Reflections — Module 1

Zwivhuya
2 min readMar 9, 2021

Basic principles of cybersecurity management

In module 1 I learnt three main aspects of cybersecurity management which include (1) the National Cybersecurity Workforce Framework (NCWF), Access control and security architecture, and Cybersecurity management frameworks. I learnt that the NCWF provides distinctions between cybersecurity specialty areas and the knowledge, skills and abilities (KSA) required in each specialty. I learnt the that the access control refers measures implemented to control access to information systems. Access control can be exists in three main categories of which can be implemented using four access control models. There are numerous security architectures that can be used as a framework through which organisations can use for security architecture planning. The are numerous cybersecurity frameworks that organisation can use to create their own cybersecurity plans required to achieve their security objective. Some of these include ISO 2700, ITIL, NIST 800 and COBIT to mention but a few. The learning process was accompanied by sharing my thoughts on the cybersecurity trends and a quiz at the end to test my knowledge.

The content is overwhelming at this stage. The content is presented well on the online platform and allows for self study. Sharing of ideas on the topics covered in the forum is great as students can learn from each other. The content requires further reading from other sources which is intimidating for someone who has no practical experience on the scenarios presented in the course material.

I think spending more time on each module will go a long way in improving my confidence in the content.

How do you practice cybersecurity in a personal context?

I always use lengthy, unique and secure password for all my accounts. I make use of Two-factor authentication (2FA) where possible. I am careful of whom I share personal information with and always ask organisations that have my information about what they use it for. I avoid using public networks and make use of encryption software when necessary.

How secure are your personal data and devices?

My physical devices are relative secure with passwords. I make use of antivirus software where I can.

After going through this module, do you think there are steps you need to take in order to make your personal data more secure? What are these steps?

Yes, I would invest more time in reading more about the latest trends in cybersecurity so as to stay abreast with the field and enrich my learning experience in the course.

--

--