Updating search results...

Search Resources

65 Results

View
Selected filters:
  • cybersecurity
ALAMOSE: Authentic Learning Modules for DevOps Security Education
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

ALAMOSE aims to educate undergraduate and graduate students on (i) what categories of security weaknesses appear for artifacts used in DevOps, and (ii) how identified security weaknesses can be detected. ALAMOSE is funded by the U.S. National Science Foundation (NSF), and spearheaded by Akond Rahman at Auburn University. Please contact him with questions at akond@auburn.edu.

Subject:
Applied Science
Computer Science
Computing and Information
Material Type:
Activity/Lab
Author:
Akond Rahman
Date Added:
04/12/2023
ASL Cybersecurity Fundamentals and Career Opportunities
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Washington Center for Deaf and Hard of Hearing Youth and the University of Washington Language Learning Center partnered to develop a 5 day series of lessons with accompanying videos for ASL on the topic of Cybersecurity. The content is applicable as a STEM education unit for deaf students, as well as supplementary learning for advanced L2 ASL students. The unit provides applied knowledge (e.g., how to be safe as a user of the internet), basic technical knowledge (e.g., what is malware, key vocabulary), and career opportunities (e.g., the National Initiative for Cybersecurity Education (NICE), existing ASL representation and the need for more diversity/representation). All videos have English subtitles and dubbing. 

Subject:
Applied Science
Date Added:
07/03/2023
CYBER THREAT INTELLIGENCE FUNDEMENTALS  COURSE
Unrestricted Use
CC BY
Rating
0.0 stars

This Module forms part of the Henry Ford Corporate College Series on Cyber Intelligence and is accompanied by a Teaching Guide. The full range of materials includes teaching modules on cyber threat intelligence, threat hunting,MITRE and Diamond Frameworks, CARET, ATT&CK, collecting and processing data, assessments, slides, and other teaching tools that lecturers can adapt to their contexts, and integrate into existing college courses. The Module provides an outline for a 8 week class, but can be used for shorter or longer sessions.All teaching modules engage with existing academic research and debates, and may contain information, opinions and statements from a variety of sources, including press reports and independent experts. Links to external resources were tested at the time of publication. However, as third-party websites may change, please contact us if you come across a broken link or are redirected to inappropriate content. Please also inform us if you notice that a publication is linked to an unofficial version or website.

Subject:
Computing and Information
Material Type:
Full Course
Author:
MARRCI CONNER
Marcia Mangold
Date Added:
06/29/2023
CoSN Cybersecurity Staffing Resource for K-12
Unrestricted Use
CC BY
Rating
0.0 stars

Cybersecurity represents a comprehensive challenge facing all staff in K-12 organizations and requires the creation of a culture of cybersecurity within each K-12 organization. This paper identifies and addresses staffing cybersecurity across the K-12 organization, including identifying several strategies for staffing cybersecurity within the school system. These strategies include developing focused cybersecurity positions; incorporating cybersecurity duties and responsibilities in all existing K-12 technology positions, leveraging cross-district collaboration and/or managed services to augment cybersecurity staffing; and expanding the expectation that cybersecurity is a responsibility of all members of the K-12 education community.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
CoSN
Date Added:
10/05/2022
Computer Systems Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security (cybersecurity). With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Activity/Lab
Homework/Assignment
Syllabus
Textbook
Author:
Ryan Tolboom
Date Added:
03/01/2023
Cyberpolitics in International Relations: Theory, Methods, Policy
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This course focuses on cyberspace and its implications for private and public, sub-national, national, and international actors and entities.

Subject:
Arts and Humanities
Business and Communication
Career and Technical Education
Graphic Arts
Graphic Design
Political Science
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Choucri, Nazli
Clark, David
Madnick, Stuart
Date Added:
09/01/2011
Cybersecurity-Cybercrime-The Legal Environment
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. state jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.

Subject:
Career and Technical Education
Criminal Justice
Law
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
Cybersecurity Essentials for Beginners - Concepts and Practice
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.

It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.

Subject:
Applied Science
Architecture and Design
Career and Technical Education
Computer Science
Computing and Information
Technology
Material Type:
Activity/Lab
Diagram/Illustration
Lecture
Lesson
Unit of Study
Author:
Henry S Teng
Date Added:
03/30/2024
Cybersecurity-Fake News
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The goals of this activity are to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and fake news. Students will be grouped into two teams. As a team, they will choose and analyze cases and ethical questions about fake news through the questions presented in the activity. They will present their analysis to the class.

Subject:
Arts and Humanities
Career and Technical Education
Criminal Justice
Law
Philosophy
Material Type:
Activity/Lab
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
Cybersecurity-Online Identity Theft
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This is an activity the goals of which are to facilitate team work; critical thinking; presentation skills in the area of cybersecurity and law. Students will be grouped into two teams. As a team, they will choose and analyze cases about online identity theft through the questions presented in the activity. They will present their analysis to the class.

Subject:
Career and Technical Education
Criminal Justice
Law
Material Type:
Activity/Lab
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
Cybersecurity Presentation Series: Part 1 USB Flash Drive Encryption
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?

This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.

Attendees will learn about the following topics:
- A brief introduction to data encryption.
- A few encryption tools for a novice user.
- Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB
flash drive.
- Pros and cons of encryption/decryption technology.

Subject:
Applied Science
Career and Technical Education
Computer Science
Computing and Information
Education
Educational Technology
Electronic Technology
Technology
Material Type:
Diagram/Illustration
Lecture
Unit of Study
Author:
Henry S. Teng
Date Added:
04/03/2024
Cybersecurity Presentation Series: Part 2 QuickBooks® & Security Controls
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.

What can small business owners do in QuickBooks to manage these security risks?

Attendees to this webinar will learn about the following topics:
- Introduce a security architectural approach to QuickBooks data protection.
- Learn about the default data integrity protections built into QuickBooks.
- Practice stronger authentication into QuickBooks.
- Practice role-based access on QuickBooks accounting.
- Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.

Presentation Time: 50 minutes plus 10 minutes on Q&A.

Subject:
Accounting
Applied Science
Business and Communication
Career and Technical Education
Computer Science
Education
Educational Technology
Finance
Technology
Material Type:
Activity/Lab
Lesson Plan
Syllabus
Teaching/Learning Strategy
Unit of Study
Author:
Henry S. Teng
Date Added:
04/04/2024
Cybersecurity Presentation Series: Part 3 Protection against Ransomware
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Back in May 2021 a cyber-attack known as ransomware shut down the fuel supplies of Colonial Pipeline for American Airlines and the northeast region for almost a week. Darkside, the perpetrator, demanded $4.4 Million from Colonial Pipeline before they would provide a key to unlock the frozen control and billing systems.
Businesses across a spectrum of industries, large and small, got concerned about their own situations and data protection. What can small businesses do to protect their digital assets against ransomware attacks?
Attendees will learn about the following topics:
• Background on ransomware.
• Current state-of-the-art Information Technology against ransomware.
• A risk-based protection strategy.
• Practical tools & tips against ransomware.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Author:
Henry S. Teng
Date Added:
04/09/2024
Cybersecurity Presentation Series: Part 5 HIPAA Healthcare Security Compliance
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule (URL: https://www.cdc.gov/phlp/publications/topic/hipaa.html).

Small businesses that deal with healthcare information must comply with HIPAA. What can small business owners do to manage the compliance risks, yet to be cost-effective?
 
Topics to be covered include:
- What are the business requirements for HIPAA security?
- What stages of IT audit do small businesses need to plan for HIPAA security compliance?
- What technology and tools can be used to protect HIPAA-related data and to assure compliance?
 
Presentation Time: 50 minutes plus 10 minutes Q&A.

Subject:
Applied Science
Computer Science
Material Type:
Diagram/Illustration
Lesson Plan
Author:
Henry S. Teng
Date Added:
04/13/2024
Cybersecurity Risk Quantification
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This textbook offers a full 7-week college undergraduate/graduate course on cybersecurity risk quantification. A companion Excel-based toolkit with models is included and available for download in the book's resource section.

No prior experience with risk quantification is required.

The course is divided into seven modules. Students are introduced to basic and advanced methods and models for quantifying cyber risk. Students will perform a risk analysis and present their findings in week 7. In module 1, they are given background information for the course project and their first basic tool for quantifying risk. In module 2, they learn how to analyze vulnerability data and receive another tool to complete that work. In module 3, they will perform an attack analysis based on a scenario they will develop, and they are given their first model to quantify that risk. In module 4, they are given several tools and a fully functional FAIR-compliant model, and they will quantify risk in financial terms. In module 5, they are given two advanced models: a probability tree and a Bayesian Inference model. In module 6 students focus on best practices for present their results and communiating risk. In module 7, students deliver their analysis.

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
Boise State University
Author:
Charlene Deaver-Vazquez
Date Added:
07/26/2024
Cybersecurity-The Internet of Things
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

With 38.5 billion smart devices in existence in 2020 and increasing every year, the potential for security breaches in the Internet of things is also escalating at a dramatic pace. The goal of this team activity is to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and the Internet of Things. Students will be grouped into two teams. As a team, they will analyze cases about security cameras and smart dolls through the questions presented in the activity. They will present their analysis to the class.

Subject:
Arts and Humanities
Career and Technical Education
Criminal Justice
Law
Philosophy
Material Type:
Activity/Lab
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
Cybersecurity-The Silk Road Market
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This presentation is about the Silk Road Market, one of the largest cases of illegal drug activity on the dark web, that the federal government has prosecuted. Beyond discussing the case, the presentation adds general facts about the US Department of Justice, the FBI and the DEA, and federal sentencing. The case discussion includes information about: Ross Ulbricht the creator and head of the market; how the Silk Road operated; the involvement of the FBI and DEA; the trial; the fourth amendment violations alleged by the defense; and the sentencing.

Subject:
Education
Higher Education
Law
Material Type:
Lesson
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020