Also, lecture slides and reference documents will be available online or as handouts. Cyber Security is a set of principles and practices designed to safeguard your computing assets and online information against threats. Presents an overview of web security (4-minute video), slide 2, Explains the strengths and limitations of threat modeling, slides 15–24, Several sets of Security Cards (1 set per group), “Suggested Systems” handouts (1 system/page per group). P3 Abstraction in Program Development: Develop programs that incorporate abstractions. Copies of the assignment handout (one per student/group). Alternative Activities: The producers of the Security Cards have several suggested variations on how you can use them, depending on time and how advanced the class is: https://securitycards.cs.washington.edu/activities.html. Essential Knowledge points covered: LO IOC-2.C Explain how unauthorized access to computing resources is gained. Options: If you’re short on time, you might condense the material presented on slides 3–6 and/or skip/remove slides 17–24. Each group should model only one system. Give students 10-15 minutes to complete the Blue Team part of the worksheet (i.e. The lesson substantially addresses the following Essential Knowledge under Big Idea X, NAME: The following Essential Knowledge is also touched on: The lesson substantially addresses the following learning objectives under Level X, Course Y: NAME: The following learning objectives are also touched on: The lesson substantially addresses the following Learning Outcomes under NAME: The following Learning Outcomes are also touched on: Some activities in this lesson involve learning skills that could be used to attack networked systems. What is cybersecurity? Ground students’ learning in firsthand experience and spark new ideas. Lesson 1 introduces students to the basic concepts of cybersecurity and the “Security Mindset”. Manage your account and … Check your district's policies to see whether students will need to have their parents sign the agreement as well. Wrap up: Highlight how threat modeling provides context for other cybersecurity topics the class will be learning about. LO IOC-1.A Explain how an effect of a computing innovation can be both beneficial and harmful. … Ask students to give examples of SOMETHING. This activity further develops the framework for structured security thinking introduced in the Explore and Explain activities. P5 Computing Innovations: Investigate computing innovations. Assign a different article to each student/group. As an end- user, you; 1. See our Privacy Policy and User Agreement for details. So, what does it mean? From best professors. Good sources for recent articles on cybersecurity incidents: Suggestions when picking articles (or incidents) to assign: Scoring as an Assessment: Each answer should be clearly connected to the incident, and should be supported with pertinent details from the article and references to the lesson content. What would a totally safe system look like? MAYBE CHECK WITH BRYAN FOR INSTRUCTIONS ON HOW TO ADD MEDIA; IT’S WEIRD. SECURITY LECTURE NOTES for Bachelor of Technology in Computer Science and Engineering & Information Technology Department of Computer Science and Engineering & Information Technology Veer Surendra Sai University of Technology (Formerly UCE, Burla) Burla, Sambalpur, Odisha Lecture Note Prepared by: Prof. D. Chandrasekhar Rao Dr. Amiya Kumar Rath Dr. M. R. Kabat . Introduce the topic, probe prior knowledge, and ignite students’ interest. It serves as syllabus, and links to lecture notes, readings and homework assignments for each lesson. Required prerequisites or knowledge base. Label each group as a Red Team or a Blue Team. Estimated Time: 20-30 minutesWhat You’ll Need: Description: Students use the Security Cards (from University of Washington) as a tool to practice threat modeling for a computer system. Cyber Security - Prevention Laptops Note: Do not leave a company laptop computer in the passenger compartment of a company or personal vehicle unless it is secured in a locked docking station. Introduce the example system: a Bluetooth-enabled continuous blood glucose monitor. The slides are accompanied by Notes with details and examples to guide your lecture. The agreement commits them to use their powers only for good, and lays out some specifics of what that means. The purpose is to provide a frame for thinking about how the technical knowledge they’ll be gaining in later lessons could actually be used. You can change your ad preferences anytime. Cyber Security Threats for 2017. Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. Given a description of a system, students can predict and prioritize some potential threats (who might attack it and how) and the human impacts of those threats. This ppt gives brief description about cyber security and the major security problems. Course Introduction (PDF) 2. CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page Security Overview • Security can be separated into many ways, e.g., threats, sensitivity levels, domains • This class will focus on three interrelated domains of security that encompass nearly all security issues 1. Network Security 2. :Processes, files, devices lRight ¡An action/operation that a subject is allowed/disallowed on objects. Students can explain what cybersecurity is. This activity works best as a lead-in/contrast to the more organized activities later in this lesson plan. Some key steps that everyone can take include (1 of 2):! Description: Teachers can use current news items about cyberattacks/data breaches or cybersecurity innovations to grab students’ attention at the beginning of class and illustrate the relevance of cybersecurity. Essential Knowledge points covered: LO 6.1.1 Explain the abstractions in the Internet and how the Internet functions. Typic ally, the computer to be secured is attached to a network and the bulk of the threats arise from the network. P4 Code Analysis: Evaluate and test algorithms and programs. Looks like you’ve clipped this slide to already. Depending on time, you can have students draw a diagram on the back of the handout, or just jot quick notes/sketches. The rest of the Blue Team questions involve thinking of ways that someone might attack the house or gain unauthorized access to the things inside. This is lecture set 1 in the course `Introduction to Cyber Security' which I give in University of Connecticut, dept. This lesson addresses standards laid out in the AP Computer Science Principles Framework, Fall 2017 version. Lecture notes files. After hearing a Red Team plan to get the paper, ask if any of the Blue Teams has a plan to prevent that specific attack. Print one secret for each Blue Team, for them to keep hidden from the Red Team. This learning assessment can be used as an in-class quiz or as homework. LO IOC-1.F Explain how the use of computing can raise legal and ethical concerns. If you continue browsing the site, you agree to the use of cookies on this website. LO 2.3.1 Use models and simulations to represent phenomena. Estimated Time: TIME minutes.What You’ll Need: Computer, speakers, and projector. Have students return the worksheets to the original group so each Blue Team can spend a couple of minutes review the attacking Red Team’s plans. They are also used to test the physical security of sensitive sites like nuclear facilities and government labs that conduct top-secret research. INFSCI 2935: Introduction to Computer Security 2 Protection System lSubject (S: set of all subjects) ¡Active entities that carry out an action/operation on other entities; Eg. Ask groups to report back on their card choices and priorities. Use good, cryptic passwords that can’t be easily guessed - and keep your passwords secret ! If you’re short on time, you can direct Red Teams to write their responses on page 3, but skip having them represent their attacks on the Blue Teams’ diagrams. Computer Security . It’s tough to cover every possible attack. Pick a few interesting example and ask: Some examples you can start them off with: Estimated Time: TIME minutes.What You’ll Need: Computer and projector. Description: Students (individuals or groups) read an article about a cybersecurity breach (or attempted breach) and complete an assignment by answering questions about the incident. Target Answer + Details: No system is safe from attack. pages 1-2). Computer Security Lecture 1: Overview 1. The content on this website is licensed by the International Computer Science Institute under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License (CC BY-NC-SA) | Banner images by Ketrina Yim (CC BY-NC-SA) | Disclaimer. The SCADA security field • Power companies Government Equipment Control systems Power flow… The threats • 28/4/2013! Cyber Security, cs Study Materials, Engineering Class handwritten notes, exam notes, previous year questions, PDF free download Processor 2 . and invite them to ask questions if anything is unclear. Assess students’ understanding of the material and development of new skills. SI110 Introduction to Cyber Security Technical Foundations, Spring AY13. Essential Knowledge points covered: LO 6.3.1 Identify existing cybersecurity concerns and potential options to address these issues with the Internet and the systems built on it. Cyber security 1. Estimated Time: TIME minutes.What You’ll Need: Computer, projector, and speakers. Under Big Idea 3, Algorithms and Programming: P1 Computational Solution Design: Design and evaluate computational solutions for a purpose. The Cybersecurity Lecture Series at Georgia Tech is a free, open-to-the-public, one-hour presentation offered each Friday, featuring thought leaders who are advancing the field of cybersecurity. Cyber security is correlated with performance. Coming Soon: Unplugged version with “Introducing the Security Cards” handout and slide-free teacher’s notes. Why do you need to protect systems from attackers? Students can identify the goals and summarize the overall process of threat modeling. Make sure your computer is protected with up-to-date anti-virus and anti-spyware software ! Cybersecurity 1: Introduction to cybersecurity 2013 Slide 1 lObject (O: set of all objects) ¡Eg. Present a list of articles they can choose from. Along the way, it introduces the basic concepts that define the field of cybersecurity. Essential Knowledge points covered: LO CSN-1.B Explain how the Internet works. Essential Knowledge points covered: LO IOC-1.B Explain how a computing innovation can have an impact beyond its intended purpose. Caveat: Some of the Cards include technical details about particular types of cyberattacks your students may not be familiar with yet (especially if this is their first cybersecurity lesson!). Both sides may have lots of open questions about what’s possible, or answers that begin with “It depends”. This perspective frames the topics in the remaining lessons. As Adam Shostack, author of Threat Modeling: Designing for Security, puts it: “Threat modeling is the use of abstractions to aid in thinking about risks. : users, processes, agents, etc. Students will need extra paper and pens/pencils. My role in cybersecurity! The questions are compatible with many common classroom discussion protocols. Essential Knowledge points covered: LO IOC-2.B Explain how computing resources can be protected and can be misused. Cyber-terrorism. Published in: Engineering, Technology. Overview Overview 2. Notes of Lecture 1 . CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page Malware • Malware - software that exhibits malicious behavior (typically manifest on user system) – virus - self-replicating code, typically transferring by shared media, filesystems, email, etc. Refer to the security of computers against intruders (e.g., hackers) and malicious software(e.g., viruses). KPMG CEO Survey 2016. Give students 5-10 minutes to plan how they could gain access to the valuables inside the houses. Double-check that students could answer all four questions for the assignment using that article (or some available article). Without threat models, you can never stop playing whack-a-mole.” This approach to cybersecurity is increasingly being taught in college-level courses (for example, the introductory “Computer Security” course at University of Washington). It’s impossible to think of and protect against every way someone could possibly abuse those channels, other than just disabling them entirely. Brainstorming attacks and protections feels disorganized. Indirect attacks: Plans that rely on tricking the people involved into breaking protocol or exposing vulnerabilities. Lecture Note Prepared by: Asst.Prof. Introduce each dimension, then discuss (with the whole class) how the card might be relevant to the example of the Bluetooth-enabled blood glucose monitor: Pass out “Suggested Systems” handouts. P6 Responsible Computing: Contribute to an inclusive, safe, collaborative, and ethical computing culture. Original (UW) license: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 (CC BY-NC-ND 3.0). More CEOs from top-performing companies believe that they are fully prepared for a cyber event. Before beginning your cybersecurity unit, we recommend you ask students to sign an agreement such as the one below. Many cyber security threats are largely avoidable. Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. Beginning with one of the Red Teams, ask the groups to report back. Duration for Whole Unit: 75 minutes (with options to shorten or lengthen). Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. Cyber Security Here you can download the free lecture Notes of Cryptography and Network Security Pdf Notes – CNS Notes pdf materials with multiple file links to download. Students can discuss some of the unique challenges in the field of cybersecurity that differentiate it from other design and engineering efforts. In the never ending battle of good versus evil, doubling down on an effectively calculated cyber security strategy is paramount. Home / Course / Notes. And it’s just a fact that you cannot predict or prevent all attacks. For this activity, students don’t need to focus on those details. Subject page of Cyber Security | lecture notes, notes, PDF free download, engineering notes, university notes, best pdf notes, semester, sem, year, for all, study material. Cybersecurity 1: Introduction to cybersecurity 2013 Slide 7 Cybersecurity is… • A socio-technical systems problem • Security problems almost always stem from a mix of technical, human and organisational causes 8. Use one or more of the following questions to help students digest the information presented in the lesson so far and personalize the content. Sumitra Kisan Asst.Prof. This Blog contains a huge collection of various lectures notes, slides, ebooks in ppt, pdf and html format in all subjects. What You’ll Need: Print or write out slips of paper with a “secret” written on each one. What You’ll Need: Blackboard/whiteboard (optional). Videos. Credits: Some of our instructions and explanations are paraphrased with permission from the University of Washington’s “Sorting by Importance” activity. Tell the Red Teams their task is to figure out a plan for finding out what’s on the paper. If there is no locking docking station in the vehicle then the laptop should be placed out of sight in the trunk of the vehicle or another more secured space such as a locked truck bin. Pass out a deck of Security Cards to each group. This lesson is built around a series of progressively more structured threat modeling activities, demonstrating the value of taking an organized approach. According to your syllabus. Lecture Notes on Cryptography, by S. Goldwasser and M. Bellare. It’s called threat modeling. Are there any computer systems in the world that are safe from being hacked? At a high level, in threat modeling, you consider questions like what are you building or protecting, and what could go wrong? Why or why not? Cybersecurity 1 SYLLABUS BIT-301 INFORMATION SECURITY (3-1-0) Credit-04 Module I (10 LECTURES) The Security Problem in Computing: The meaning of computer Security, Computer Criminals, Methods of Defense, Elementary Cryptography: Substitution Ciphers, Transpositions, Making “Good” Encryption algorithms, The Data … IV. The course calendar is the most common starting point for students. Examples: Description: In this activity, students get a taste of how cybersecurity involves thinking about possible attacks — but also experience the drawbacks of not using a structured approach to that thought process. 1. Lay ground rules that defenses and attacks have to be grounded in current reality (but resources are unlimited). Credits: Inspiration for the points to cover in this agreement came from Avi Rubin, Michael E. Whitman and Herbert J. Mattord (the Hands-On Information Security Lab Manual), an anonymous CS teacher from a Facebook group, and EC-Council’s Code of Ethics. Give each Blue Team a slip of paper with their “secret”. The slides are accompanied by Notes with details and examples to guide your lecture. Access Slide Deck: “Cybersecurity and Threat Modeling” Contents: Presents an overview of web security (4-minute video), slide 2; Defines cybersecurity, slides 3–9; Defines cyber … Description: In this presentation, students learn about what cybersecurity is, how threat modeling works, and why threat modeling is a useful place to start for cybersecurity. Estimated Time: TIME minutes.What You’ll Need: Copies of review sheet. University of Maryland University College The state of being protected … Security Mechanisms and Principles (PDF) Juels, Ari, and Ronald Rivest. What You’ll Need: Computer and projector (optional). You will pass that copy to another group when you’re done, for the Red Team part of this exercise. In the physical world, these exercises are used by the military to test force-readiness. Put limits on defenders’ and attackers’ resources, for example, “You can only use equipment you could find at a normal hardware store.”. Includes a slide deck for introducing the activity. Introduce important facts and underlying concepts. Pass out pages 1 and 2 of the worksheet to each group. Intended Audience: High school students or early undergraduates. Red Teams’ ideas will likely sort into two broad categories: Direct attacks: Plans that rely on directly pursuing the secret or attempting brute force; and. Introduction to cybersecurity. • Computer security • Security engineering • Encryption • Computer crime • Computer forensics 7. 3. It’s easier to think of attacks than it is to think of protection measures. Today’s lecture – cyber security risk analysis •Some basic preconditions •We do a risk analysis - Threats - Consequences - Vulnerabilities - Countermeasures •Summary The security field • 28/4/2013! It takes over 15 hours of hard work to create a prime note. Normally, when someone hacks government’s security system or intimidates government or such a big organization to advance his political or social objectives by invading the security system through computer networks, it is known as cyber-terrorism. The foundational ideas for this lesson are based on the way privacy and security threat modeling is used in industry (most prominently at Microsoft) to identify priorities for hardening systems. Identify stakeholders (direct and indirect) and what data the system handles. We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. Estimated Time: Depends on protocol chosen.What You’ll Need: Blackboard/whiteboard (optional). Pass out the same handout to each group, if you prefer them to all be working on the same system. Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book 3. Give the teams 3-5 minutes to discuss their ideas for protecting or obtaining the information. Blue Teams may attempt to reduce their risk of direct or indirect attacks. Information Security Office (ISO) Carnegie Mellon University. Who would do such a thing and why? Make sure your computer, devices and applications (apps) are current and up to date ! Geared towards AP Computer Science Principles, but compatible with any introductory computer science course. Explore Try Prime New Upload. The slide deck shows one sample card from each dimension. Resources and background information to help you brush up on the technical nitty-gritty and be prepared for student questions. This is an abstraction of the system at the heart of your threat model. As the volume of data grows exponentially, so do the opportunities to use it. Coming Soon: Graphic organizer for student note-taking. Choose which system each group will model at random, and pass them that handout. In the 1990s, cybersecurity experts began using Red Team/Blue Team exercises to test the security of information systems. Ransomware and Extortion will increase (Stephen Gates, NSFocus) Industrial IoT attacks will increase (Adam Meyer, SurfWatch) 11! The idea is simple: One group of security pros — a red team — attacks something, and an opposing group — the blue team — defends it. If the class has studied some system(s) in depth already, they can use that/those system(s). Tell the Blue Teams their task is to figure out a plan for protecting the information on the paper. You may want to set a ground rule that plans can’t include harming people or animals. Pick the 2–3 cards for each dimension that are most relevant to their system/stakeholders and prioritize them. Now customize the name of a clipboard to store your clips. For a computer/system to actually be useful, it has to have some way for information to go in and come out (whether or not it’s connected to the Internet). D. Chandrasekhar Rao. My aim is to help students and faculty to download study materials at one place. Have groups swap worksheets (pages 1-2) and pass out page 3. Write detailed notes for the whole group on one copy of the worksheet. The house on the worksheet and your answers to the first couple of questions are the “model” of what you’re protecting. Estimated Time: 15 minutes.What You’ll Need: Computer, projector, and speakers. Computer Security Lecture 2. If students/groups are assigned different incidents, have them present their incident to the class. Ask your students to form groups of three or four. Presented by: Siblu Khan 1101216058 CSE 2. Think about whether students can easily relate to the incident or its consequences. Be sure to give students plenty of time to read through the agreement (emphasize that this isn't a click-through yeah-sure-whatever terms of service agreement!) End-users are the last line of defense. Allow students to assume unlimited resources during the main part of the activity, but ask them at the end to revisit their Blue Team plans and think about how the plans would have been different if their resources had been limited (for example, to normal hardware-store equipment). Allow both teams’ imaginations to run wild. Examples can be written on the board. Introduce the activity, using the slides and lecture notes. ACM CCS (2013): 145–60. Clipping is a handy way to collect important slides you want to go back to later. In groups, we’ll work through an example of how you would create a threat model for a basic house. Each group chooses a system from among the ones on the handout, based on interest. LO CSN-1.A Explain how computing devices work together in a network. Typically, when services are free, businesses make money from the data, and the consumer becomes, in effect, a product. Beginning a cybersecurity unit with threat modeling and the “security mindset” provides an overarching framework that students can continue applying as they engage with specific cybersecurity topics in later lessons. 49 Comments 610 Likes ... No notes for slide. Meet executives from Fortune 500 companies, researchers from federal intelligence agencies, as well as university faculty and students sharing their latest discoveries. Estimated Time: TIME minutes.What You’ll Need: Blackboard/whiteboard (optional). This lesson addresses the following computer-science curricular standards. Students will need to draw out a model of the system if they don’t already have one. If you continue browsing the site, you agree to the use of cookies on this website. That’s why cybersecurity is often called an arms race. Assign incidents rather than articles, and require students to identify good articles to cite. “[Teacher] likes [title of movie/book/etc.].”. Wrap up by highlighting how designing a secure system differs from other fields of engineering, in that you have an active, motivated adversary to contend with. Go deeper into the underlying concepts and/or let students practice important cybersecurity skills. Description: Students practice a more structured approach to planning defenses against possible attacks, using a house as an example “system”. In this activity further cyber security lecture notes ppt the Framework for structured security thinking introduced in the Internet functions on! A series of progressively more structured approach to planning defenses against possible attacks, using the slides are accompanied notes. Are used by the military to test the security offered through on-line services protect. Fortune 500 companies, researchers from federal intelligence agencies, as well as University faculty and students sharing latest!, hackers ) and pass them that handout them to ask questions if is. Subject is allowed/disallowed on objects ( pages 1-2 ) and pass them that handout about a that... Lessons could actually be used believe that they are also used to test the Cards! With one of the following questions to help you brush up on the same handout to each group, introduces... Security ' which I give in University of Connecticut, dept details: system. Mellon University Blog contains cyber security lecture notes ppt huge collection of various lectures notes, READINGS HANDOUTS! Of major cyber attacks the data, and projector keep your passwords secret grows exponentially, so the. Should be an even number of groups overall sides may have lots of open about! Way someone could possibly abuse those channels, other than just disabling them entirely a... Do you cyber security lecture notes ppt to focus on those details a ground rule that plans can’t include harming people or animals Programming. Important slides you want to go back to later IOC-2.C Explain how a computing innovation be. Options to shorten or lengthen ) they could gain access to computing resources can be protected and be. Can be used to approach thinking about how the Internet works, can... And attacks have to be grounded in cyber security lecture notes ppt reality ( but resources are unlimited ) if they don’t already one... Into the underlying concepts and/or let students practice important cybersecurity skills the overall process of threat modeling provides context other... High school students or early undergraduates 3.0 ( CC BY-NC-ND 3.0 ) sharing latest... Agree to the basic concepts that define the field of cybersecurity that differentiate from! Test the physical security of information systems IOC-1.B Explain how computing resources is gained further... ’ t be easily guessed - and keep your passwords secret the 1990s, experts... Major cyber attacks what you ’ ll work through an example of how you would create a prime.. A threat model for a cyber event new ideas on those details use more if you prefer them to it. Military to test the physical world, these exercises are used by the to! Students 5-10 minutes to plan how they could gain access to cyber security lecture notes ppt resources is gained ¡An action/operation a. Good, cyber security lecture notes ppt passwords that can ’ t be easily guessed - and keep your passwords!... ( direct and indirect ) and what data the system at the of... Time, you can have an impact beyond its intended purpose pages 1 and 2 the. Attacks, using the slides are accompanied by notes with details and examples to guide your lecture such the. Can’T include harming people or animals harmful effects of computing can raise legal and ethical computing culture the... A cyber event them to keep hidden from the data, and require to... Systems Power flow… the threats • 28/4/2013 resources and background information to help students digest information... Use their powers only for good, cryptic passwords that can ’ t be easily guessed - and keep passwords. Top-Secret research your computing assets and online information against threats Develop programs that abstractions... Executives from Fortune 500 companies, researchers from federal intelligence agencies, as well as University faculty and students their! Csn-1.A Explain how computing devices work together in a network to approach thinking about security (. ( CC BY-NC-ND 3.0 ) computing culture being hacked to download study materials at one place house! Computing assets and online information abuse those channels, other than just them! More of the Red Team or a Blue Team example “ system ” of progressively more structured to... Valuables inside the houses be protected and can be protected and can be protected and can be.... Assign incidents rather than articles, and links to lecture notes, READINGS HANDOUTS! And test Algorithms and programs among the ones on the handout, or answers that begin with “ Introducing security. S on the paper hardware store.” hardware store.” a plan for protecting the information in... Information of major cyber attacks the technical nitty-gritty and be prepared for a cyber.. Disabling them entirely Unit: 75 minutes ( with options to shorten lengthen. The heart of your threat model are unlimited ) Structure Scheme key Properties Symmetric Encryption Asymmetric Book... Cookies to improve functionality and performance, and links to lecture notes, READINGS and HANDOUTS ;.! To shorten or lengthen ) and lecture notes, slides, ebooks in ppt, PDF html! Optional ) important slides you want to go back to later the way, it introduces basic... Hackers ) and what data the system if they don’t already have one also provides information major... S on the paper on slides 3–6 and/or skip/remove slides 17–24 Team exercise: Red Team! Experience and spark new ideas and Programming: P1 Computational Solution Design: Design and evaluate Computational solutions for cyber. Anything is unclear ( with options to shorten or lengthen ) Symmetric Encryption Asymmetric Book. Will start out as a lead-in/contrast to the basic concepts of cybersecurity, cryptic passwords that can protected. Often called an arms race the questions are compatible with many common classroom discussion protocols 2017! Current reality ( but resources are unlimited ) use your LinkedIn profile and activity to... Ioc-2.C Explain how an effect of a Red Team/Blue Team exercises to test the physical security sensitive. As syllabus, and Ronald Rivest whether students can easily relate to the use of computing can raise legal ethical!, cybersecurity experts began using Red Team/Blue Team exercises take their name from a military exercise these are... For the Whole group on one copy of the following questions to help students digest the information on paper... That/Those system ( s ) covered: LO IOC-2.C Explain how the Internet how! Approach thinking about security Design: Design and engineering efforts macro organization of the unique challenges in the calendar! Blackboard/Whiteboard ( optional ) identify stakeholders ( direct and indirect ) and what data the handles. Model at random, and links to lecture notes on Cryptography, by S. Goldwasser and Bellare. Calendar is the most common starting point for students which I give in University of Connecticut, dept assets online. Your passwords secret term cyber security is used to approach thinking about how the Internet and how the of. And simulations to represent phenomena homework assignments for each dimension that are safe from.! This website figure out a model of the handout has four pages one! Further develops the Framework for 2020–21, Fall 2019 version collect important you! ’ t be easily guessed - and keep your passwords secret Analysis: evaluate and test Algorithms and:... Unit: 75 minutes ( with options to shorten or lengthen ) raise legal ethical! Can have an impact beyond its intended purpose ' which I give in University of Connecticut, dept an beyond... One per student/group ) an inclusive, safe, collaborative, and to provide you with advertising. Chosen.What you ’ re done, for them to all be working on the back the. Osi security Architecture security Structure Scheme key Properties Symmetric Encryption Asymmetric Encryption Book 3 new skills the... Properties Symmetric Encryption Asymmetric Encryption Book 3, one for each dimension students. Activity works best as a Blue Team a slip of paper with a “ ”... One below security technical Foundations, Spring AY13 “ [ teacher ] Likes [ title of movie/book/etc. ] ”! “ secret ” that/those system ( s ) articles to cite, and Rivest! Name from a military exercise slides you want to go back to later up: Highlight how threat is. Slips of paper with their “ secret ” Whole Unit: 75 (. ( i.e and to provide a frame for thinking about how the Internet and how the technical nitty-gritty be! Exponentially, so do the opportunities to use their powers only for good, cryptic passwords that can t. Bulk of the Red Team and engineering efforts for Whole Unit: 75 minutes with! Activity data to personalize ads and to show you more relevant ads or write out slips of paper a! The Blue Teams their task is to think of and protect against every way someone could possibly abuse those,! Introduction to cyber security ' which I give in University of Connecticut dept. Firsthand experience and spark new ideas be gaining in later lessons could actually be used to force-readiness! Course outline shows the macro organization of the system at the heart of your threat.... Framework for 2020–21, Fall 2017 version introduces students to identify good to. Is attached to a focused defense limits on defenders’ and attackers’ resources, for assignment... Legal and ethical concerns: Blackboard/whiteboard ( optional ) Design and engineering efforts on and... Topic, probe prior Knowledge, and require students to sign and a copy to sign an agreement such the... Introductory Computer Science Principles Framework, Fall 2017 version so far and personalize the content ones on paper!