"The Digital Domino Effect"- An Example

 

Objective

To demonstrate the importance of digital security through interconnected real-life scenarios, highlighting how one security lapse can lead to a cascade of issues.

Setup

1.    Divide participants into teams of 4–6 people.

2.    Provide them with a scenario where a small digital security oversight triggers multiple problems.

3.    Ask each team to analyze the situation, identify the vulnerabilities, and propose solutions to prevent such incidents in the future.

The Mishap at Horizon Corp

Horizon Corp, a mid-sized Social Organisation, suffered a series of problems due to one overlooked security issue. Here's what happened:

1.    Unprotected Credentials:
A Horizon staff, Priya, reused her work email password on multiple websites, including an e-commerce platform. The e-commerce platform suffered a data breach, and Priya’s credentials were exposed on the dark web.

2.    Phishing Attack:
Cybercriminals used Priya’s leaked credentials to access her email account and sent phishing emails to her colleagues, including the finance department, pretending to be her. One of the emails asked for an urgent transfer of funds to a "supplier" account.

3.    Compromised Customer Data:
In parallel, the attackers used Priya’s access to download sensitive customer information from Horizon's servers. They encrypted the data and demanded a ransom.

4.    Reputational and Financial Damage:
The breach resulted in Horizon’s customers losing trust in the company. Some clients terminated their contracts, and Horizon also had to pay fines due to non-compliance with the Digital Personal Data Protection Act, 2023.

Task for Participants

Ø  Step 1: Identify Vulnerabilities
Each team must list all the weaknesses in Horizon Corp’s digital security practices (e.g., password reuse, lack of phishing awareness, insufficient monitoring of data access, etc.).

Ø  Step 2: Analyze the Impact
Discuss how these issues could impact Horizon Corp’s operations, finances, and reputation.

Ø  Step 3: Propose Solutions
Teams must develop a comprehensive digital security strategy to prevent such incidents in the future. The strategy should include:

Password management policies.

Employee training on phishing awareness.

Data protection measures (encryption, access control, regular audits).

Incident response and recovery plans.

 Debrief and Discussion

1.    Ask each team to present their analysis and proposed solutions.

2.    Facilitate a discussion around key points:

What is digital security? Protecting devices, networks, and data from unauthorized

access or harm.

Why is it required? To safeguard sensitive information, prevent financial losses,

ensure privacy, maintain trust, and comply with regulations.

3.    Conclude by emphasizing the interconnectedness of digital security—how one weak link can compromise an entire system


Post a Comment

0 Comments