Cyber-Attacks and Employee Involvement Flow Chart

Week 14 flow chart
Week 14 flow chart

Hypothesis: Educating employees about cyber-attacks and training employees to help prevent cyber-attacks.

Proposal Outline

Introduction

  • ALLARD, E. (2016). Cybersecurity forum spells out business risk. New Hampshire Business Review, 38(12), 14.

Explaining the Employee Role

Address Employee Behavior

  • GROSSE, E., SCHNEIDER, F. B., & MILLETT, L. L. (2021). Implementing Insider Defenses: How to avoid insider cyber-attacks by creating a corporate culture that infuses trust. Communications of the ACM, 64(5), 60–65. https://doi-org.ezproxy.fhsu.edu/10.1145/3418296

 

 

Training Employees

  • Taylor, M. (2020). Sizing Up the Cybersecurity Threat and Building the Right Strategy: Small- to medium-sized businesses are easy targets for cybercrimes. Here is some advice about how to protect your business. Moldmaking Technology Magazine, 23(3), 34–36

 

 

Method:

  • Discuss cyber-security and cyber-attacks with employees.
  • Explain the employee’s role in both security and attacks.
  • Address employee behavior that could both prevent and invite attacks.
  • Give employees examples on helping prevent cyber-attacks.

 

Discussion:

  • After discussion and training, what risks have employees noticed?
  • Has employee behavior changed?

 

About Adam Goodrich

My name is Adam Goodrich. My family and I live in Salina, KS. We moved here six years ago from Arkansas. My goal at FHSU is to gain as much knowledge to help with my career. My pronouns are he/him.

Leave a Reply

Your email address will not be published. Required fields are marked *