This group is usually the least knowledgeable in data processing, but the most dependent on the facilities provided by the applications and systems areas to perform their specific job function. They are usually the most knowledgeable, however, in how the resources used in their areas are accessed, and by whom. They are also a good source in determining the criticality of information to the organization, and potential abuse of this information. For these reasons they require special handling.
The end-user’s understanding of the nature of the security software is generally limited to the idea that it is being implemented to prohibit external attack on corporate resources, and that it is invisible internally. In fact, their greatest exposure to the need for security comes from inaccurate attempts by television and the movies to portray wide-open computer access. Needless to say, they are very surprised when they inadvertently interface with CA Top Secret for the first time.
The end-users support the use of security but not if it becomes something that prevents them from simply doing their job. Therefore, security definitions for this group must be handled so that it is as transparent as possible.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|