“Intro to the Challenge of Cybersecurity – Unit 6”

Unit 6 – “Security is Not Free”

8 Days

The sixth unit looks at how economics shapes cybersecurity decisions in the United States of designers (hardware, software, network technology and service providers), businesses and entities that rely on cyberspace for some-most-all of their operation (manufacturing, energy, food and agriculture, emergency services, financial services, transportation, etc.), and consumers (the end user who is the cyberspace citizen). Students identify key stakeholders and understand their motivations and interests in cybersecurity decisions. The consequences of competing interests, the costs of malicious cyber attacks, and the impact to the economy when cybersecurity is not prioritized are explored in this unit.

 

 

“Intro to the Challenge of Cybersecurity – Unit 6 – Lesson 2”

Who bears the cost?

3 days

After examining the roles and interests of stakeholders, this lesson delves deeper into costs. It begins with a comparison of a global pandemic to a global cybersecurity incident. The information is drawn from The Solarium Commission White Paper “Cybersecurity Lessons from the Pandemic.” Prevention is less expensive than reaction. The other activities involve student identification of economic loss from a cyber attack, and the cost of an Internet shutdown to estimate the economic cost of Internet disruptions.

“Cyber Discovery Kit”

Teach Cyber-Cyber Discovery Kit

Teach Cyber Club Kit

The new Cyber Discovery Kit is available for download as a pdf. Our mission at Teach Cyber is to provide resources, training, and support to secondary school educators. We hope to 1) contribute to growing the cybersecurity workforce, and 2) help all students understand ways to act safely and ethically in cyberspace.

The Cyber Discovery Kit serves as an introduction for students to LIVE (Learn, Investigate, Value, and Empower) Cyber. The 8 Big Ideas of Cybersecurity (Ethics, Trust, Ubiquitous Connectivity, Data Security, System Security, Adversarial Thinking, Risk and Implications) are introduced. Students explore key principles and concepts and investigate cybersecurity vocabulary and careers. The purpose is to help students discover the vast field of cybersecurity while empowering them to LIVE ethically and well in cyberspace.

The kit is designed for 6th to 9th grade students in a club or classroom setting to heighten interest in your cybersecurity course, program, or pathway. Additionally, we hope that the experience allows students to reflect and make healthy, safe, and ethical decisions in cyberspace.

Contact sabrina.smiley@teachcyber.org if you have questions.The Cyber Crew Badge

“Intro to the Challenge of Cybersecurity – Unit 5 – Lesson 4”

Unit 5 – Lesson 4 – “Policy Controls”

2 Days

This lesson focuses on security policies as controls. The focus is on the implementation of the policy, updates, and policy enforcement. Students work on activities that highlight the importance of security policies for ensuring the confidentiality, integrity, and availability of data. The lesson concludes with a laboratory exercise where the students experiment with installation and removal of software on an organizational machine in violation of an acceptable use policy.

“Intro to the Challenge of Cybersecurity – Unit 5 – Lesson 3”

Unit 5 – Lesson 3 – “Asymmetric Cryptography”

11 Days

Shifting from symmetric to asymmetric cryptography, this lesson takes students on a deeper dive beginning with the concept of public key cryptography to round out the use of cryptography as a mechanism to maintain confidentiality. The lesson shifts to the connection that cryptography has to ensure integrity through the study of hash functions, before making a final shift to the study of digital signatures.

“Intro to the Challenge of Cybersecurity – Unit 5 – Lesson 2”

Unit 5 – Lesson 2 – “Symmetric Cryptography”

4 Days

This lesson focuses on symmetric key cryptography, beginning with an overview of what cryptography is and the fundamental ideas of symmetric encryption. This sets the stage for later in the unit when students learn about asymmetric cryptography. Students will begin with learning about basic ciphers and a historical perspective providing context for the field of cryptography beyond the use of modern computers. Students will learn about modern symmetric ciphers and, by the end of the lesson, they will be comfortable encrypting and decrypting using a variety of techniques.

“Intro to the Challenge of Cybersecurity – Unit 5 – Lesson 1”

Unit 5 – Lesson 1 – “Data Controls”

4 Days

As students learned in Unit 4, data is a complex topic. This lesson introduces students to controls used for protecting data and begins the dive into more advanced controls explored throughout this unit. First, the focus is on refining student understanding of authentication, authorization, identification, and access control. Students learn about types of access control, including Role Based Access Control (RBAC), Mandatory Access Control (MAC), and Discretionary Access Control (DAC). The lesson concludes with an investigation into where various controls can go wrong with faulty authentication, authorization and/or access control.

“Intro to the Challenge of Cybersecurity – Unit 5”

Unit 5 – “Countermeasures Against Attacks”

32 Days

Unit 5 further develops understanding of data security controls and includes authentication, identification, authorization, and access controls. These tools are examined from the perspective of their function in terms of preventing disclosure, deception, disruption, destruction, or usurpation. From here this unit introduces important terms and concepts in cryptography, and then covers how symmetric and asymmetric cryptosystems work. The unit returns to policy controls and students will analyze laws to discern what type of data are being protected, for whom, and under what circumstances. The unit also covers physical policies as part of a comprehensive defense-in-depth protection strategy.

From there, the unit moves on to discuss network security controls with topics like protocols that build in security, firewalls, intrusion detection, and intrusion prevention systems. The unit discusses important topics such as input validation, state analysis of software, dynamic analysis of software, the role of patching in software security, and the challenge of zero-day vulnerabilities. Regarding hardware security controls, the unit presents how physical controls are used to secure hardware. By the end of this unit, students will also begin to think about the “bigger picture” of systems to develop a strong understanding of how (and which) controls are used in securing a system from attacks.

“Intro to the Challenge of Cybersecurity – Unit 5 – Lesson 8”

Unit 5 – Lesson 8 – “Impact of Failure – Responsiveness to Change”

2 Days

This lesson is meant to help students to see that all of the controls from this unit come together to form a complex system that has weak points. Students are tasked with working in groups to take the context of an organization and outline which controls and structures they will need in which places, drawing from their learning throughout Unit 5 and prior. Students create a graphical representation of the system and place controls where appropriate, present to the class, and revise to demonstrate that cybersecurity is an ever-changing process and the most secure systems are responsive to change.

“Intro to the Challenge of Cybersecurity – Unit 5 – Lesson 7”

Unit 5 – Lesson 7 – “Software and Hardware Controls”

4 Days

In this lesson, the focus is on the software and hardware controls (secure design and secure software development lifecycle, static and dynamic software analysis, vulnerability management, and hardening of Operating Systems (OS) and software applications) that are in place to fix vulnerabilities and defend from exploits. Students will conduct a hands-on lab with OS hardening.