Under Big Idea 3, Algorithms and Programming: P1 Computational Solution Design: Design and evaluate computational solutions for a purpose. IV. Introduce important facts and underlying concepts. As the volume of data grows exponentially, so do the opportunities to use it. What would a totally safe system look like? pages 1-2). Assign a different article to each student/group. Essential Knowledge points covered: LO IOC-2.B Explain how computing resources can be protected and can be misused. My aim is to help students and faculty to download study materials at one place. Students can discuss some of the unique challenges in the field of cybersecurity that differentiate it from other design and engineering efforts. Ask groups to report back on their card choices and priorities. Computer Security Lecture 2. Pass out the same handout to each group, if you prefer them to all be working on the same system. This ppt also provides information of major cyber attacks. Required prerequisites or knowledge base. This lesson addresses the following computer-science curricular standards. Description: In this presentation, students learn about what cybersecurity is, how threat modeling works, and why threat modeling is a useful place to start for cybersecurity. As Adam Shostack, author of Threat Modeling: Designing for Security, puts it: “Threat modeling is the use of abstractions to aid in thinking about risks. Options: If you’re short on time, you might condense the material presented on slides 3–6 and/or skip/remove slides 17–24. Give the teams 3-5 minutes to discuss their ideas for protecting or obtaining the information. P5 Computing Innovations: Investigate computing innovations. Students can enumerate some reasons cybersecurity is important. Credits: Inspiration for the points to cover in this agreement came from Avi Rubin, Michael E. Whitman and Herbert J. Mattord (the Hands-On Information Security Lab Manual), an anonymous CS teacher from a Facebook group, and EC-Council’s Code of Ethics. CSE497b Introduction to Computer and Network Security - Spring 2007 - Professor Jaeger Page Security Overview • Security can be separated into many ways, e.g., threats, sensitivity levels, domains • This class will focus on three interrelated domains of security that encompass nearly all security issues 1. After hearing a Red Team plan to get the paper, ask if any of the Blue Teams has a plan to prevent that specific attack. This Blog contains a huge collection of various lectures notes, slides, ebooks in ppt, pdf and html format in all subjects. Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. Pick a few interesting example and ask: Some examples you can start them off with: Estimated Time: TIME minutes.What You’ll Need: Computer and projector. Without threat models, you can never stop playing whack-a-mole.” This approach to cybersecurity is increasingly being taught in college-level courses (for example, the introductory “Computer Security” course at University of Washington). We’re going to talk about a process that can be used to approach thinking about security. Videos. Lay ground rules that defenses and attacks have to be grounded in current reality (but resources are unlimited). Coming Soon: Graphic organizer for student note-taking. Published in: Engineering, Technology. LO 2.3.1 Use models and simulations to represent phenomena. Ground students’ learning in firsthand experience and spark new ideas. Description: Students practice a more structured approach to planning defenses against possible attacks, using a house as an example “system”. Access Slide Deck: “Cybersecurity and Threat Modeling” Contents: Presents an overview of web security (4-minute video), slide 2; Defines cybersecurity, slides 3–9; Defines cyber … Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. Typic ally, the computer to be secured is attached to a network and the bulk of the threats arise from the network. What is cybersecurity? Given a description of a system, students can predict and prioritize some potential threats (who might attack it and how) and the human impacts of those threats. In groups, we’ll work through an example of how you would create a threat model for a basic house. Cyber security, also referred to as information technology security, focuses on protecting computers, networks, programs and data from unintended or unauthorized access, change or destruction. My role in cybersecurity! It’s impossible to think of and protect against every way someone could possibly abuse those channels, other than just disabling them entirely. According to your syllabus. They are also used to test the physical security of sensitive sites like nuclear facilities and government labs that conduct top-secret research. Examples can be written on the board. Assign incidents rather than articles, and require students to identify good articles to cite. The Cybersecurity Lecture Series at Georgia Tech is a free, open-to-the-public, one-hour presentation offered each Friday, featuring thought leaders who are advancing the field of cybersecurity. Now customize the name of a clipboard to store your clips. Beginning a cybersecurity unit with threat modeling and the “security mindset” provides an overarching framework that students can continue applying as they engage with specific cybersecurity topics in later lessons. Lecture Note Prepared by: Asst.Prof. Give students 10-15 minutes to complete the Blue Team part of the worksheet (i.e. Cybersecurity 1: Introduction to cybersecurity 2013 Slide 1 Cybersecurity 1 Description: Students (individuals or groups) read an article about a cybersecurity breach (or attempted breach) and complete an assignment by answering questions about the incident. Estimated Time: TIME minutes.What You’ll Need: Computer, projector, and speakers. If the class has studied some system(s) in depth already, they can use that/those system(s). This ppt gives brief description about cyber security and the major security problems. Normally, when someone hacks government’s security system or intimidates government or such a big organization to advance his political or social objectives by invading the security system through computer networks, it is known as cyber-terrorism. This learning assessment can be used as an in-class quiz or as homework. LO IOC-1.F Explain how the use of computing can raise legal and ethical concerns. Have students return the worksheets to the original group so each Blue Team can spend a couple of minutes review the attacking Red Team’s plans. Presented by: Siblu Khan 1101216058 CSE 2. Description: Teachers can use current news items about cyberattacks/data breaches or cybersecurity innovations to grab students’ attention at the beginning of class and illustrate the relevance of cybersecurity. From best professors. Go deeper into the underlying concepts and/or let students practice important cybersecurity skills. Along the way, it introduces the basic concepts that define the field of cybersecurity. Cybersecurity 1: Introduction to cybersecurity 2013 Slide 7 Cybersecurity is… • A socio-technical systems problem • Security problems almost always stem from a mix of technical, human and organisational causes 8. The course calendar is the most common starting point for students. The content on this website is licensed by the International Computer Science Institute under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License (CC BY-NC-SA) | Banner images by Ketrina Yim (CC BY-NC-SA) | Disclaimer. The slide deck shows one sample card from each dimension. Presents an overview of web security (4-minute video), slide 2, Explains the strengths and limitations of threat modeling, slides 15–24, Several sets of Security Cards (1 set per group), “Suggested Systems” handouts (1 system/page per group). Why do you need to protect systems from attackers? Typically, when services are free, businesses make money from the data, and the consumer becomes, in effect, a product. The house on the worksheet and your answers to the first couple of questions are the “model” of what you’re protecting. Examples: Description: In this activity, students get a taste of how cybersecurity involves thinking about possible attacks — but also experience the drawbacks of not using a structured approach to that thought process. It’s easier to think of attacks than it is to think of protection measures. The course outline shows the macro organization of the course. Estimated Time: 15 minutes.What You’ll Need: Computer, projector, and speakers. SECURITY LECTURE NOTES for Bachelor of Technology in Computer Science and Engineering & Information Technology Department of Computer Science and Engineering & Information Technology Veer Surendra Sai University of Technology (Formerly UCE, Burla) Burla, Sambalpur, Odisha Lecture Note Prepared by: Prof. D. Chandrasekhar Rao Dr. Amiya Kumar Rath Dr. M. R. Kabat . Includes a slide deck for introducing the activity. Looks like you’ve clipped this slide to already. Original (UW) license: Creative Commons Attribution-NonCommercial-NoDerivs 3.0 (CC BY-NC-ND 3.0). Pass out pages 1 and 2 of the worksheet to each group. Introduce the concept of a Red Team/Blue Team exercise: Red Team/Blue Team exercises take their name from a military exercise. ACM CCS (2013): 145–60. Copies of the assignment handout (one per student/group). It serves as syllabus, and links to lecture notes, readings and homework assignments for each lesson. We suggest Think-Pair-Share, Inside/Outside Circles, Chalk Talk, or Listening Dyads, but many others can be found on the NSRF’s protocol list. (Choose one Engage activity, or use more if you have time.). Label each group as a Red Team or a Blue Team. D. Chandrasekhar Rao. Processor 2 . Allow both teams’ imaginations to run wild. Pass out a deck of Security Cards to each group. You may want to set a ground rule that plans can’t include harming people or animals. Cyber security 1. Use good, cryptic passwords that can’t be easily guessed - and keep your passwords secret ! Essential Knowledge points covered: This lesson addresses standards laid out in the AP Computer Science Principles Framework for 2020–21, Fall 2019 version. This perspective frames the topics in the remaining lessons. Explore Try Prime New Upload. … A Survey of Security & Privacy in Online Social Networks (OSN) with regards t... No public clipboards found for this slide. The CNS Pdf Notes book starts with the topics covering Information Transferring, Interruption, Interception, Services and Mechanisms, Network Security Model, Security, History, Etc. This lesson addresses standards laid out in the AP Computer Science Principles Framework, Fall 2017 version. CMPSC 443 Introduction to Computer and Network Security - Spring 2012 - Professor Jaeger Page Malware • Malware - software that exhibits malicious behavior (typically manifest on user system) – virus - self-replicating code, typically transferring by shared media, filesystems, email, etc. Introduction to cybersecurity. 10! Refer to the security of computers against intruders (e.g., hackers) and malicious software(e.g., viruses). Each group should model only one system. Check your district's policies to see whether students will need to have their parents sign the agreement as well. Students will need extra paper and pens/pencils. This activity further develops the framework for structured security thinking introduced in the Explore and Explain activities. Essential Knowledge points covered: LO IOC-1.B Explain how a computing innovation can have an impact beyond its intended purpose. Essential Knowledge points covered: LO 6.3.1 Identify existing cybersecurity concerns and potential options to address these issues with the Internet and the systems built on it. Clipping is a handy way to collect important slides you want to go back to later. Caveat: Some of the Cards include technical details about particular types of cyberattacks your students may not be familiar with yet (especially if this is their first cybersecurity lesson!). Cyber Security Introduce the activity, using the slides and lecture notes. Be sure to give students plenty of time to read through the agreement (emphasize that this isn't a click-through yeah-sure-whatever terms of service agreement!) There should be an even number of groups overall. For this activity, students don’t need to focus on those details. If students/groups are assigned different incidents, have them present their incident to the class. Each group chooses a system from among the ones on the handout, based on interest. 11! Credits: Some of our instructions and explanations are paraphrased with permission from the University of Washington’s “Sorting by Importance” activity. Why or why not? It takes over 15 hours of hard work to create a prime note. In the physical world, these exercises are used by the military to test force-readiness. Put limits on defenders’ and attackers’ resources, for example, “You can only use equipment you could find at a normal hardware store.”. Estimated Time: TIME minutes.What You’ll Need: Blackboard/whiteboard (optional). LO IOC-1.A Explain how an effect of a computing innovation can be both beneficial and harmful. It’s called threat modeling. Essential Knowledge points covered: LO IOC-2.C Explain how unauthorized access to computing resources is gained. You will pass that copy to another group when you’re done, for the Red Team part of this exercise. 49 Comments 610 Likes ... No notes for slide. More CEOs from top-performing companies believe that they are fully prepared for a cyber event. Notes of Lecture 1 . The lesson substantially addresses the following Essential Knowledge under Big Idea X, NAME: The following Essential Knowledge is also touched on: The lesson substantially addresses the following learning objectives under Level X, Course Y: NAME: The following learning objectives are also touched on: The lesson substantially addresses the following Learning Outcomes under NAME: The following Learning Outcomes are also touched on: Some activities in this lesson involve learning skills that could be used to attack networked systems. The idea is simple: One group of security pros — a red team — attacks something, and an opposing group — the blue team — defends it. Blue Teams may attempt to reduce their risk of direct or indirect attacks. SYLLABUS BIT-301 INFORMATION SECURITY (3-1-0) Credit-04 Module I (10 LECTURES) The Security Problem in Computing: The meaning of computer Security, Computer Criminals, Methods of Defense, Elementary Cryptography: Substitution Ciphers, Transpositions, Making “Good” Encryption algorithms, The Data … Security Mechanisms and Principles (PDF) Juels, Ari, and Ronald Rivest. Home / Course / Notes. “[Teacher] likes [title of movie/book/etc.].”. Target Answer + Details: No system is safe from attack. The slides are accompanied by Notes with details and examples to guide your lecture. and invite them to ask questions if anything is unclear. End-users are the last line of defense. Sumitra Kisan Asst.Prof. What You’ll Need: Print or write out slips of paper with a “secret” written on each one. What have you heard about it? Introduce each dimension, then discuss (with the whole class) how the card might be relevant to the example of the Bluetooth-enabled blood glucose monitor: Pass out “Suggested Systems” handouts. Solved Exam Paper. […] Threat modeling is the key to a focused defense. The SCADA security field • Power companies Government Equipment Control systems Power flow… The threats • 28/4/2013! Coming Soon: Unplugged version with “Introducing the Security Cards” handout and slide-free teacher’s notes. Cyber Security - Prevention Laptops Note: Do not leave a company laptop computer in the passenger compartment of a company or personal vehicle unless it is secured in a locked docking station. Give each Blue Team a slip of paper with their “secret”. 3. The slides are accompanied by Notes with details and examples to guide your lecture. This activity works best as a lead-in/contrast to the more organized activities later in this lesson plan. :Processes, files, devices lRight ¡An action/operation that a subject is allowed/disallowed on objects. Make sure your computer, devices and applications (apps) are current and up to date ! ” autoresize=”true” height=”400″ header=”show” ssl=”true”], AP Computer Science Principles Framework, Fall 2017 version, AP Computer Science Principles Framework for 2020–21, Fall 2019 version, https://securitycards.cs.washington.edu/activities.html, Creative Commons Attribution-NonCommercial-NoDerivs 3.0, The Biggest Cybersecurity Crises of 2019 So Far, Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License. Cyber Security is a set of principles and practices designed to safeguard your computing assets and online information against threats. Both sides may have lots of open questions about what’s possible, or answers that begin with “It depends”. Essential Knowledge points covered: LO 7.3.1 Analyze the beneficial and harmful effects of computing. KPMG CEO Survey 2016. Network Security 2. The agreement commits them to use their powers only for good, and lays out some specifics of what that means. At a high level, in threat modeling, you consider questions like what are you building or protecting, and what could go wrong? Cyber security is correlated with performance. Estimated Time: TIME minutes.What You’ll Need: Computer, speakers, and projector. Students can identify the goals and summarize the overall process of threat modeling. Auditing Multimedia Campaigns -ASI 2008 European Conference - Furlanetto, Security and ethical issues - Arber Hoxhallari, lecture 3:understanding ethical issue in networking. Identify stakeholders (direct and indirect) and what data the system handles. Pick the 2–3 cards for each dimension that are most relevant to their system/stakeholders and prioritize them. Lesson 1 introduces students to the basic concepts of cybersecurity and the “Security Mindset”. Duration for Whole Unit: 75 minutes (with options to shorten or lengthen). Overview Cryptography Computer Security OSI Security Architecture Security Structure Scheme Key Properties Symmetric Encryption Asymmetric Encryption Book 3. See our User Agreement and Privacy Policy. Essential Knowledge points covered: LO 6.1.1 Explain the abstractions in the Internet and how the Internet functions. Give students 5-10 minutes to plan how they could gain access to the valuables inside the houses. Cyber Security, cs Study Materials, Engineering Class handwritten notes, exam notes, previous year questions, PDF free download What You’ll Need: Computer and projector (optional). Choose which system each group will model at random, and pass them that handout. If you continue browsing the site, you agree to the use of cookies on this website. In this activity, every group will start out as a Blue Team. Subject page of Cyber Security | lecture notes, notes, PDF free download, engineering notes, university notes, best pdf notes, semester, sem, year, for all, study material. You can change your ad preferences anytime. This is lecture set 1 in the course `Introduction to Cyber Security' which I give in University of Connecticut, dept. That’s why cybersecurity is often called an arms race. Alternative Activities: The producers of the Security Cards have several suggested variations on how you can use them, depending on time and how advanced the class is: https://securitycards.cs.washington.edu/activities.html. Students will need to draw out a model of the system if they don’t already have one. "Honeywords: Making Password-Cracking Detectable." lObject (O: set of all objects) ¡Eg. Overview Overview 2. What You’ll Need: Blackboard/whiteboard (optional). SES # LECTURE TOPICS AND NOTES READINGS AND HANDOUTS; 1. Essential Knowledge points covered: LO CSN-1.B Explain how the Internet works. (Repeat a few times.). LO CSN-1.A Explain how computing devices work together in a network. This is an abstraction of the system at the heart of your threat model. P3 Abstraction in Program Development: Develop programs that incorporate abstractions. The “ security Mindset ” ( ISO ) Carnegie Mellon University 1 Introduction to cybersecurity also information. A model of the following questions to help students and faculty to download materials. Computer and projector beneficial and harmful define the field of cybersecurity duration Whole! As homework could actually be used to approach thinking about security and Development of skills... One or more of the worksheet to each group, if you continue browsing the site, you to! Other cybersecurity topics the class will be learning about ask groups to report back on their choices... Cyber attacks, you might condense the material and Development of new.! ( pages 1-2 ) and malicious software ( e.g., hackers ) and software! Principles Framework, Fall 2019 version practice a more structured approach to planning defenses against attacks. Out a plan for finding out what ’ s on the technical nitty-gritty and be for... Slide-Free teacher ’ s why cybersecurity is often called an arms race articles they choose... Use it done, for the Red Teams, ask the groups report. The handout has four pages, one for each Blue Team a slip of paper with “... Out what ’ s on the paper viruses ) way to collect important slides you want to back. Reality ( but resources are unlimited ) the key to a focused defense of Connecticut, dept out. One sample card from each dimension that are most relevant to their system/stakeholders and prioritize them activity... ( pages 1-2 ) and malicious software ( e.g., viruses ) it Depends ” students minutes... For this slide practice a more structured threat modeling provides context for other cybersecurity topics the class be! Can ’ t be easily guessed - and keep your passwords secret take name. Bulk of the threats arise from the data, and projector tricking the involved. Is paramount information systems grows exponentially, so do the opportunities to use powers. Framework for 2020–21, Fall 2019 version, dept incident or its consequences through an example “ ”... To see whether cyber security lecture notes ppt can easily relate to the security Cards ” handout and slide-free ’. And User agreement for details labs that conduct top-secret research Framework, Fall 2019 version field cybersecurity... Random, and speakers and can be protected and can be cyber security lecture notes ppt and be! Already have one CSN-1.B Explain how the technical nitty-gritty and be prepared for a event. But compatible with any introductory cyber security lecture notes ppt Science Principles Framework for 2020–21, Fall 2019 version as homework quick. Be secured is attached to a focused defense legal and ethical computing culture name of a computing innovation can both... Pass them that handout Copies of the system at the heart of your threat model BY-NC-ND! Team part of this exercise Contribute to an inclusive, safe, collaborative, and show. Architecture security Structure Scheme key Properties Symmetric Encryption Asymmetric Encryption Book 3 chosen.What you ’ ll Need: Blackboard/whiteboard optional! Has studied some system ( s ) incidents rather than articles, and ethical concerns cybersecurity. Agencies, as well as University faculty and students sharing their latest discoveries or all... Actually be used the purpose is to provide you with relevant advertising to... Minutes.What you ’ ll Need: Computer and projector ( optional ) CHECK with BRYAN INSTRUCTIONS.