0% found this document useful (0 votes)
10 views5 pages

Document

Hi

Uploaded by

elijohnquimbo361
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views5 pages

Document

Hi

Uploaded by

elijohnquimbo361
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Independent Learning Activity 1

1. Human Vulnerability and Cyber-Attacker Methods

Humans are vulnerable due to lack of awareness, over-reliance on


technology, and poor security habits. Cyber attackers exploit these
weaknesses through phishing, social engineering, ransomware, and
exploiting outdated systems.

2. Strategic Plan for Managing Human Risk

Prioritize risks by assessing behaviors such as password management and


phishing awareness. Implement training programs, encourage reporting of
suspicious activities, and regularly evaluate security practices.

3. Engagement Strategy Using AIDA Model

Create awareness through compelling messaging (Attention), generate


interest with relatable scenarios (Interest), stimulate desire by highlighting
benefits of security (Desire), and encourage participation in awareness
programs (Action).

4. Designing Metrics for Awareness Program

Deploy surveys, conduct simulated phishing tests, and analyze incident


response times. Track changes in employee behavior and measure
reductions in security breaches.

Independent Learning Activity 2

1. Program Design and Cloud Security

Design programs ensuring data encryption, identity management, and


continuous monitoring. Leverage multi-factor authentication (MFA) and
compliance with industry standards.
2. Security Roadmap for Cloud Adoption

Create a roadmap that emphasizes risk assessments, secure


configurations, training, and compliance monitoring. Ensure flexibility for
fast-paced cloud migration without compromising security.

Independent Learning Activity 3

1. Organizational Change and Models

Organizational change involves transitioning processes, strategies, or


culture. Models include Lewin's Change Management Model, Kotter’s 8-Step
Model, and the ADKAR Model. Apply these by assessing readiness, defining
change steps, and reinforcing changes.

2. Business Case Development

Title: Enhancing Cybersecurity Awareness

Introduction: Explain the importance of awareness in mitigating risks.

Problem: Employees lack adequate cybersecurity knowledge.

Solution: Training, phishing simulations, and updated policies.

Results: Reduced incidents and enhanced compliance.

Conclusion: Awareness programs are critical for security.

Recommendation: Invest in long-term training programs.

Case Analysis 1

1. Case Study Insights

Highlight user awareness as a critical element in mitigating risks. Address


gaps with ongoing training. Actions like deploying an awareness system
effectively reduced risks.
Case Analysis 2

1. Leadership Styles in Cybersecurity

Case 1: Transformational leadership fostering innovation.

Case 2: Autocratic leadership leading to disengagement.

Outcomes show the importance of flexibility and engagement.

Case Analysis 3

1. Strategies for Cybersecurity Teams

Case studies illustrate the benefits of mentorship programs, competitive


compensation, and collaborative platforms for retention and innovation.

Case Analysis 4

1. Incident Response Efforts

Case 1: Quick containment reduced breach impact.

Case 2: Proactive recovery plans minimized downtime.

Lessons include the importance of preparedness and clear protocols.

2. Ethical Dilemmas in Security vs. Privacy

Balancing user privacy with security needs requires transparent policies


and adherence to ethical standards.

Case Analysis 5

1. Ethics in Data Breaches


Ethical Responsibility: The retailer failed in its duty of care.

Preventative Measures: Encryption, regular audits, and firewalls.

Accountability: Strengthen IT oversight and introduce penalties for lapses.

Case Analysis 6

1. Plagiarism in Research

University Action: Enforce disciplinary measures and educate students.

ICT Tools: Use plagiarism detection software proactively.

Ethical Lessons: Stress originality and respect for intellectual property.

Case Analysis 7

1. Social Media and Political Manipulation

Platform Responsibility: Vet ads for accuracy and misinformation.

Regulations: Mandate transparency and accountability.

Trends: AI and data analytics exacerbate misinformation.

Case Analysis 8

1. Self-Driving Car Ethics

Accountability: Shared among developers, manufacturers, and owners.

Ethical Guidance: Update AI principles with clear liability frameworks.

Case Analysis 9

1. Employee Surveillance Ethics


Respect Rights: Ensure monitoring aligns with transparency policies.

Balancing Privacy and Productivity: Use anonymized data for analysis.

Policy Improvements: Define boundaries for acceptable monitoring.

You might also like