One Article Review

Accueil - L'article:
Source NoticeBored.webp NoticeBored
Identifiant 466615
Date de publication 2018-02-09 15:09:40 (vue: 2018-02-09 15:09:40)
Titre NBlog February 9 - mapping awareness memes
Texte Yesterday I came up with the suggestion of using memes to spread security awareness messages from person to person, in a similar fashion to the way that computer viruses and worms spread from IT system to IT system. Today I'm trying to come up with something that people will spread among each other by word of mouth, through email and TXT etc., something funny, shocking or useful - such as tips to avoid falling prey to malware maybe, or rumors about a serious malware infection within or close to the organization.'Too close for comfort' has potential, perhaps a malware incident and business crisis narrowly averted by sheer good fortune. Or maybe we could fool workers into believing that the auditors will soon be coming to check up on the antivirus controls?Such an approach could be unethical, risky even (e.g. if it prompted workers to meddle inappropriately with antivirus configurations or audit trails, rather than ensuring that the antivirus controls were operating correctly). It would need to be carefully considered and planned, which itself constitutes an awareness activity even if, in the end, the decision is taken not to go ahead.The 'meme map' (derived from "Meme Maps: A Tool for Configuring Memes in Time and Space" by John Paull) represents the lifecycle and spatial or geographical spread of the meme. Reading from the bottom up, both the yellow area prior to the meme's release, and then the green area, are awareness opportunities.  Mapping and demonstrating the gradual spread of a security awareness meme within the organization (e.g. mapping the source of clicks on a link to a fake internal memo about the fictitious antivirus audit, or tracking calls abo
Envoyé Oui
Condensat   mapping  mapping  represents  today about activity ahead among another antivirus approach are area audit auditors averted avoid awareness backside believing blog both bottom business calls came carefully check clicks close come comfort coming computer configurations configuring considered constitutes controls correctly could crisis decision demonstrating derived desk each email end enough ensuring etc even fake falling fashion february fictitious fool fortune from funny geographical good gradual green has help idle inappropriately incident infection internal itself john lifecycle link malware map mapping maps: maybe meddle meme memes memo messages mouth musing narrowly nblog need not operating opportunities organization other own paull people perhaps person planned point possible potential prey prior prompted rather reading recurse release risky rumors security serious sheer shocking similar similarities something soon source space spatial spread such suggestion system taken than that then through time tips today too tool tracking trails trying txt unethical useful using viruses way which will within word workers worms would yellow yesterday yet
Tags
Stories
Notes
Move


L'article ne semble pas avoir été repris aprés sa publication.


L'article ne semble pas avoir été repris sur un précédent.
My email: