Which of the following provides the best evidence of the adequacy of a security awareness program?

OA-Information Technology’s award-winning cybersecurity program provides a variety of cybersecurity resources and services to state agencies and employees. 

Employees

  • Report Spam - Forward suspected spam to .
  • Antivirus Software - Home Use - IT Central - Employees have access to free antivirus software for home use. The home use option is designed to minimize the possibility of contamination of commonwealth workstations when transferring information between home and work computers.
  • Security Awareness Training - All employees are required to complete mandatory online security awareness training on cybersecurity best practices, the commonwealth’s acceptable use policy and how to report security incidents. Web-based training is available to employees in LSO at www.myworkplace.pa.gov > My Training. 

Agencies

For more information about the following services, please contact or refer to the OA-Information Technology Service Catalog.

  • Architectural Reviews
  • Computer Forensic Investigations
  • Gap Analysis
  • Penetration Testing
  • Security Assessments
  • Vulnerability Management

 
Architectural Reviews

  • Examination of the systems and related risks and threats from within and outside the organization.
  • Review of the business areas supported by the infrastructure to better understand the asset risk and required controls.   
  • Technical review of the application or network architecture to ensure it is secured and does not pose risk to the agency or the enterprise.
  • Review of the network component functions to ensure suitability.
  • Development of detailed recommendations, risk mitigation plans, and documentation to assist agencies with securing their application or infrastructure.

Computer Forensic Investigations

  • Provide systematic inspection of commonwealth systems and their contents for evidence or supportive evidence of cybercrime or other computer use that is being investigated.
  • Collect and analyze evidence in a fashion that adheres to standards of evidence that are admissible in a court of law.
  • Identify the cause of an incident.
  • Contain compromised services.
  • Identify policy violations.
  • Recommend appropriate remediation of discovered vulnerabilities.
  • Performs scanning and evaluation after remediation of device. 

Gap Analysis

  • Policy, procedure, and standards review.
  • Physical and environmental security review.
  • Communications and operations management review.
  • Access control review.
  • Information systems acquisition, development and maintenance.
  • Information security incident management review.
  • Business continuity management review.
  • Compliance review. 

Penetation Testing

  • Includes network assessment, war dialing tests and internal and external vulnerability scanning.
  • Map network and inventory systems to document vulnerabilities.
  • Provide recommendations for remediation. 

Security Assessments

  • Conducts interviews, inspections, assessments and policy reviews.
  • Identify, quantify, and prioritize vulnerabilities in a system and infrastructure.
  • Assure compliance with key security, physical, device, network, human, and policy controls.
  • Detail discovered risks and provide risk mitigation options for remediation in a written report.
  • Offers review and guidance on policy and procedure development.
  • Perform annual extensive audits and quarterly full audits.
  • Offer payment card industry (PCI) compliance reports. 

Vulnerability Management

  • Examination of application or network to determine adequacy of security measures with vulnerability scans and testing.
  • Deploy and maintain anti-virus software.
  • Isolate and remotely remediate infected systems.
  • Evaluate the security of a system or network through penetration testing.
  • Provide customized reports outlining options for remediation.​

Find out how much you know about preventing user-caused cybersecurity incidents through education in this security awareness training quiz for infosec pros.

Too often, enterprises classify cybersecurity as an IT-only activity and discuss risk management exclusively in terms of technology or tools. Yet, multiple studies continuously prove that insiders pose one of the greatest risks to an enterprise's security. Whether accidental or malicious, insider threats can cause enormous financial and reputational damage -- for example, through data loss or exfiltration or falling victim to a phishing attack.

Organizations may instinctually turn to technology as the solution to insider threat prevention. While tools such as data loss prevention, firewalls and email filters may alleviate the symptoms of insider threats, they do nothing to address the root cause. To treat the issue of user-caused incidents at its core, IT leaders need to implement comprehensive and consistent security awareness training.

This security awareness training quiz's questions and answers are designed to test and reinforce understanding of infosec fundamentals. By taking this quiz, IT professionals will be in a better position to educate employees on security best practices at their own organization.

Next Steps

Cybersecurity employee training: How to build a solid plan

10 common types of malware attacks and how to prevent them

Enterprise cybersecurity hygiene checklist for 2022

The 7 elements of an enterprise cybersecurity culture

Top 5 password hygiene tips and best practices

This was last published in April 2021

Dig Deeper on Risk management

  • Which of the following provides the best evidence of the adequacy of a security awareness program?
    insider threat

    Which of the following provides the best evidence of the adequacy of a security awareness program?

    By: Andrew Froehlich

  • Which of the following provides the best evidence of the adequacy of a security awareness program?
    Editor's picks: Top cybersecurity articles of 2021

    Which of the following provides the best evidence of the adequacy of a security awareness program?

    By: Isabella Harford

  • Which of the following provides the best evidence of the adequacy of a security awareness program?
    Data loss prevention quiz: Test your training on DLP features

    Which of the following provides the best evidence of the adequacy of a security awareness program?

    By: Katie Donegan

  • Which of the following provides the best evidence of the adequacy of a security awareness program?
    Information security quizzes to test your cybersecurity smarts

What is the purpose of security education training and awareness SETA )?

This is where a Security Education, Training, and Awareness (SETA) program comes into play. SETA programs help businesses to educate and inform their employees about basic network security issues and expectations—helping to prevent commonplace cybersecurity mistakes that lead to damaging data breaches.

Which of these are common tool used to create or increase security awareness?

Answer: The common tools used to create or increase security awareness are newsletters, blog postings, and newsfeeds.

What are the components of an effective cybersecurity training program?

The 5 Elements of a Successful Security Awareness Program.
Education on the different types of cyber threats. Spam. ... .
Email, internet, social media and Privacy policies. ... .
Secure password policies Combined with Multifactor Authentication. ... .
Threat recognition and response training. ... .
Regular vulnerability testing..

What is awareness training?

Awareness training helps employees to understand risks and identify potential attacks they may encounter as they receive email and use the web. Awareness training also acquaints employees with best practices for avoiding risk.