“Intro to the Challenge of Cybersecurity – Unit 2 – Lesson 6”

Unit 2 – Lesson 6 – “Risk” (Version 1.3)

2 Days

This is the final lesson in Unit 2. After exploring attacks, vulnerabilities, threats, control measures, and trust, students will develop an understanding of cyber risk. A system is said to be trusted if it functions how it was intended to function and only how it was intended to function. The lesson introduces the idea that trust needs to be considered when specifying the functionality desired, when building the system according to the specifications, and then when implementing the system.

Cybersecurity also involves identifying security risks, determining their severity, implementing safeguards, monitoring, and being prepared to act. Risk assessment is this very process of identifying risks, determining the magnitude, and implementing the safeguards. These topics are discussed.