Objective
To demonstrate the
importance of digital security through interconnected real-life scenarios,
highlighting how one security lapse can lead to a cascade of issues.
Setup
1.
Divide participants into
teams of 4–6 people.
2.
Provide them with a
scenario where a small digital security oversight triggers multiple problems.
3.
Ask each team to analyze
the situation, identify the vulnerabilities, and propose solutions to prevent
such incidents in the future.
The Mishap at Horizon Corp
Horizon Corp, a mid-sized
Social Organisation, suffered a series of problems due to one overlooked
security issue. Here's what happened:
1.
Unprotected
Credentials:
A Horizon staff, Priya, reused her work email password on multiple websites,
including an e-commerce platform. The e-commerce platform suffered a data
breach, and Priya’s credentials were exposed on the dark web.
2.
Phishing
Attack:
Cybercriminals used Priya’s leaked credentials to access her email account and
sent phishing emails to her colleagues, including the finance department,
pretending to be her. One of the emails asked for an urgent transfer of funds
to a "supplier" account.
3.
Compromised
Customer Data:
In parallel, the attackers used Priya’s access to download sensitive customer
information from Horizon's servers. They encrypted the data and demanded a
ransom.
4.
Reputational
and Financial Damage:
The breach resulted in Horizon’s customers losing trust in the company. Some
clients terminated their contracts, and Horizon also had to pay fines due to
non-compliance with the Digital Personal Data Protection Act, 2023.
Task for Participants
Ø Step 1: Identify Vulnerabilities
Each team must list all the weaknesses in Horizon Corp’s digital security
practices (e.g., password reuse, lack of phishing awareness, insufficient
monitoring of data access, etc.).
Ø Step 2: Analyze the Impact
Discuss how these issues could impact Horizon Corp’s operations, finances, and
reputation.
Ø Step 3: Propose Solutions
Teams must develop a comprehensive digital security strategy to prevent
such incidents in the future. The strategy should include:
Password management policies.
Employee training on phishing awareness.
Data protection measures (encryption, access control, regular audits).
Incident response and recovery plans.
Debrief and Discussion
1.
Ask each team to present
their analysis and proposed solutions.
2. Facilitate a discussion around key points:
What is digital security? Protecting devices, networks, and data from unauthorized
access or harm.
Why is it required? To safeguard sensitive information, prevent financial losses,
ensure privacy, maintain trust, and comply with regulations.
3.
Conclude by emphasizing
the interconnectedness of digital security—how one weak link can compromise an
entire system
0 Comments