Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Samenvatting

Summary Lectures Behavioural Change Approaches to Cybersecurity (BCACS) / Crisis and Security Management / Cybersecurity Governance

Beoordeling
5.0
(2)
Verkocht
14
Pagina's
137
Geüpload op
16-10-2020
Geschreven in
2020/2021

Summary consisting of all the lecture notes and lecture slides of the course Behavioural Change Approaches to Cybersecurity (BCACS), part of the MSc Cybersecurity Governance track of Crisis and Security Management. The summary is extensive, clear and will surely help you pass the course.

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

Lecture 1: Introduction to behavioural
change and cybersecurity
All lectures discussed, paraphrased and cited in this document are presented by Dr. Tommy
van Steen during the course Behavioural Change Approaches to Cybersecurity at Leiden
Universiteit (2020).


Introduction to cybersecurity

● Discussion board on Brightspace → for general questions.
● 4 10 ECTS courses in cybersecurity governance → focussed on governance
● 2 SPOCS ​→ spoc = private online course. These give you technical background in
cyberspace and cybersecurity. Separate, but embedded in courses in block 1 and 3.
Embedded in this course and in Digital Justice. They are not part of the course, but are
part of the course as something separate. So you have the regular courses and in 2 of
them you have the SPOCS as well.
● SPOCS → 1 credit-ish. 6 videos per SPOC (5-10 minutes per video), additional
readings as well. You ​have to pass the SPOC to pass the course​, but it does not up or
down your grade. It’s a fail or pass. Lecturer suggests: watch all the videos, do all the
readings, watch the videos again, then do the assignment. Quiz will be put online.
● Learning goal in this course: learn to collect meaningful data → measure the
effectiveness of behaviour change / cybersecurity solutions
● Weekly topics:
- Week 1: introduction + path model = method of designing interventions that are
likely to succeed
- Week 2: behavioural side of cybersecurity problems
- Week 3: behavioural change models and literature
- Week 4: intervention design and effectiveness testing
- Week 5: designing surveys and statistics
- Week 6: other forms of data collection
- Week 7: reporting and ethics
- Literature: Buunk & Van Vught + articles, see syllabus.
● 14 sessions in 7 weeks
● Some sessions will be more interactive, others will be lectures. Schedule is not always
right
● Week 3 and week 6 → some of us on campus. Afternoon is on campus, in the morning
it will be online. Have to sign up for campus sessions if you want to join.
● Examination!!
- Group paper (max 5000 words), 30% of final grade → will be explained next
Thursday. Deadline is 16 October. Everyone gets the same grade in the group.


1

, - Individual paper (max 1500 words), 30%
- Take home exam, 40% 20 October between 12.00 and 16.00
- SPOC: fail/pass, multiple choice quiz
- Powerpoint will be uploaded to Brightspace :-)
- Groups should be formed ourselves. Will be given some guidance in the second
session. Form groups based on what cybersecurity problems you would like to
solve.
● Course is mostly about methods. (zin in!!!!!!!!!!!!!!!!!11!!)

What is cyberspace?
“Cyberspace is composed of all the ​computerized networks​ in the world, as well as all
computerized ​end points​, including telecommunications n
​ etworks​, special purpose networks,
the internet, computer systems, and computer-based systems. The concept also includes the
information​ stored, processed, and transmitted on the devices and between these networks.”
- ​Ben-Israel & Tabanksy ​(2011).

Why care about cyberspace?
- Protection of Critical National Infrastructure → water supply, electricity etc. could be
hacked
- Financial reasons → example: ransomware attack on Maastricht University. Being more
cyber-secure in advance saves you money.
- Privacy and sensitive data

Protection of Data: CIA-triad
→ Triad of information security
- Confidentiality​ → who has access to this data? Breaching confidentiality by hacking
emails for example.
- Integrity​ → trustworthiness of data. Example: someone gets access to the Brightspace
account of the teacher, someone could alter grades, this makes the grades
untrustworthy. This is not very subject to cyber attacks.
- Availability​ → whether the people who should have access can access the data.
Maastricht attack: availability went down, restricted by an outside party.
- Any cyber security attack can be identified as one or multiple of the CIA-triad.




2

,Cyber security background

Model:




3

, - We will mostly look at the social-technical layer in this course
- You can have all the best data security software, but human errors would still happen.
Complex systems do not protect human errors.

People are the weakest link
- Schneier: “Only amateurs attack machines, professionals target people”
- Cranor: “It is becoming increasingly apparent that humans are a major cause of
computer security failures.”
- Cyber security issues cannot be solved by just clever programming → human error




A CEO of a UK company ran phishing tests, to see if employees would click the links that were
sent. They wanted to fire everyone who clicked the link. Assumption that end-users are at fault,
but the board and the CEO were not part of the test. But.. the CEO actually forwarded a
phishing link to one of his employees (so he was in the wrong). He would not acknowledge his
fault in thinking the email was real. Cybersecurity is not on the forefront of anyone’s mind.
Interventions should always be aimed at individuals getting better at something.


Introduction to behavioural change

How can you change behaviour?

Video: human behaviour experiment lift antics
- https://www.youtube.com/watch?v=XZDLbbfT9_Q
- 3 people standing in an elevator, all facing the wall, 4th person joins. Eventually, the 4th
person also turns around to face the wall.
- The experiment is done with other things as well, liking taking off your hat. The person
that does not know he is being filmed follows what the others are doing.

Video: the Asch Experiment
- https://www.youtube.com/watch?v=qA-gbpt7Ts8
- Experiment about group conformity.


4

Gekoppeld boek

Geschreven voor

Instelling
Studie
Vak

Documentinformatie

Heel boek samengevat?
Onbekend
Geüpload op
16 oktober 2020
Aantal pagina's
137
Geschreven in
2020/2021
Type
SAMENVATTING

Onderwerpen

$14.70
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Beoordelingen van geverifieerde kopers

Alle 2 reviews worden weergegeven
2 jaar geleden

2 jaar geleden

5.0

2 beoordelingen

5
2
4
0
3
0
2
0
1
0
Betrouwbare reviews op Stuvia

Alle beoordelingen zijn geschreven door echte Stuvia-gebruikers na geverifieerde aankopen.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
summaries4u Universiteit van Amsterdam
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
391
Lid sinds
9 jaar
Aantal volgers
260
Documenten
8
Laatst verkocht
5 maanden geleden

3.8

61 beoordelingen

5
18
4
20
3
17
2
2
1
4

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen