|
|
|
Teach Cyber Byte
In this byte we look at cybersecurity and its relationship to risk. Then we take a dive into the updated Unit 7. You'll also find a couple of reminders 1) about the Cisco Networking Academy and 2) about the TC Virtual Lounge. Also, there is an opportunity for your students to join the PowerUp Cyber Games! We hope you get involved with these opportunities!
|
If you enjoyed this Byte and know someone else that would, please feel free to forward and share our newsletter! (Please note: if you forward this to someone else and they click "unsubscribe," you may be unsubscribed from the mailing list.)
|
|
|
|
|
What does cybersecurity mean to you?
|
Cybersecurity includes protection, but is not limited to it. Threats, vulnerabilities, and attacks must be considered.
|
|
In a recent discussion with teachers, we heard the following responses:
- Protecting personal information, data and the systems that store, process, and transmit that data
- Detecting an unwelcome intrusion in the network
- Responding in an effort to contain attacks, repair holes, and recover normal operating status
- Securing hardware, software, information/data, and hardening networks/system
|
|
|
Two questions to consider when thinking about what cybersecurity means are:
|
|
- How much risk can be tolerated?
- How much risk can be afforded?
|
|
|
Cybersecurity does involve protection, but not everything can be protected.
|
We have to make choices on what to
|
- risk
- reduce
- mitigate
- control
- accept
- avoid
- transfer
|
|
|
Risk is one of the 8 Big Ideas of Cybersecurity.
|
|
If you haven't check out the guideline, we invite you to do so!
|
You can download the guidelines here.
|
|
|
|
|
According to the HSCCG, risk is defined as:
|
a measure of the potential damage or loss a vulnerability could cause weighed against the likelihood an adversary will exploit the vulnerability.
|
|
|
|
|
If you are interested in learning more about Risk, check out the Teach Cyber courseware, Unit 7!
|
|
|
Unit 7 covers Threats, Vulnerabilities, and Attacks.
|
Your students will discover threat modeling, and identifies threat sources.
|
The unit explains how to think about the threat source in terms of resources, capabilities, motivations and aversion to risk.
|
|
Big Ideas covered in Unit 7 are:
|
- Ethics
- Adversarial Thinking
- Risk
|
|
|
Unit 7 pivots to the attack kill chain and students explore a few historic threat sources using the kill chain.
|
|
|
|
How will students learn to make choices about Risk?
|
|
|
Your students will use the risk assessment matrix to determine a risk level.
|
|
|
|
To see Unit 7 in its entirety, sign up at teachcyber.org to download it, along with all the units!
|
|
|
|
|
REMINDER: Enroll in a Cisco Networking Academy Class!
|
|
|
Do you want to learn more about cybersecurity?
|
|
|
Join 60+ teachers who have already enrolled in one of the four free, self-paced cybersecurity classes. Cybersecurity Basics is the most popular.
|
Which course is right for you?
|
|
|
|
- Cybersecurity Basics (15 Hours)
- Introduction to Packet Tracer (10 Hours)
|
- Cybersecurity Essentials (30 Hours)
- Networking Essentials (70 Hours)
|
|
|
To learn more about each course and register visit the Teach Cyber Cisco Networking Academy page here.
|
|
|
REMINDER: TC Virtual Lounge is today!
Come hear Ben Crenshaw give his analysis for cybersecurity education tools focusing on cyber ranges and virtualization.
|
We are looking forward to seeing you in the TC Virtual Lounge today, Thursday, February 24 at 7pm (ET).
|
|
|
|
|
|
Need a cybersecurity competition for your students?
|
Check out the Cyber PowerUp Cyber Games
|
|
|
CyberUp hosts the PowerUp Cyber Games.
|
This is an opportunity for your students to compete in cybersecurity games. Registration for this competition begins in August 2022 and the games take place October 2022 through April 2023.
|
Please direct your questions about this competition to powerup@wecyberup.org
|
|
|
|
For more information, you can read more about the CyberUp Games here.
|
|
|
|
This program is for middle and high school students to participate in competitions where they solve computer security problems while capturing and defending computer systems.
|
|
PowerUP introduces students to the skills that are directly related to skills they need for industry certification.
|
|
CyberUp is a non-profit organization who is committed to cultivating the cybersecurity talent pipeline. You can check out their website here.
|
|
|
|
|