The method to provide end users of IT systems and applications with requirements related to acceptable use,
privacy, new threats and trends, and use of social networking is:
Security awareness training.
BYOD security training.
Role-based security training.
Legal compliance training.
Security awareness and training are critical to the success of a security effort. They include explaining policies,
procedures, and current threats to both users and management.