0% found this document useful (0 votes)
101 views

E14 Cyber Security Risk Management

This 3-hour course activity involves demonstrating and simulating cyber security risk management. Students will learn to protect computers from attacks by using antivirus software, setting security settings, and monitoring passwords. They will also interpret a sample cyber security risk management plan and identify the relevant sections to respond to simulated attacks. A briefing will outline the activity and expectations. During the demonstration, instructors will show how to secure accounts and networks. Students will then use the plan to address a mock security issue. Their performance will be evaluated based on computer protection standards and interpreting the prepared plan.

Uploaded by

Dzenrhe Paran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
101 views

E14 Cyber Security Risk Management

This 3-hour course activity involves demonstrating and simulating cyber security risk management. Students will learn to protect computers from attacks by using antivirus software, setting security settings, and monitoring passwords. They will also interpret a sample cyber security risk management plan and identify the relevant sections to respond to simulated attacks. A briefing will outline the activity and expectations. During the demonstration, instructors will show how to secure accounts and networks. Students will then use the plan to address a mock security issue. Their performance will be evaluated based on computer protection standards and interpreting the prepared plan.

Uploaded by

Dzenrhe Paran
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

Page 1 of 2

ICT – Maritime Information Communication and Technology with Cyber Security


Course
ICT – E14 Cyber security risk management
Activity Code

Briefing 30 minutes

Demonstration 2 hours
Duration
Debriefing 30 minutes

Total Time 3 hours


N/A
STCW Table
N/A
Function
N/A
Competence
N/A
KUPs

Cyber security risk management


Activity Title
CO4: Interpret cyber security risk management plan for shipboard and shore
Course outcome application
LO6.5: Apply methods and procedures in protecting computers and
computer networks from cyber attacks
Learning outcome LO6.9: Interpret a cyber-security risk management plan for shipboard and
shoreapplication given a scenario

Computer Laboratory
Activity Area
Computer, Antivirus program, Cyber security risk management plan
Materials Needed
1:1
Ratio
Description Class activity on simulating cyber security risk management using a prepared
plan.

Briefing Items to be discussed during briefing:


 Objective of the activity (Relate prior discussion)
 Description of the activity and any general instructions
 Performance criteria and standards
Instructor’s Action INSTRUCTOR’S COPY ONLY
1. Conduct briefing.
2. Discuss and demonstrate protection of computers and computer networks
against cyber-attacks:
a. Use of antivirus program;
b. Setting-up computer security settings;
c. Setting-up security for log-in or account credentials; and
d. Phishing and spam emails
3. Discuss the contents of the cyber security risk management plan.
4. Simulate a simple cyber security attack and facilitate the class in identifying
the relevant sections of the plan in order to respond accordingly.
5. Conduct debriefing.
Student’s Action 1. Use an anti-virus program.
2. Set-up log-in and account credentials.
3. Recognise and delete unwanted emails.
4. Use the cyber-security risk management plan.

UCLM CONTROLLED DOCUMENT


Page 2 of 2

Debriefing Items to be discussed during debriefing:


 What went well
 What went wrong
 Summary and significance of the activity

UCLM CONTROLLED DOCUMENT


Page 3 of 2

Performance Criteria Performance Standards Done / Not Done


Apply methods and 1. Install and update antivirus program
procedures in protecting
computers and computer 2. Use antivirus program to detect unwanted programs and
networks from cyber files
attacks 3. Set-up computer security settings

4. Set a strong password for log-in or account credentials

5. Monitor password leakages and react accordingly

6. Set-up multi-factor authentication of accounts

7. Use software-based authenticator programs

8. Recognise and delete unwanted emails


Interpret a cyber-security 9. Identify the relevant section of the cyber-security risk
risk management plan for management plan
shipboard and shore
10. Resolve cyber security risk issue using the prepared plan
application given a scenario

Proficiency checklist
Scoring Method

Re-sit
Appeals and
Objections

UCLM CONTROLLED DOCUMENT

You might also like