Secure IT Foundation

Level 5 – Secure Users

What is Level 5?

The Secure IT Foundation’s Secure Computer Standard gives manufacturers the guidance towards creating a computer for sale that is ‘secure out the box’. Level 5 is our guidance towards creating a secure computer user to accompany the secure computer. Once the computer is supplied secured to Level 4 in our example security rating scheme, then the person in charge of it becomes the weakest link in the security chain. So we wrote the Level 5 training and tools to help ‘secure the person’.

A secure computer does not give away personal and financial data on its own. It needs a human to tell it to do the wrong thing. We hope to help you understand if you are doing the right or the wrong things online and why you may need to change the way you use your computer. We publish two documents to help you to understand how your behaviour using a computer affects its security.

Home Computer Policy – click here to view

When you drive a car, you need to follow the rules on the road else you get arrested. It can be the same on the Internet. Do the wrong things, break the rules and you get arrested.

Your behaviour has to be within in the rules, but who writes your rules on the Internet. As no one else will simply tell you the important rules, we have written the Home Computer Policy to help you stay safe online. This is a set of basic rules for your security and helps you to understand why you are protecting your data. You may not lose your job using your home computer but you only have yourself to blame if you lose money, your reputation or standing in the community, or your personal information.

Risk Profile Questionnaire – click here to view

When you leave your home, you lock the door. Why do you do this? To help reduce the risk someone will come into your house and steal things like your TV or computer. Your risk is the theft of your property. How do you minimise this risk of theft i.e. having your TV or computer stolen? By fitting locks to the doors. The door lock is your control to minimise the risk of theft.

You have just made a simple risk assessment of your home’s security even if you did not realise you were doing it. Similarly, you need to consider the risks for your home computer. To help you do this, this document lets you perform a risk assessment on yourself and your family’s computer use. It lets you work out what information you need to protect, what behaviour you may do that could affect you or your family, and what controls are required to help minimise the risk of bad things happening to you on-line. This will also give you an idea of how much you could lose in the event of a problem with your computer, what measures you currently have in place to prevent problems and what you additional measures you need to take to stay safe on-line.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s


  • None
  • Coldwind: Couldn't agree more. I downloaded a piece of software just now, disabled the 'toolbar' 'offer' (which fortunately for me has become a reflex); but co
  • ModemJunki: I only discovered this today - I had updated the firmware to the latest out of habit, and I could STILL access my TrendNet cams on the local network w
  • PrentOS – a Simple Secure Computer « Secure IT Foundation: [...] September 2010 we said it was time for a brand new start to computing, well it is starting to take shape… [...]


%d bloggers like this: