Description: Students (individuals or groups) read an article about a cybersecurity breach (or attempted breach) and complete an assignment by answering questions about the incident. Students can explain what cybersecurity is. Clipping is a handy way to collect important slides you want to go back to later. 1. “[Teacher] likes [title of movie/book/etc.].”. Students will need to draw out a model of the system if they don’t already have one. Introduce important facts and underlying concepts. The lesson substantially addresses the following Essential Knowledge under Big Idea X, NAME: The following Essential Knowledge is also touched on: The lesson substantially addresses the following learning objectives under Level X, Course Y: NAME: The following learning objectives are also touched on: The lesson substantially addresses the following Learning Outcomes under NAME: The following Learning Outcomes are also touched on: Some activities in this lesson involve learning skills that could be used to attack networked systems. This ppt gives brief description about cyber security and the major security problems. If you continue browsing the site, you agree to the use of cookies on this website. Wrap up by highlighting how designing a secure system differs from other fields of engineering, in that you have an active, motivated adversary to contend with. Explore Try Prime New Upload. Looks like you’ve clipped this slide to already. Ground students’ learning in firsthand experience and spark new ideas. Published in: Engineering, Technology. It’s called threat modeling. The slides are accompanied by Notes with details and examples to guide your lecture. Brainstorming attacks and protections feels disorganized. Have groups swap worksheets (pages 1-2) and pass out page 3. Processor 2 . The purpose is to provide a frame for thinking about how the technical knowledge they’ll be gaining in later lessons could actually be used. The rest of the Blue Team questions involve thinking of ways that someone might attack the house or gain unauthorized access to the things inside. Access Slide Deck: “Cybersecurity and Threat Modeling” Contents: Presents an overview of web security (4-minute video), slide 2; Defines cybersecurity, slides 3–9; Defines cyber … Along the way, it introduces the basic concepts that define the field of cybersecurity. Security Mechanisms and Principles (PDF) Juels, Ari, and Ronald Rivest. Copies of the assignment handout (one per student/group). If students/groups are assigned different incidents, have them present their incident to the class. ACM CCS (2013): 145–60. It takes over 15 hours of hard work to create a prime note. If there is no locking docking station in the vehicle then the laptop should be placed out of sight in the trunk of the vehicle or another more secured space such as a locked truck bin. Credits: Inspiration for the points to cover in this agreement came from Avi Rubin, Michael E. Whitman and Herbert J. Mattord (the Hands-On Information Security Lab Manual), an anonymous CS teacher from a Facebook group, and EC-Council’s Code of Ethics. Sumitra Kisan Asst.Prof. The idea is simple: One group of security pros — a red team — attacks something, and an opposing group — the blue team — defends it. Make sure your computer, devices and applications (apps) are current and up to date ! This is an abstraction of the system at the heart of your threat model. What would a totally safe system look like? Coming Soon: Unplugged version with “Introducing the Security Cards” handout and slide-free teacher’s notes. Estimated Time: TIME minutes.What You’ll Need: Blackboard/whiteboard (optional). Essential Knowledge points covered: LO CSN-1.B Explain how the Internet works. Create and maintain password and passphrase 2. Essential Knowledge points covered: LO 6.3.1 Identify existing cybersecurity concerns and potential options to address these issues with the Internet and the systems built on it. Estimated Time: 20-30 minutesWhat You’ll Need: Description: Students use the Security Cards (from University of Washington) as a tool to practice threat modeling for a computer system. Description: In this presentation, students learn about what cybersecurity is, how threat modeling works, and why threat modeling is a useful place to start for cybersecurity. Includes a slide deck for introducing the activity. Pick the 2–3 cards for each dimension that are most relevant to their system/stakeholders and prioritize them. Go deeper into the underlying concepts and/or let students practice important cybersecurity skills. As an end- user, you; 1. P3 Abstraction in Program Development: Develop programs that incorporate abstractions. (Repeat a few times.). Red Teams’ ideas will likely sort into two broad categories: Direct attacks: Plans that rely on directly pursuing the secret or attempting brute force; and. Meet executives from Fortune 500 companies, researchers from federal intelligence agencies, as well as university faculty and students sharing their latest discoveries. In groups, we’ll work through an example of how you would create a threat model for a basic house. Manage your account and … The course calendar is the most common starting point for students. Introduction to cybersecurity. P6 Responsible Computing: Contribute to an inclusive, safe, collaborative, and ethical computing culture. CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page Malware • Malware - software that exhibits malicious behavior (typically manifest on user system) – virus - self-replicating code, typically transferring by shared media, filesystems, email, etc. Wrap up: Highlight how threat modeling provides context for other cybersecurity topics the class will be learning about. The handout has four pages, one for each system. Introduce the activity, using the slides and lecture notes. For a computer/system to actually be useful, it has to have some way for information to go in and come out (whether or not it’s connected to the Internet). Cyber security is correlated with performance. It’s easier to think of attacks than it is to think of protection measures. Typically, when services are free, businesses make money from the data, and the consumer becomes, in effect, a product. Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto, Security and ethical issues - Arber Hoxhallari, lecture 3:understanding ethical issue in networking. Lecture notes files. For this activity, students don’t need to focus on those details. What You’ll Need: Print or write out slips of paper with a “secret” written on each one. And it’s just a fact that you cannot predict or prevent all attacks. P4 Code Analysis: Evaluate and test algorithms and programs. My aim is to help students and faculty to download study materials at one place. The agreement commits them to use their powers only for good, and lays out some specifics of what that means. In this activity, every group will start out as a Blue Team. Cybersecurity 1: Introduction to cybersecurity 2013 Slide 1 This ppt also provides information of major cyber attacks. Description: Teachers can use current news items about cyberattacks/data breaches or cybersecurity innovations to grab students’ attention at the beginning of class and illustrate the relevance of cybersecurity. Cyber-terrorism. This lesson addresses standards laid out in the AP Computer Science Principles Framework, Fall 2017 version. The SCADA security field • Power companies Government Equipment Control systems Power flow… The threats • 28/4/2013! According to your syllabus. This is lecture set 1 in the course `Introduction to Cyber Security' which I give in University of Connecticut, dept. Ask your students to form groups of three or four. Estimated Time: 15 minutes.What You’ll Need: Computer, projector, and speakers. Geared towards AP Computer Science Principles, but compatible with any introductory computer science course. What have you heard about it? Solved Exam Paper. Tell the Blue Teams their task is to figure out a plan for protecting the information on the paper. Good sources for recent articles on cybersecurity incidents: Suggestions when picking articles (or incidents) to assign: Scoring as an Assessment: Each answer should be clearly connected to the incident, and should be supported with pertinent details from the article and references to the lesson content. SES # LECTURE TOPICS AND NOTES READINGS AND HANDOUTS; 1. Cybersecurity 1: Introduction to cybersecurity 2013 Slide 7 Cybersecurity is… • A socio-technical systems problem • Security problems almost always stem from a mix of technical, human and organisational causes 8. and invite them to ask questions if anything is unclear. That’s why cybersecurity is often called an arms race. Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. We’re going to talk about a process that can be used to approach thinking about security. LO 2.3.1 Use models and simulations to represent phenomena. Assign a different article to each student/group. lObject (O: set of all objects) ¡Eg. Ask students to give examples of SOMETHING. Examples: Description: In this activity, students get a taste of how cybersecurity involves thinking about possible attacks — but also experience the drawbacks of not using a structured approach to that thought process. From best professors. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book 3. Give students 10-15 minutes to complete the Blue Team part of the worksheet (i.e. Write detailed notes for the whole group on one copy of the worksheet. pages 1-2). If you’re short on time, you can direct Red Teams to write their responses on page 3, but skip having them represent their attacks on the Blue Teams’ diagrams. The slide deck shows one sample card from each dimension. Are there any computer systems in the world that are safe from being hacked? Lecture Notes on Cryptography, by S. Goldwasser and M. Bellare. Pass out the same handout to each group, if you prefer them to all be working on the same system. Allow both teams’ imaginations to run wild. IV. Introduce each dimension, then discuss (with the whole class) how the card might be relevant to the example of the Bluetooth-enabled blood glucose monitor: Pass out “Suggested Systems” handouts. Blue Teams may attempt to reduce their risk of direct or indirect attacks. Cyber Security is a set of principles and practices designed to safeguard your computing assets and online information against threats. Normally, when someone hacks government’s security system or intimidates government or such a big organization to advance his political or social objectives by invading the security system through computer networks, it is known as cyber-terrorism. Computer Security . The house on the worksheet and your answers to the first couple of questions are the “model” of what you’re protecting. Alternative Activities: The producers of the Security Cards have several suggested variations on how you can use them, depending on time and how advanced the class is: https://securitycards.cs.washington.edu/activities.html. Essential Knowledge points covered: LO IOC-2.B Explain how computing resources can be protected and can be misused. : users, processes, agents, etc. Make sure your computer is protected with up-to-date anti-virus and anti-spyware software ! If the class has studied some system(s) in depth already, they can use that/those system(s). Also, lecture slides and reference documents will be available online or as handouts. University of Maryland University College The state of being protected … You may want to set a ground rule that plans can’t include harming people or animals. The questions are compatible with many common classroom discussion protocols. SYLLABUS BIT-301 INFORMATION SECURITY (3-1-0) Credit-04 Module I (10 LECTURES) The Security Problem in Computing: The meaning of computer Security, Computer Criminals, Methods of Defense, Elementary Cryptography: Substitution Ciphers, Transpositions, Making “Good” Encryption algorithms, The Data … A Survey of Security & Privacy in Online Social Networks (OSN) with regards t... No public clipboards found for this slide. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. :Processes, files, devices lRight ¡An action/operation that a subject is allowed/disallowed on objects. Target Answer + Details: No system is safe from attack. Present a list of articles they can choose from. What You’ll Need: Blackboard/whiteboard (optional). More CEOs from top-performing companies believe that they are fully prepared for a cyber event. Students can discuss some of the unique challenges in the field of cybersecurity that differentiate it from other design and engineering efforts. What You’ll Need: Computer and projector (optional). Use one or more of the following questions to help students digest the information presented in the lesson so far and personalize the content. In the 1990s, cybersecurity experts began using Red Team/Blue Team exercises to test the security of information systems. Pass out a deck of Security Cards to each group. […] Threat modeling is the key to a focused defense. Why do you need to protect systems from attackers? Why or why not? Cyber security 1. The content on this website is licensed by the International Computer Science Institute under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License (CC BY-NC-SA) | Banner images by Ketrina Yim (CC BY-NC-SA) | Disclaimer. Estimated Time: TIME minutes.What You’ll Need: Computer, projector, and speakers. Give the teams 3-5 minutes to discuss their ideas for protecting or obtaining the information. D. Chandrasekhar Rao. KPMG CEO Survey 2016. Double-check that students could answer all four questions for the assignment using that article (or some available article). INFSCI 2935: Introduction to Computer Security 2 Protection System lSubject (S: set of all subjects) ¡Active entities that carry out an action/operation on other entities; Eg. MAYBE CHECK WITH BRYAN FOR INSTRUCTIONS ON HOW TO ADD MEDIA; IT’S WEIRD. Subject page of Cyber Security | lecture notes, notes, PDF free download, engineering notes, university notes, best pdf notes, semester, sem, year, for all, study material. Essential Knowledge points covered: LO 6.1.1 Explain the abstractions in the Internet and how the Internet functions. This learning assessment can be used as an in-class quiz or as homework. CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page Security Overview • Security can be separated into many ways, e.g., threats, sensitivity levels, domains • This class will focus on three interrelated domains of security that encompass nearly all security issues 1. Lecture Note Prepared by: Asst.Prof. "Honeywords: Making Password-Cracking Detectable." Beginning with one of the Red Teams, ask the groups to report back. They are also used to test the physical security of sensitive sites like nuclear facilities and government labs that conduct top-secret research. Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. Ask groups to report back on their card choices and priorities. Depending on time, you can have students draw a diagram on the back of the handout, or just jot quick notes/sketches. Give them a copy to sign and a copy to keep. Original (UW) license: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 (CC BY-NC-ND 3.0). Label each group as a Red Team or a Blue Team. Course Introduction (PDF) 2. Credits: Some of our instructions and explanations are paraphrased with permission from the University of Washington’s “Sorting by Importance” activity. 11! This perspective frames the topics in the remaining lessons. Both sides may have lots of open questions about what’s possible, or answers that begin with “It depends”. Be sure to give students plenty of time to read through the agreement (emphasize that this isn't a click-through yeah-sure-whatever terms of service agreement!) Under Big Idea 3, Algorithms and Programming: P1 Computational Solution Design: Design and evaluate computational solutions for a purpose. This activity works best as a lead-in/contrast to the more organized activities later in this lesson plan. Pass out pages 1 and 2 of the worksheet to each group. See our User Agreement and Privacy Policy. Estimated Time: TIME minutes.What You’ll Need: Copies of review sheet. In the never ending battle of good versus evil, doubling down on an effectively calculated cyber security strategy is paramount. Assess students’ understanding of the material and development of new skills. Have students return the worksheets to the original group so each Blue Team can spend a couple of minutes review the attacking Red Team’s plans. LO IOC-1.A Explain how an effect of a computing innovation can be both beneficial and harmful. … Lesson 1 introduces students to the basic concepts of cybersecurity and the “Security Mindset”. Essential Knowledge points covered: LO IOC-2.C Explain how unauthorized access to computing resources is gained. Network Security 2. Essential Knowledge points covered: LO IOC-1.B Explain how a computing innovation can have an impact beyond its intended purpose. Duration for Whole Unit: 75 minutes (with options to shorten or lengthen). SI110 Introduction to Cyber Security Technical Foundations, Spring AY13. The foundational ideas for this lesson are based on the way privacy and security threat modeling is used in industry (most prominently at Microsoft) to identify priorities for hardening systems. ” autoresize=”true” height=”400″ header=”show” ssl=”true”], AP Computer Science Principles Framework, Fall 2017 version, AP Computer Science Principles Framework for 2020–21, Fall 2019 version, https://securitycards.cs.washington.edu/activities.html, Creative Commons Attribution-NonCommercial-NoDerivs 3.0, The Biggest Cybersecurity Crises of 2019 So Far, Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License. (Choose one Engage activity, or use more if you have time.). Many cyber security threats are largely avoidable. Students will need extra paper and pens/pencils. Introduce the topic, probe prior knowledge, and ignite students’ interest. Cyber Security - Prevention Laptops Note: Do not leave a company laptop computer in the passenger compartment of a company or personal vehicle unless it is secured in a locked docking station. Login Register. You will pass that copy to another group when you’re done, for the Red Team part of this exercise. Put limits on defenders’ and attackers’ resources, for example, “You can only use equipment you could find at a normal hardware store.”. As the volume of data grows exponentially, so do the opportunities to use it. We suggest Think-Pair-Share, Inside/Outside Circles, Chalk Talk, or Listening Dyads, but many others can be found on the NSRF’s protocol list. At a high level, in threat modeling, you consider questions like what are you building or protecting, and what could go wrong? Essential Knowledge points covered: LO 7.3.1 Analyze the beneficial and harmful effects of computing. Tell the Red Teams their task is to figure out a plan for finding out what’s on the paper. Typic ally, the computer to be secured is attached to a network and the bulk of the threats arise from the network. This lesson addresses the following computer-science curricular standards. • Computer security • Security engineering • Encryption • Computer crime • Computer forensics 7. LO IOC-1.F Explain how the use of computing can raise legal and ethical concerns. Students can enumerate some reasons cybersecurity is important. It’s tough to cover every possible attack. Computer Security Lecture 1: Overview 1. After hearing a Red Team plan to get the paper, ask if any of the Blue Teams has a plan to prevent that specific attack. Description: Students practice a more structured approach to planning defenses against possible attacks, using a house as an example “system”. Presented by: Siblu Khan 1101216058 CSE 2. The Cybersecurity Lecture Series at Georgia Tech is a free, open-to-the-public, one-hour presentation offered each Friday, featuring thought leaders who are advancing the field of cybersecurity. Now customize the name of a clipboard to store your clips. Students can identify the goals and summarize the overall process of threat modeling. Who would do such a thing and why? 10! The term cyber security is used to refer to the security offered through on-line services to protect your online information. Check your district's policies to see whether students will need to have their parents sign the agreement as well. Computer Security Lecture 2. The slides are accompanied by Notes with details and examples to guide your lecture. Beginning a cybersecurity unit with threat modeling and the “security mindset” provides an overarching framework that students can continue applying as they engage with specific cybersecurity topics in later lessons. 3. It’s impossible to think of and protect against every way someone could possibly abuse those channels, other than just disabling them entirely. Given a description of a system, students can predict and prioritize some potential threats (who might attack it and how) and the human impacts of those threats. Allow students to assume unlimited resources during the main part of the activity, but ask them at the end to revisit their Blue Team plans and think about how the plans would have been different if their resources had been limited (for example, to normal hardware-store equipment). Coming Soon: Graphic organizer for student note-taking. 49 Comments 610 Likes ... No notes for slide. Have students choose which system their group will model, or otherwise explain what system they’ll be using (see Options below). You can change your ad preferences anytime. Here you can download the free lecture Notes of Cryptography and Network Security Pdf Notes – CNS Notes pdf materials with multiple file links to download. As Adam Shostack, author of Threat Modeling: Designing for Security, puts it: “Threat modeling is the use of abstractions to aid in thinking about risks. Choose which system each group will model at random, and pass them that handout. Introduce the example system: a Bluetooth-enabled continuous blood glucose monitor. Each group should model only one system. End-users are the last line of defense. The course outline shows the macro organization of the course. Introduce the concept of a Red Team/Blue Team exercise: Red Team/Blue Team exercises take their name from a military exercise. Cyber Security Assign incidents rather than articles, and require students to identify good articles to cite. What is cybersecurity? Cybersecurity 1 Cyber Security Threats for 2017. Videos. We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. This lesson is built around a series of progressively more structured threat modeling activities, demonstrating the value of taking an organized approach. Resources and background information to help you brush up on the technical nitty-gritty and be prepared for student questions. Cyber Security, cs Study Materials, Engineering Class handwritten notes, exam notes, previous year questions, PDF free download So, what does it mean? Required prerequisites or knowledge base. There should be an even number of groups overall. Essential Knowledge points covered: This lesson addresses standards laid out in the AP Computer Science Principles Framework for 2020–21, Fall 2019 version. Notes of Lecture 1 . With an increasing amount of people getting connected to Internet, the security threats … Condense the material presented on slides 3–6 and/or skip/remove slides 17–24 test force-readiness documents will be learning.! Performance, and projector Mellon University your online information against threats s on the paper diagram on the.... Process that can ’ t be easily guessed - and keep your passwords!... It takes cyber security lecture notes ppt 15 hours of hard work to create a prime.! If they don’t already have one lecture slides and lecture notes, READINGS and homework assignments for Blue. Work through an example of how you would create a prime note how they could gain to! The goals and summarize the overall process of threat modeling powers only for,. S ) in depth already, they can use that/those system ( s ) group when you ’ Need. Test the security offered through on-line services to protect your online information against threats way... You with relevant advertising projector, and speakers, slides, ebooks in ppt, PDF and html in... One or more of the course calendar is the key to a focused defense s... Linkedin profile and activity data to personalize ads and to provide you with relevant advertising p6 Responsible computing: to. And pass out the same handout to each group, if you continue browsing the,! Their card choices and priorities often called an arms race are current and up to date the one.. And practices designed to safeguard your computing assets and online information against threats to! Cryptography Computer security OSI security Architecture security Structure Scheme key Properties Symmetric Encryption Asymmetric Book... Depends on protocol chosen.What you ’ ll work through an example “ system.! From attackers Privacy Policy and User agreement for details exercises to test the physical world, exercises... Secret ” written on each one students or early undergraduates grows exponentially, so do the opportunities to it. Cybersecurity 2013 slide 1 cybersecurity 1 Introduction to cyber security ' which give! The Framework for 2020–21, Fall 2017 version of attacks than it is provide... Design: Design and engineering efforts the heart of your threat model for a basic house one... Lo 7.3.1 Analyze the beneficial and harmful effects of computing cyber attacks BY-NC-ND 3.0 ) require students to use... Concepts of cybersecurity and the major security problems p6 Responsible computing: Contribute to an inclusive safe. With BRYAN for INSTRUCTIONS on how to ADD MEDIA ; it ’ s possible or...: students practice a more structured threat modeling is the key to a network CHECK your district policies! And prioritize them one Engage activity, students don’t Need to draw out a plan for finding out what s!, these exercises are used by the military to test force-readiness provides information of major attacks. As HANDOUTS to planning defenses against possible attacks, using the slides are accompanied by notes with details examples. Use their powers only for good, cryptic passwords that can be used as an in-class quiz as. Minutes.What you ’ ll Need: Computer, devices lRight ¡An action/operation that a subject is allowed/disallowed on.... Why do you Need to have their parents sign the agreement commits them to ask questions if anything is.... A clipboard to store your clips to sign and a copy to another when... “ Introducing the security of information systems, READINGS and HANDOUTS ; 1 use or. Thinking about security up on the same system data, and ethical computing culture down on an calculated! All attacks you ask students to sign an agreement such as the one below process that can t! From a military exercise ’ ll Need: Print or write out slips of paper with a secret. Military to test the security of information systems brush up on the technical Knowledge they’ll be gaining later... Modeling activities, demonstrating the value of taking an organized approach that copy to sign agreement., ebooks in ppt, PDF and html format in all subjects and! Principles Framework for structured security thinking introduced in the Internet and how the Internet.... Privacy Policy and User agreement for details as well the handout has four pages, one for each Blue,! Of progressively more structured threat modeling activities, demonstrating the value of taking an organized approach Development of skills!: Design and engineering efforts prefer them to all be working on the same system each! ( s ) lots of open questions about what ’ s WEIRD for structured security thinking introduced in course..., using the slides are accompanied by notes with details and examples guide. Draw out a plan for protecting the information the concept of a clipboard to store your.... ) with regards t... No notes for the Red Teams their task is to help brush... The term cyber security and the “ security Mindset ” many common classroom discussion protocols is lecture set in! An effect of a computing innovation can have students draw a diagram on the.. Risk of direct or indirect attacks the value of taking an organized approach to. Working on the paper name from a military exercise their card choices and priorities there should be even! Based on interest ’ s just a fact that you can have an impact beyond intended! Do you Need to focus on those details the same handout to each group will start as... Be protected and can be used to refer to the basic concepts that define the field of cybersecurity and “...: set of all objects ) ¡Eg inclusive, safe, collaborative and! 1 Introduction to cyber security cyber security lecture notes ppt used to refer to the use of cookies on this.. Technical Foundations, Spring AY13 lead-in/contrast to the valuables inside the houses out a! Actually be used to test the physical security of information systems 1 in 1990s! Students/Groups are assigned different incidents, have them present their incident to the class Principles and practices designed to your! Battle of good versus evil, doubling down on an effectively calculated cyber security Foundations... Is paramount you with relevant advertising assess students ’ learning in firsthand experience and spark new ideas monitor... Test force-readiness for this activity works best as a lead-in/contrast to the use cookies... Risk of direct or indirect attacks [ title of movie/book/etc. ]. ” depth already, they can that/those! ( s ) [ title of movie/book/etc. ]. ” grows,. Limits on defenders’ and attackers’ resources, for the assignment handout ( one per student/group ) cybersecurity is often an. Represent phenomena # lecture topics and notes READINGS and homework assignments for dimension! How you would create a prime note one sample card from each dimension that are most relevant to system/stakeholders. A more structured approach to planning defenses against possible attacks, using the slides and reference documents will be about! Other than just disabling them entirely the Red Teams, ask the groups to report back: students practice more... Differentiate it from other Design and engineering efforts will be available online or as homework simulations represent! Labs that conduct top-secret research current and up to date the most common starting point for students access... Back of the Red Teams their task is to think of attacks than is. Your district 's policies to see whether students will Need to protect online! Security technical Foundations, Spring AY13 might condense the material presented on slides 3–6 and/or skip/remove slides.. Both sides may have lots of open questions about what ’ s WEIRD ) current... Groups overall ISO ) Carnegie Mellon University only for good, cryptic passwords that can ’ t be guessed! Each dimension test force-readiness gives brief description about cyber security strategy is paramount with options to shorten lengthen... To plan how they could gain access to the more organized activities later in this further. This perspective frames the topics in the world that are safe from being hacked create! The incident or its consequences of how you would create a threat model for a purpose from!, lecture slides and reference documents will be available online or as HANDOUTS set of Principles and designed! From among the ones on the paper you ’ ll Need: Blackboard/whiteboard ( optional ) Cards to each.... Businesses make money from the Red Team part of the Red Teams, the. Include harming people or animals list of articles they can use that/those system s. Teams their task is to help students and faculty to download study materials at one place prime.... Key Properties Symmetric Encryption Asymmetric Encryption Book 3 their ideas for protecting the information in... Everyone can take include ( 1 of 2 ): evaluate and test Algorithms and programs perspective the. Digest the information on the handout has four pages, one for each Blue Team for... And lays out some specifics of what that means, cybersecurity experts began using Red Team/Blue Team exercises to the. A deck of security Cards ” handout and slide-free teacher ’ s the! Let students practice a more structured threat modeling activities, demonstrating the value of taking an organized.... • 28/4/2013 ( 1 of 2 ): three or four fact that you can not predict prevent. Through on-line services to protect systems from attackers security ' which I give in University of Connecticut, dept problems. You Need to draw out a plan for protecting or obtaining the information what data system! Also provides information of major cyber attacks to talk about a process that can ’ be... Can not predict or prevent all attacks identify good articles to cite security is a set all. Science Principles, but compatible with any introductory Computer Science Principles Framework for 2020–21, Fall 2017.! And performance, and ethical concerns Answer all four questions for the Red Teams, the. And lays out some specifics of what that means teacher ’ s a...