You are on page 1of 2

01 Laboratory Exercise 1 – ARG

1. What is the article about?

 The topic of the article is how each employee in a company will carry out their roles and
obligations regarding addressing cyber security. It talks about the team members should grasp
the importance of their part because as a member you should know your task in every way and
focus on what you are doing to perform successfully. Moreover, do not constantly dispute with
a firm when they ask you to undertake work that you believe to be very risky. Instead, do your
job to manage risk factors and prevent them from providing the company with the best security
possible. If you believe that they are asking for something that cannot be done, explain it to
them and they will listen so that you both fully comprehend. As a result, be sure to give your
best effort when presenting your work to a corporation. It is crucial that it be factual to prevent
misinterpretation, plagiarism, and data manipulation. For instance, if you were hired as an
information security analyst for a company, one of your roles and responsibilities would be to
test the security measures in place to ensure the integrity of the data, software, and systems.
You would also be required to report on security and performance as well as provider accolades
in order to address security incidents when your client and you are in a meeting.

1. Among the seven (7) roles and responsibilities of cybersecurity


structure, which one do you think is the most important?

 The ability to work throughout the organization is the most crucial to me since, in my
opinion, having knowledge of many sorts of work gives one's employer an advantage.
Why? Because developing different talents through experience is a fantastic approach
to gain professional experience. The employee in your company clicks a malicious link by
accident, and as soon as they do, a pop-up message appears on their screen warning
them that their data is being attacked. Unfortunately, the ethical hacker in your
organization is out that day, making it impossible for anyone to stop the attack.
Fortunately, you had a past work as an ethical hacker, which is why you offered to do
the job that day to stop the attack and safeguard the company's data. Even though your
title is "Security Architect," you oversee keeping a company's computer secure.
Although comparable, the duties are different. A team member must have someone like
this since it is helpful in the instances I described before. This scenario occurs
frequently.

2. Do you agree with the article? Why or why not?


 Absolutely, because the article discusses the duties and tasks associated with a team
member's management of cybersecurity in an organization. It is true that having a clear
understanding of your role and responsibilities helps you execute your task well. You
understand how to organize your tasks, complete them in a certain amount of time, and
meet the team's objectives. Being a part of cybersecurity teams requires critical labor
because every task is significant, and the team's primary responsibility is to safeguard
data and uphold client confidentiality.

You might also like