Page 733 - StudyBook.pdf
P. 733

Operational and Organizational Security: Policies and Disaster Recovery• Chapter 12  717

                    In addition to having people provide notification, administrators can configure
                 systems to automatically contact them. Some systems provide the ability to send
                 out alerts when certain events occur (e.g., a system shutdown).The system can send
                 an e-mail message to specific e-mail addresses, or send out messages to alphanu-
                 meric pagers. In some cases, administrators may become aware of a problem and
                 deal with it before any of the users on the network notice.
                    Providing contact information for general users of a network is another positive
                 component of a communicative environment. Users should have multiple methods
                 of contacting IT staff, so they can acquire help and notify them of problems they
                 are experiencing.This allows users to inform administrators of a seemingly minor
                 problem that could grow into a major one. For example, a user may complain of
                 specific symptoms his computer is experiencing that are indicative of a virus infes-
                 tation. Early warning through users can catch such problems at an initial stage,
                 before any real damage is done.
                    There are many possible methods for users to contact IT staff. Help desks are
                 commonplace in companies, providing a single phone extension that users can call
                 when they are experiencing problems.A designated e-mail address and voicemail
                 are other methods of enabling users to report problems. Methods of contacting a
                 help desk should be advertised internally, through memos, internal e-mail, or on
                 the corporate intranet.
                    Signatures on e-mails can be used to provide alternative methods of contacting
                 individual users.The signature is text or a graphic that is automatically added by
                 the user’s e-mail client software to each message sent by a person.The signature can
                 state the name of the sender, the company phone number, an extension, fax
                 number, business address, e-mail address, and the Uniform Resource Locator
                 (URL) of the public Web site, along with any other information a person specifies.
                 Not only is this useful for internal users who need to respond immediately, but also
                 for vendors and other people external to the company.

                 User Awareness

                 Users cannot be expected to follow rules if they are not aware of them.
                 Organizations sometimes make the mistake of imposing policies and procedures
                 while failing to provide effective methods of sharing that information.This has the
                 same effect as if the policies and procedures were never created.
                    User awareness involves taking steps to make users conscious of and responsive
                 to security issues, rules, and practices.To make users aware, administrators can use a
                 number of the communications methods previously mentioned. For example, poli-




                                                                              www.syngress.com
   728   729   730   731   732   733   734   735   736   737   738