منتدى قسم تكنولوجيا المعلومات في مدرسة الدوحة الثانوية المستقلة للبنين
علمت أن رزقي لن يأخذه غيري فاطمأن قلبي

قم وذق طعم الصلاة في دجى الليل الطويل

قم وجاهد في الحياة ان مثوانا قليل
منتدى قسم تكنولوجيا المعلومات في مدرسة الدوحة الثانوية المستقلة للبنين
علمت أن رزقي لن يأخذه غيري فاطمأن قلبي

قم وذق طعم الصلاة في دجى الليل الطويل

قم وجاهد في الحياة ان مثوانا قليل
منتدى قسم تكنولوجيا المعلومات في مدرسة الدوحة الثانوية المستقلة للبنين
هل تريد التفاعل مع هذه المساهمة؟ كل ما عليك هو إنشاء حساب جديد ببضع خطوات أو تسجيل الدخول للمتابعة.

منتدى قسم تكنولوجيا المعلومات في مدرسة الدوحة الثانوية المستقلة للبنين

من أفضل مدارس قطر
 
الرئيسيةأحدث الصورالتسجيلدخول
قال الامام احمد بن حنبل: إن لنا إخوان لانراهم إلا مره كل سنه , نحن اوثق بمودتهم ممن نراهم كل يوم .أسعد الله قلوبا طاهره إن وصلناها شكرت وإن قصرنا عذرت
من العظماء من يشعر المرء فى حضرته أنه صغير ولكن العظيم بحق هو من يشعر الجميع في حضرته بأنهم عظماء
كم في المقابر من يحسدونك على هذه الأيام والليالي التي تعيشها يتمنون لو تسبيحة أو استغفار ينفعهم عند ربهم أو سجدة تنير قبورهم أو صدقة تظلهم بين يدي الملك الجبار .. فقط تذكر .. ولا تضيع الفرصة التي بين يديك

 

 Computer Training Policy

اذهب الى الأسفل 
3 مشترك
كاتب الموضوعرسالة
ghostpc




Posts : 85
أهمية العضو : 0
Join date : 18/11/2008

Computer Training Policy Empty
مُساهمةموضوع: Computer Training Policy   Computer Training Policy Emptyالثلاثاء ديسمبر 02, 2008 1:14 pm

Computer Training Policy


This is an example Computer Training Policy. All organizations should have a computer training policy but it is my belief that few of them do. A computer training policy and training of computer users will benefit the organization in both increased productivity but also fewer security incidents. This example computer training policy is a very rough draft and lists some areas that user training would be very beneficial to the organization.

Most organizations do not seem to have much of a computer training program in place for employees. However, given the current state of computer security and the fact that many attacks are directly against the user's web browser or through e-mail, user training is becomming an ever more important part of computer security. User's must be wise to the methods of attack in order to protect themselves in many instances. User training does not need to be extremely technical but should ensure that the user retains basic computer knowledge along with some knowledge about specific computer attacks that they may experience.

1.0 Overview :

This policy defines the minimum training for users on the network to make them aware of basic computer threats to protect both themselves and the network. This policy especially applies to employees with access to sensitive or regulated data.

2.0 Purpose :

This policy is designed to protect the organizational resources on the network and increase employee efficiency by establishing a policy for user training. When users are trained about computer use and security threats, they work more efficiently and are better able to protect organizational resources from unauthorized intrusion or data compromise. This policy will help prevent the loss of data and organizational assets.

3.0 Training Categories :

Training categories will include but not be limited to the following areas:

• Basics :

1. What files are
2. How to set view for details and show extensions for known file types
3. Why not seeing file extensions is a security hazard to you
4. File storage size - how to determine
5. Mail attachments
6. Where to store files

  • How to use your network drive

  • What your network drive is and what it means to you


7. How to copy files
8. Ways to increase efficiency on the computer such as keyboard shortcuts

• Ways to get malware :

1. Through email
2. Through browser
3. By connecting
4. By installing unapproved programs

• Email viruses :

1. How they spread
2. Spoofing sender
3. Dangerous attachments

• Email SPAM :

1. Protect your email address
2. Filtering spam

• Hoaxes :

1. Phishing
2. Fraud methods

• Email use :

1. How to set up email for remote users or with your ISP with POP3
2. How to set up out of office reply
3. How to set mail filtering rules
4. How to use, import, and export personal folders
5. What an undeliverable response to an email message means

• Use of web browser :

1. Safe browser?
2. Avoid adware and spyware - ignore ads that may compromise your computer or get you to install an illicit program
3. How to change browser settings for better security
4. Products to prevent malware.

• Passwords :

1. Why protect my password?
2. Why do I need to change my password every 30 days
3. How to change your password
4. How to choose strong passwords that you can remember
5. If I log in on a website can someone see my password?

• Other :

1. Reasons for firewall -- worms and others
2. Why worry about malware?
3. What is a vulnerability?
4. Why not run all services?
5. Social engineering

4.0 Training Opportunities :

Basic training as listed in section 3.0 shall be provided internally by the organization and shall include the following opportunities:

1. Scheduled training seminars for 1 to 4 hours per day.
2. Brown bag lunch training for lunch time training for up to 1 hour per day on one or two days per week.

5.0 Requirements :

All organizational staff shall make measurable and continuous progress in the training areas listed in section 3. Each employee manager shall be responsible for ensuring that employees under their supervision make progress in the required training areas. Each employee must retain knowledge about training in areas listed in section 3 within the first year of employment.

6.0 Enforcement :

Since training is very important to the security of the organization, auditing shall be used as a mechanism to be sure the training policy is being followed. Auditors may test employees at random about their knowledge in the areas listed in section 3. If an employee gets malware on their computer, they may be audited


الرجوع الى أعلى الصفحة اذهب الى الأسفل
A.Tamimi
Admin
A.Tamimi


Posts : 1593
أهمية العضو : 16
Join date : 13/11/2008
Age : 39
Location : Jordan

Computer Training Policy Empty
مُساهمةموضوع: رد: Computer Training Policy   Computer Training Policy Emptyالجمعة ديسمبر 05, 2008 2:51 pm

Computer Training Policy 11010
الرجوع الى أعلى الصفحة اذهب الى الأسفل
https://falcons.aforumfree.com
M.ALS3OD

M.ALS3OD


Posts : 854
أهمية العضو : 0
Join date : 13/09/2009
Age : 30
Location : AMMAN

Computer Training Policy Empty
مُساهمةموضوع: رد: Computer Training Policy   Computer Training Policy Emptyالسبت سبتمبر 19, 2009 7:23 pm

يـــعـــطـــيـــك الـــعـــافـــيـــة
الرجوع الى أعلى الصفحة اذهب الى الأسفل
 
Computer Training Policy
الرجوع الى أعلى الصفحة 
صفحة 1 من اصل 1
 مواضيع مماثلة
-
» Password Policy
» Wireless Use Policy
» Intrusion Detection Policy
» Network Documentation Policy
» Remote Access Policy

صلاحيات هذا المنتدى:لاتستطيع الرد على المواضيع في هذا المنتدى
منتدى قسم تكنولوجيا المعلومات في مدرسة الدوحة الثانوية المستقلة للبنين :: ----§§§§ المنتديات التقنية والبرمجية §§§§---- :: قسم نظم التشغيل واللينكس-
انتقل الى: