Add to Book Shelf
Flag as Inappropriate
Email this Book

Nist Special Publication 800-16

Click here to view

Book Id: WPLBN0000692752
Format Type: PDF eBook:
File Size: 0.9 MB
Reproduction Date: 2005

Title: Nist Special Publication 800-16  
Author:
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Nist Special Publication 800-16. (n.d.). Nist Special Publication 800-16. Retrieved from http://www.self.gutenberg.org/


Description
Technical Reference Publication

Excerpt
Introduction: Federal agencies and organizations cannot protect the integrity, confidentiality, and availability of information in today?s highly networked systems environment without ensuring that each person involved understands their roles and responsibilities and is adequately trained to perform them. The human factor is so critical to success that the Computer Security Act of 1987 (Public Law [P.L.] 100-235) required that, ?Each agency shall provide for the mandatory periodic training in computer security awareness and accepted computer practices of all employees who are involved with the management, use, or operation of each Federal computer system within or under the supervision of that agency...

Table of Contents
TABLE OF CONTENTS (Continued) Page CHAPTER 5. EVALUATING TRAINING EFFECTIVENESS . . . . . . . . . . . . . . . . . . . . . . 155 5.1 Value of Evaluation in a Training Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157 5.2 Purposes of Training Effectiveness Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 5.3 Development of an Evaluation Plan . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 5.3.1 Behavioral Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 5.3.2 Levels of Evaluation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 160 5.4 Implementation of Evaluation Planning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163 5.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 5.6 Chapter Reference s . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 APPENDIX A ? LEARNING CONTINUUM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . A-1 APPENDIX B ? TRAINING MATRIX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . B-1 APPENDIX C ? GLOSSARY . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . C-1 APPENDIX D ? SELECTED GOVERNMENT IT SECURITY REFERENCES . . . . . . . . D-1 APPENDIX E ? JOB FUNCTION-TRAINING CROSS REFERENCE . . . . . . . . . . . . . . . E-1 INDEX . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . I-1

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.