We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5
Independent Learning Activity 1
1. Human Vulnerability and Cyber-Attacker Methods
Humans are vulnerable due to lack of awareness, over-reliance on
technology, and poor security habits. Cyber attackers exploit these weaknesses through phishing, social engineering, ransomware, and exploiting outdated systems.
2. Strategic Plan for Managing Human Risk
Prioritize risks by assessing behaviors such as password management and
phishing awareness. Implement training programs, encourage reporting of suspicious activities, and regularly evaluate security practices.
3. Engagement Strategy Using AIDA Model
Create awareness through compelling messaging (Attention), generate
interest with relatable scenarios (Interest), stimulate desire by highlighting benefits of security (Desire), and encourage participation in awareness programs (Action).
4. Designing Metrics for Awareness Program
Deploy surveys, conduct simulated phishing tests, and analyze incident
response times. Track changes in employee behavior and measure reductions in security breaches.
Independent Learning Activity 2
1. Program Design and Cloud Security
Design programs ensuring data encryption, identity management, and
continuous monitoring. Leverage multi-factor authentication (MFA) and compliance with industry standards. 2. Security Roadmap for Cloud Adoption
Create a roadmap that emphasizes risk assessments, secure
configurations, training, and compliance monitoring. Ensure flexibility for fast-paced cloud migration without compromising security.
Independent Learning Activity 3
1. Organizational Change and Models
Organizational change involves transitioning processes, strategies, or
culture. Models include Lewin's Change Management Model, Kotter’s 8-Step Model, and the ADKAR Model. Apply these by assessing readiness, defining change steps, and reinforcing changes.
2. Business Case Development
Title: Enhancing Cybersecurity Awareness
Introduction: Explain the importance of awareness in mitigating risks.
Essential Managed Healthcare Training for Technology Professionals (Volume 2 of 3) - Bridging The Gap Between Healthcare And Technology For Software Developers, Managers, BSA's, QA's & TA's