Lesson 5 Flashcards

(22 cards)

1
Q

What is the central message of “Security With, and For, People”?

A

People are not just system users but integral to information security. Effective security requires understanding human behavior, trust, culture, and community, not just technology and policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the four learning aims of this unit?

A

Analyze the role of people in security management.

Review people-related security controls.

Appreciate human diversity in security contexts.

Examine trust, culture, and positive behaviors in organizations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

How has the view of “users” evolved?

A

From isolated system actors to social beings with emotions, goals, and relationships within communities — security must balance organizational control with users’ need to work effectively.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the difference between positive and negative security?

A

Positive security → Freedom to feel safe and supported through trusted human relationships (e.g., family help online).

Negative security → Freedom from threats through technical controls (e.g., access restrictions).
Good security combines both

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are key “people controls” in information security?

A

Employment contracts defining responsibilities.

Background screening (proportionate, lawful).

Disciplinary and post-employment procedures.

Remote-working policies for off-site protection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How should awareness and reporting be managed?

A

Role-specific training programs.

Easy, accessible incident-reporting channels.

Tackle engagement barriers (language, age, fatigue).
Goal: sustained awareness and willingness to report issues.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What builds trust and positive security culture?

A

Openness, competence, communication, and integrity.

A blend of social trust (relationships) and technical trust (e.g., zero-trust validation).
A healthy culture embeds security into daily behavior and reduces fear or avoidance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can organizations shape positive security behaviors?

A

Through context-relevant, inclusive engagement and training.
Measure progress with compliance and impact-based metrics that align with organizational goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What defines a people-centric Information Security Management System (ISMS)?

A

Supports rather than blames humans.

Adapts to individual needs and workloads.

Encourages participation, inclusivity, and usability (e.g., simpler password guidance).

Integrates EDI principles for fairness and edge-case coverage.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does “Sniper Alley” illustrate in security culture?

A

When negative controls (restrictions) become excessive, people seek workarounds — exposing them to “snipers” (threats such as criminals, governments, fraudsters, or even peers). Over-control can harm trust and usability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How should organizations balance positive and negative security?

A

Apply necessary controls (negative) to protect systems while enabling trusted relationships and empowerment (positive). The balance sustains both organizational and human security goals.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the key success factors for people-centric security?

A

Treat security as socio-technical (people + process + technology).

Foster trust, culture, and engagement.

Balance control with empowerment.

Design ISMS and behaviors with people, not against them.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Why is it a mistake to see users merely as “system actors” in security design?

A

Treating users only as mechanistic elements in a system overlooks their emotions, habits, ambitions, and relationships. Users’ motives and community dynamics shape how they understand, embrace, or bypass security. Recognizing users’ humanity is essential for designing effective, realistic security strategies that account for both cooperation and friction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How can rigid or excessive negative controls backfire within an organization?

A

Excessive reliance on restrictive controls can erode trust, create frustration or resistance, encourage circumventing rules (“workarounds”), and undermine the reporting of real incidents. When users feel stifled or disempowered, they may stop engaging positively with security processes, making the environment less, not more, secure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are some main challenges with security awareness engagement among a diverse workforce?

A

Challenges include language barriers, generational gaps in technology use, varying literacy levels (digital, security), differing cultural attitudes toward authority and risk, and “communication fatigue” from repetitive, generic messaging. Tailored, context-specific training and varied communication methods are needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Why must employment agreements cover more than just technical responsibilities?

A

Effective employment contracts must clearly outline acceptable use, confidentiality, security responsibilities, and post-employment consequences. This clarity helps set behavioral expectations, supports enforcement, and reduces ambiguity that can lead to policy breaches or data leaks during onboarding and upon exit.

17
Q

How does the move to remote and hybrid work environments affect people-focused security?

A

Remote work increases exposure to diverse digital risks (home networks, personal devices, distraction), complicates supervision, and challenges the enforcement of security policy. Organizations need explicit remote work policies, supporting controls, ongoing training, and tech solutions that are usable and minimally intrusive.

18
Q

Why is post-employment access and responsibility management a critical people-control?

A

Failing to immediately revoke access and update responsibilities after employee departures or role changes leaves organizations exposed to insider threats, accidental leaks, or sabotage. Systematic deprovisioning and regular audits prevent lingering access issues that adversaries and disgruntled former staff can exploit.

19
Q

How does the concept of “Zero Trust” relate to people’s roles in security?

A

Zero Trust shifts the model from presuming internal users are trustworthy to verifying every user, device, and action regardless of location. It emphasizes a culture where trust is continually established through authentication, monitoring, and appropriate access—not taken for granted because of hierarchy or network location.

20
Q

What makes security culture different from security policy?

A

Security policy is a formal set of rules; security culture is the collective attitude, habits, rituals, and unwritten rules regarding security among staff. A strong security culture means employees internalize secure behaviors and proactive reporting without needing external enforcement for every action.

21
Q

How do Equity, Diversity, and Inclusion (EDI) principles support better information security?

A

EDI initiatives recognize diverse user needs, possible disabilities, and cultural backgrounds. Inclusive security design reduces friction, ensures controls work for edge cases (e.g., multi-factor authentication for disabled users), and leverages a broader range of perspectives to anticipate and manage human-related security risks.

22
Q

What is the impact of social trust (“freedom to trust”) in security operations?

A

When there is high social trust—among employees, between employees and managers, and toward leadership—staff are more likely to report incidents rapidly, follow policies voluntarily, support one another under stress, and help keep each other accountable.