoaxes......................................................................................................................................................... 24
Knowledge Check #6 ........................................................................................................................... 24
Lesson 4: User Roles and Responsibilities ..................................................................................... 24
Basic User Guidelines .......................................................................................................................... 25
Privilege User Guidelines .................................................................................................................. 26
Rules of Behavior – Accountability ............................................................................................... 27
Rules of Behavior – Integrity ........................................................................................................... 28
Knowledge Check #7 ........................................................................................................................... 28
Rules of Behavior – Email: Appropriate Email Use ............................................................... 29
Public Key Infrastructure .................................................................................................................. 30
Tips for Creating a Secure Password ........................................................................................... 30
Physical Security .................................................................................................................................... 31
Physical Security – Proactive Approach ..................................................................................... 31
Knowledge Check #8 ........................................................................................................................... 32
Inventory Control .................................................................................................................................. 32
Telework Procedures .......................................................................................................................... 33
Classified and Unclassified Information ..................................................................................... 33
Backups, Storage, and Labeling ...................................................................................................... 34
Rules of Behavior – Backups, Storage, and Labeling ............................................................ 35
Knowledge Check #9 ........................................................................................................................... 35