{"id":246,"date":"2025-04-28T21:45:43","date_gmt":"2025-04-28T21:45:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/?page_id=246"},"modified":"2025-04-28T21:50:38","modified_gmt":"2025-04-28T21:50:38","slug":"write-up-creating-cybersecurity-policies","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/write-up-creating-cybersecurity-policies\/","title":{"rendered":"Write Up: Creating Cybersecurity Policies"},"content":{"rendered":"\n<p><strong>1. Objective<\/strong><br>The Objective of this policy is so that a structured framework is ensured that all service members, staff<br>members and contractors have enough training to notice and respond to security threats.<\/p>\n\n\n\n<p> By utilizing this<br>training service members, staff members and contractors will be able to minimize risks and strengthen the United States Air Forces cybersecurity.<br><\/p>\n\n\n\n<p><strong>2. Extent<br><\/strong>This policy has relevance to all service members, staff members and contractors and any other person who require access to our network IT system, information, or facilities. No one is Excluded.<br><\/p>\n\n\n\n<p>3. Developmental needs<br>\u2022 Entry level Training: During the onboarding process All employees and service members must<br>complete security awareness training that has to which in the first 30 days.<br>\u2022 Continuous Training: Security awareness training will be done yearly to ensure service members, staff members and contractors stay updated with new threats and best practices.<br>In addition, training is essential if there are key developments in the threat landscape or internal<br>policies.<br>\u2022 Specialized Training: Due to sensitive data and clearance levels Specialized tasks are required<br>for IT staff, NCOIC, Officers and senior management<br><\/p>\n\n\n\n<p><strong>4. Training Modules<\/strong><br>The United States Air Force Security awareness training Regimen will be included, but not be limited to,<br>the following Subjects:<br>\u2022 Deceptive online tactics: How to Notice and answer to engineering attacks, targeted-phishing,<br>and other forms of ransomware.<br>\u2022 Credential Management: How to generate and mange well-fortified passwords, in addition to<br>using multi-factor authentication (MFA).<br>\u2022 Data security &amp; Confidentiality: This teaches why it is critical to protect sensitive information,<br>which includes personal data, intellectual property, service member data and consumer data.<br>\u2022 Mitigate use Technology: This teaches how to safely access the internet, email, mobile devices,<br>and other technology equipment within our workplace.<br>\u2022 Access control: These procedures are for securing workstations, managing real time security<br>threats, and securing devices that are inactive.<br>\u2022 Occurrence Reporting: This teaches how to notice security incidents and the procedure for<br>reporting probable security threats or vulnerabilities.<br><\/p>\n\n\n\n<p><strong>5. Skills Development<\/strong><br>\u2022 Format: Training will be done by either by scheduling in person on virtual lessons, which will<br>include hands on demonstration,<br>\u2022 Frequency: The United States Airforce Security awareness training is required annually, with<br>additional lessons if new security threats arise or major system updates takes place.<br>Monitoring &amp; Recording: The United States Airforce Security awareness training completion<br>for servicemembers, staff members and contractors will be monitored and recorded in a central<br>repository. This will be evaluated by the NCOIC, HR department, Chief and cybersecurity team<br>frequently.<br><\/p>\n\n\n\n<p><strong>6. Duties and Obligations<\/strong><br>\u2022 Human Resources &amp; NCOIC: Will ensure that servicemembers, staff members and contractors<br>complete the required training during onboarding and monitor engagement for yearly re-training.<br>\u2022 IT\/Security Team: The IT and security teams will create, maintain, and update the training<br>content and deliver sessions. They will also monitor compliance and provide assistance with<br>technical security training.<br>\u2022 Employees &amp; Service members: All servicemembers, staff members and contractors must<br>engage in The United States AirForce security awareness training and administer the learned<br>practices in their day-to-day work activities. They must also report any suspicious activities or<br>Threats in accordance with the United States Air Force occurrence reporting procedures.<br><\/p>\n\n\n\n<p><strong>7. Enforcement<\/strong><br>\u2022 Non-Compliance: If the United States Air Force security awareness training is not completed in<br>the appropriate timeframe this will result in disciplinary action, which could possibly include the<br>loss of access to our system network, Article, loss of contract or termination of employment,<br>depending on the severeness of the violation.<br>\u2022 Audits: regular audits will be done to make sure servicemembers, staff members and contractors<br>have completed their obligated training. In addition, Random testing may take place to ensure the<br>effectiveness of training.<br><\/p>\n\n\n\n<p><strong>8. Evaluation &amp; Improvement<\/strong><br>\u2022 Response system: Servicemembers, staff members and contractors will be motivated to give<br>feedback on the training material, delivery methods, and significance. The feedback will be<br>utilized to help enhance our future training regimen.<br>\u2022 ongoing development: The efficiency of the United States Air Force security awareness training<br>regimen will be evaluated yearly based on servicemembers, staff members and contractors,<br>incident response data, and evolving threats. The Training information is updated on a regular<br>base to ensure they reflect the latest security threats and best practices.<br><\/p>\n\n\n\n<p>By adhering to this Security Awareness Training Policy, the organization aims to reduce the risk of cyber threats and ensure a safe working environment for all employees and service members.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>1. ObjectiveThe Objective of this policy is so that a structured framework is ensured that all service members, staffmembers and contractors have enough training to notice and respond to security threats. By utilizing thistraining service members, staff members and contractors&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/write-up-creating-cybersecurity-policies\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":20749,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/pages\/246"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/users\/20749"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/comments?post=246"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/pages\/246\/revisions"}],"predecessor-version":[{"id":250,"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/pages\/246\/revisions\/250"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-200-cybersecurity-technology-society\/wp-json\/wp\/v2\/media?parent=246"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}