Juhani
Anttila
Venture Knowledgist Quality Integration
Helsinki, Finland
www.QualityIntegration.biz
EXPLORING THE USE AN E-LEARNING ENVIRONMENT
TO ENHANCE INFORMATION SECURITY AWARENESS IN A SMALL COMPANY
Abstract: Focusing on security education, this paper describes
an e-learning environment that has been constructed to increase information
security awareness among employees of a Finnish telecommunications
company that is a commercial provider of public services. The design
principles based on making the components of the system as simple
as possible to produce a system that delivers both functionality and
stability.
Introduction
This paper discusses an e-learning based information security project
carried out by a small organization in the telecommunication service
sector. The environment was built in close collaboration with the
intended users, i.e., the environment and its contents were based
on their practical needs.
The development work in a small organization is fairly flexible, and
experiences accumulate quickly. The topic area, information security,
was selected as it is a key issue for businesses, institutes of education
and society at large. Traditionally, the highlight has been on the
technical aspects of information security, but during the past few
years, human and organizational aspects have assumed an increasingly
prominent role in discussions on security [1, 10, and 11].
E-learning based information security education strives to raise
the awareness level of all employees. The aim is to equip them with
the necessary skills and knowledge to meet the challenges that they
may have to face in their everyday work [5].
Methods and techniques used
The results of the information security knowledge of the employees
by means of questionnaires and interviews were used to create an educational
programme to correct the perceived weaknesses. As teaching material,
the programme utilized various organizational guidelines complemented
by educational materials compiled at the University of Oulu.
In addition to the actual learning environment and its contents,
the organization has also implemented an automatic online assignment
sheet for tracking and monitoring learning. This form was designed
so that anyone who possessed the necessary skills and knowledge could
take the test and be exempted from having to go through the learning
material. The system handles registration and also updates registry
files, when students pass the test. The environment enables employees
to study at their own pace.
Research tends to progress from theory to practice. Having become
familiar with information security from various perspectives including
the user and end-user perspectives, we decided to go the other way
from practice to theory. Our starting point was that, within information
security, relevant knowledge usually resides within the organization
in question. What an outsider, such as a consultant, can contribute
is a model or a general framework for exploring, enhancing and utilizing
this knowledge. On this view, pertinent information that is possessed
by company employees is collected and analyzed by an outside consultant
who introduces a theoretical framework for analysis and may also assist
in the utilization of the results of such analysis.
The practice to theory approach is also supported by the fact that
all information security events comprise a variety of aspects, some
of which are strongly in relief, while others can best be described
as weak signals. Even these can be taken into account thanks to the
increased computing power of modern computers, which allows the unique
features of each information security incident to be analyzed in detail.
This study investigated the information security knowledge of different
employee groups using a semi-structured theme interview. At the same
time, we were able to establish which areas of information security
knowledge needed improvement. This information formed the foundation
for the design of the e-learning programme.
Security learning
Understanding information security issues from the technical point
of view is an advantage that employees of the case company had [6].
Nevertheless, since they did not have a wider perspective on other
aspects of security, such as organizational or end-user related issues,
they needed information security training. The problem is that, being
small, the company does not have the resources to allow its personnel
to take time off from work to participate in security training [7].
One solution is to resort to e-learning and construct an online learning
environment. Many e-learning environments are realized by long distance
networks, via the Internet, but our solution was to build an intranet-based
environment, within the company network. Most e-learning solutions
consist of very sophisticated and complicated systems, filled with
content that is more entertainment than work-oriented, but we proposed
a solution that is both simple and practical.
In the long run, the project reported here aims to develop a five-level
solution consisting of different guidelines custom-tailored for different
groups. At the first stage of this research, the focus is on guidelines
that apply to all user groups. First, a questionnaire on currently
prevalent practices is sent to every group. Then, having analyzed
the results, the most important guidelines are collected for organizational
use using the e-learning environment. It is important that these guidelines
are easy to understand and follow - and it would not hurt if they
were presented in a humorous way [9].
Requirements for the e-learning environment
The starting point for this project was the fact the organization
under study is a profit-seeking commercial enterprise. Aiming at improving
the security level of this organization, the project also offers it
a competitive edge through the provision of more secure telecommunication
services. Technical solutions, although constituting the foundation
of security, are insufficient and must be incorporated into a wider
approach.
This e-learning project tried to find new, cost-effective, ways of
offering security education to company employees. A guiding principle
in this undertaking is that the education offered must be meaningful
and immediately relevant to the employees. In carrying out their everyday
tasks, people tend to place a high value on usability, sometimes at
the expense of security. Sadly enough, the significance of information
security is often realized only after some mishap occurs.
Another balancing act is frequently observed in the context of e-learning.
Striving toward a more exciting and entertaining approach, educators
sometimes lose sight of their original purpose, and become entertainers
rather than educators.
Presentation and learning
Creating a multimedia e-learning environment requires not only technical
and content-related expertise, but also a pedagogical advisor. Chief
among the tasks of this advisor is to devise ways of presenting learning
materials in a manner that enables learners to assimilate new knowledge
into their previous knowledge structures - and thereby understand
what they have learned. Another function of the pedagogical advisor
is to take account of different learning strategies and styles to
maximize individual learning results.
All learners have their own learning strategies. Part of each individual's
learning strategy is their learning style, which is an essential element
of the learning process. We all have our own strengths, which we rely
on when processing information. Some people are characterized as holistic,
while others are best described as analytic learners. The difference
lies in the way they tend approach a task; holistic learners immediately
strive for the big picture, whereas analytically-oriented learners
favor a piecemeal approach.
Also our senses play an important part in the learning process. We
receive and process information on the basis of our vision, hearing,
tactile or kinetic sense. As a result, we have preferences as to how
we want learning materials to be presented to us, how we want to see,
hear, feel or experience the materials. Schools depend heavily on
vision and hearing, at the expense of pupils who learn better by doing
things, for instance. Some learners remember things as images, others
as stories. A third group consists of learners who like to try things
out through trial and error. Some people prefer to discuss things
with other people, others teach themselves by talking aloud. Most
people have one or more preferred senses for receiving and processing
information [7].
Learning styles based solely on one way of learning are very uncommon,
as most people have their own learning strategies based on their strengths,
habits and preferences. Consequently, a learning environment catering
a large target group must be designed to accommodate a range of approaches
and styles.
Learning contents
The e-learning environment was divided into five sections:
- Topic-driven learning modules
- Instructions and guidelines
- Learning tasks and exercises
- Glossary of information security
- Feedback
Having set the goal of creating an educational model based on these
five sections, the planners had to decide, whether there should be
a core learning package for all employees or several packages aimed
at the various employee groups. The adopted solution was to create
a core learning package consisting of the following learning modules:
- Information security essentials
- Passwords
- Classification of data and information
- Social engineering
- Malicious programmes
- Visitor routines and practices
- Work station security
- Internet and e-mail
- Guidelines for telephony
It proved a crucial point that also senior management completed the
core learning package. The construction includes three sections which
form an integral part of the organization's self-study programme.
These sections are:
- Learning modules for management,
- Learning modules for maintenance personnel, and
- Learning modules for front-end services.
Significance of the automated learning
environment
The purpose of the e-learning project was to construct a learning
environment that requires no additional hardware or software. In addition,
the environment must be accessible from all workstations within the
organization [8].
In accordance with this principle, no special software or hardware
components were installed on these workstations running on various
Windows operating systems. It was only required that the PCs contain
standard peripherals like monitor, mouse, keyboard and, importantly,
sound card for listening to the recorded samples included in the learning
package. No additional video programs were necessary, as the package
contained a viewing programme.
These two basic requirements, accessibility and full functionality
from all workstations, relate to the levels of programming languages.
It is a well-established truth that the lower the level of the used
language, the faster the code and the smaller the memory requirement.
Such code is also more secure. Nevertheless, implementing any system
involves a compromise between automation and reliability, but the
old adage "small is beautiful" is well worth bearing in
mind.
Essential results
When we set out to design the e-learning environment, it was assumed
that the basic information security guidelines of the organization
would be well-known by all employees. Therefore, it was a quite a
revelation when the first tests in January 2004 indicated that some
of the supposedly simple questions proved very hard to answer satisfactorily.
It was also revealed by the theme interviews that a great number
of employees had no clear understanding of what information security
is. All employee groups tended to describe it in terms of individual
or isolated components. Moreover, about half of the interviewees could
not explain in what ways information security issues would be relevant
to their work. This shows that security education should start by
breaking down the definition of information security and analyzing
how it affects everyday work.
Feedback relating to the use of the e-learning system was mainly
concerned with its technical implementation. Typical comments include
"it is slow" and "it takes a long time to start".
Generally, the learners either wanted the multimedia components to
load quicker or they wanted more functionality, including muting or
resolution changes on the fly.
The actual content matter of the programme was not commented on.
What little feedback was received indicated that the intended practical
approach was appreciated and that the learning topics were experienced
as having a practical value. This relative lack of feedback may be
explained by the fact that the learners did not have any expectations
as to the content matter, since they were unfamiliar with the subject.
Also, the design of content may have been better than the technical
implementation. In general, the e-learning system was described as
an interesting novelty and a number of learners indicated an interest
to participate in similar training on other topics as well. With an
average of 5 - 6 hours, many learners stated that they had used less
time than expected on the tasks [3].
Measuring information security awareness is a difficult undertaking.
One way of approaching it is to observe employees while they are working
to establish the degree to which they follow the given guidelines.
However, this study investigated the topic through an interview conducted
among the learners. These interviews started by exploring how the
learners understood the concept of information security which, after
all, constitutes the foundation of information security awareness.
The latter term refers to how well employees and members of society
understand various information security threats and the related responsibilities.
The results show that a high level of awareness has been achieved
when all personnel understand the meaning of information security
in its full extent and apply this knowledge in their work [3]. In
addition, personnel must also be able to identify and manage a range
of information security threats. Finally, they must also know what
to do to avert these threats.
Discussion
The prevailing situation in the organization discussed here was very
confusing: IT functions were outsourced, although staff was experts
in communication and information technology. In a sense, the organization
concentrated all efforts on its core activities while outsourcing
administrative routines. As a result, it is hardly surprising that
the organization has gone on to transfer it information security services
to a national umbrella organization. Currently, the development of
the e-learning programme is in the process of being put out on the
market as a new product.
Claiming that information security is not a major concern in the
small and medium sized business sector is completely wrong. They are
as likely to be affected by security breaches as major organizations.
In the present case, the e-learning environment was designed to promote
information security awareness, but such environments may be harnessed
to accommodate practically any topic of interest to any type of organization.
Conclusions
This paper discussed an e-learning environment for information security
education, designed and constructed by a small Finnish telecommunications
company. The experiences gathered so far indicate that the implementation
of an extensive learning system of this kind must be based on simple
solutions that minimize system load.
It became clear during this study that, to be successful, e-learning
requires that the designers and tutors are familiar with the learners'
needs and learning styles. Diverse ways of presenting the learning
materials makes it easier for individuals with different learning
styles to take in the information. What renders the entire task more
challenging is that the content matter of information security is
often fairly abstract, highlighting the importance of careful design
and presentation. The education offered must provide a range of possibilities
for interaction, because the chosen medium, online teaching markedly
lessens personal contact among teachers and learners. Other important
aspect includes the provision of support to the learners and ways
of creating an inspiring atmosphere conducive to learning. Feedback
provided by the teacher is an integral part of learning, and its role
is even more important in online teaching, where studies are usually
conducted in (relative) isolation from other learners. Time must also
be allocated to electronic communication between the participants.
And finally, attention must also be given to developing the proficiency
of the teachers and promoting their interaction.
References
[ 1 ] ISO/IEC 17799:2005: Information technology - Security techniques
- Code of practice for information security management, ISO, Geneve
(2005)
[ 2 ] Epelboin, Y. : "E-learning: putting documents 0n the web
- Do and Don't". Workshop in EUNIS 2002. Porto, Portugal. (2002).
[ 3 ] Heikkinen, I., Ramet, T., "e-Learning as a part of information
security education development from organisational point of view".
Oulu University. Oulu. May (2004) (in Finnish).
[ 7 ] Kajava, J., Varonen, R., Tuormaa, E. Nykanen, M., "Information
Security Training through eLearning - Small Scale Perspective".
In Eveline Riedling (ed.): VIEWDET 2003. Vienna International Conference
on eLearning, eMedicine, eSupport. Vienna University of Technology.
Nov. 26. - 28. Vienna, Austria. (2003).
[ 8 ] Kajava, J., Varonen, R., "e-Learning as a Tool: Framework
for Building an Information Security Awareness Programme for a Local
Teleoperator". Euromedia'2004. Hasselt, Belgium. EUROSIS. Ghent,
Belgium. (2004).
[ 9 ] Neal, L., Perez, R., Miller, D., " eLearning and Fun".
CHI'04 SIG. ACM. Vienna, Austria. April 26 - 29. (2004).
[ 12 ] Thomson, M.E., von Solms, R., "An Effective Information
Security Awareness Program for industry". Information Security
- from Small Systems to Management of Secure Infrastructures. IFIP
TC-11 Sec'97: WG 11.2 and WG 11.1 Copenhagen, Denmark. (1997).
[ 13 ] Walsh, T., "Measuring the Effectiveness of Computer Security
Training". 23th Annual Security Conference and Exhibition. CSI.
November 11 - 13. Chicago, Il. (1996).
[This text is based on a paper of Jorma Kajava, Reijo Savola, Rauno
Varonen and Juhani Anttila presented at the CIS2006 conference in
Guangzhou, China in 2006]