Here is a reconstructed version of the pub's "Framework" table that highlights the proposed methodology and rationale for the desired outcomes of IT security measures.
Framework For Information Technology Security Training* | |||
| Awareness | Training | Education |
Attribute: | What | How | Why |
Level: | Information | Knowledge | Insight |
Learning Objective: | Recognition, Retention | Skill | Understanding |
Example Teaching Method: | Media: video, newsletters, posters | Practical Instruction: -lecture and/or demo -case study -hands on instruction | Theoretical Instruction: -Seminar & Instruction -Reading & Study -Research |
Test Measure: | True/False, Multiple choice (Identify learning) | Problem solving: e.g. recognition, resolution (apply learning) | Essay (interpret learning) |
Impact Timeframe: | Short-term | Intermediate | Long-term |
*Reference NIST SP 800-16, April 1998, Information Technology Security Training Requirements: A Role and Performance Base Training Model, p 18.
No comments:
Post a Comment