Skip to main content
Workforce LibreTexts

11.4: Team Activity

  • Page ID
    4387
  • \( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \) \( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)\(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\) \(\newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\) \( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\) \( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\) \( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\) \( \newcommand{\Span}{\mathrm{span}}\)\(\newcommand{\AA}{\unicode[.8,0]{x212B}}\)

    "Team" by Newtown grafitti via Flickr. CC BY 2.0.Overview

    Student teams organize the materials on their sector and their fictitious organization into a final presentation to be shared with the class.

     

     

    Team Activity Objectives

    • Select appropriate vulnerability assessment frameworks and tools as part of a risk assessment of a CI system.
    • Identify and describe cybersecurity threats, risks, vulnerabilities, and attacks as they apply to CI systems.
    • Identify an appropriate risk management strategy for CISR.

     

    Assignment

    Draw on the past work your team has done on your fictitious organization and its sector:

     

    Prepare a summary of your team’s case study project for the class. Be sure that your team’s presentation addresses the following:

    • What you discovered about cybersecurity vulnerabilities as they relate to your particular sector
    • What mitigation techniques can be used to alleviate these issues
    • Suggestions you have for further strengthening your network’s security
    • The role of government regulation in the functioning of your organization

     

     

     

     

     


    11.4: Team Activity is shared under a CC BY license and was authored, remixed, and/or curated by LibreTexts.

    • Was this article helpful?