Managing Users
Screen and classify both users and data
Review the effect of any security software
- Focus on restriction or control access to files, records, or data items
Provide adequate user training on network security
- Use self-teaching manuals, newsletters, policy statements, and short courses
- May eliminate social engineering attacks
Launch a well publicized security campaign
- To deter potential intruders