Here is a reconstructed version of the pub's "Framework" table that highlights the proposed methodology and rationale for the desired outcomes of IT security measures.
| Framework For Information Technology Security Training* | |||
| | Awareness | Training | Education |
| Attribute: | What | How | Why |
| Level: | Information | Knowledge | Insight |
| Learning Objective: | Recognition, Retention | Skill | Understanding |
| Example Teaching Method: | Media: video, newsletters, posters | Practical Instruction: -lecture and/or demo -case study -hands on instruction | Theoretical Instruction: -Seminar & Instruction -Reading & Study -Research |
| Test Measure: | True/False, Multiple choice (Identify learning) | Problem solving: e.g. recognition, resolution (apply learning) | Essay (interpret learning) |
| Impact Timeframe: | Short-term | Intermediate | Long-term |
*Reference NIST SP 800-16, April 1998, Information Technology Security Training Requirements: A Role and Performance Base Training Model, p 18.
No comments:
Post a Comment