ALAMOSE aims to educate undergraduate and graduate students on (i) what categories …
ALAMOSE aims to educate undergraduate and graduate students on (i) what categories of security weaknesses appear for artifacts used in DevOps, and (ii) how identified security weaknesses can be detected. ALAMOSE is funded by the U.S. National Science Foundation (NSF), and spearheaded by Akond Rahman at Auburn University. Please contact him with questions at akond@auburn.edu.
The Washington Center for Deaf and Hard of Hearing Youth and the …
The Washington Center for Deaf and Hard of Hearing Youth and the University of Washington Language Learning Center partnered to develop a 5 day series of lessons with accompanying videos for ASL on the topic of Cybersecurity. The content is applicable as a STEM education unit for deaf students, as well as supplementary learning for advanced L2 ASL students. The unit provides applied knowledge (e.g., how to be safe as a user of the internet), basic technical knowledge (e.g., what is malware, key vocabulary), and career opportunities (e.g., the National Initiative for Cybersecurity Education (NICE), existing ASL representation and the need for more diversity/representation). All videos have English subtitles and dubbing.
This Module forms part of the Henry Ford Corporate College Series on …
This Module forms part of the Henry Ford Corporate College Series on Cyber Intelligence and is accompanied by a Teaching Guide. The full range of materials includes teaching modules on cyber threat intelligence, threat hunting,MITRE and Diamond Frameworks, CARET, ATT&CK, collecting and processing data, assessments, slides, and other teaching tools that lecturers can adapt to their contexts, and integrate into existing college courses. The Module provides an outline for a 8 week class, but can be used for shorter or longer sessions.All teaching modules engage with existing academic research and debates, and may contain information, opinions and statements from a variety of sources, including press reports and independent experts. Links to external resources were tested at the time of publication. However, as third-party websites may change, please contact us if you come across a broken link or are redirected to inappropriate content. Please also inform us if you notice that a publication is linked to an unofficial version or website.
Cybersecurity represents a comprehensive challenge facing all staff in K-12 organizations and …
Cybersecurity represents a comprehensive challenge facing all staff in K-12 organizations and requires the creation of a culture of cybersecurity within each K-12 organization. This paper identifies and addresses staffing cybersecurity across the K-12 organization, including identifying several strategies for staffing cybersecurity within the school system. These strategies include developing focused cybersecurity positions; incorporating cybersecurity duties and responsibilities in all existing K-12 technology positions, leveraging cross-district collaboration and/or managed services to augment cybersecurity staffing; and expanding the expectation that cybersecurity is a responsibility of all members of the K-12 education community.
The text, labs, and review questions in this book are designed as …
The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security (cybersecurity). With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.
This presentation covers the legal environment of cybercrime to date. It addresses: …
This presentation covers the legal environment of cybercrime to date. It addresses: the challenges of law enforcement; federal government vs. state jurisdiction of cybercrime; law enforcement department and agencies which handle cybercrime; criminal statutes and privacy statutes.
This book on Cybersecurity is written for beginners. No college degree is …
This book on Cybersecurity is written for beginners. No college degree is required. Cybersecurity covers a broad spectrum of topics. This book intends to ease the initial learning curve using associable analogies in normal life and graphical and guided exercises. Completing the Cybersecurity study in this book can be accomplished in a self-paced learning manner outside of a classroom.
It is hoped that self-paced learning and/or the teaching of this book at various institutions will open the doors to a broader audience in their career development towards the job-rich cybersecurity industry. Further, it is hoped that by demystifying cybersecurity, people will build up their interests and confidence in transitioning into the cybersecurity industries from whatever field they are working in today.
The goals of this activity are to facilitate team work, critical thinking, …
The goals of this activity are to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and fake news. Students will be grouped into two teams. As a team, they will choose and analyze cases and ethical questions about fake news through the questions presented in the activity. They will present their analysis to the class.
This is an activity the goals of which are to facilitate team …
This is an activity the goals of which are to facilitate team work; critical thinking; presentation skills in the area of cybersecurity and law. Students will be grouped into two teams. As a team, they will choose and analyze cases about online identity theft through the questions presented in the activity. They will present their analysis to the class.
Have you ever felt uneasy or even dreadful after losing a USB …
Have you ever felt uneasy or even dreadful after losing a USB flash drive that might contain sensitive information or data about your business?
This presentation will give you a tool to put you at ease when backing up a large number of files and data to a USB flash drive or stick. The tool is relatively easy to use on a USB drive, is based on encryption technology, and protects your business data from the prying eyes.
Attendees will learn about the following topics: - A brief introduction to data encryption. - A few encryption tools for a novice user. - Demonstration on how to use an encryption/decryption tool called VeraCrypt to protect the data on a USB flash drive. - Pros and cons of encryption/decryption technology.
Today many small businesses benefit from QuickBooks (Desktop and Online) as a …
Today many small businesses benefit from QuickBooks (Desktop and Online) as a financial accounting and management tool to support their businesses. Among the number of business risks to manage, the protection of the financial data in QuickBooks is essential to the vitality of a company.
What can small business owners do in QuickBooks to manage these security risks?
Attendees to this webinar will learn about the following topics: - Introduce a security architectural approach to QuickBooks data protection. - Learn about the default data integrity protections built into QuickBooks. - Practice stronger authentication into QuickBooks. - Practice role-based access on QuickBooks accounting. - Perform security monitoring and fraud detection using a rarely known native tool within QuickBooks.
Presentation Time: 50 minutes plus 10 minutes on Q&A.
Back in May 2021 a cyber-attack known as ransomware shut down the …
Back in May 2021 a cyber-attack known as ransomware shut down the fuel supplies of Colonial Pipeline for American Airlines and the northeast region for almost a week. Darkside, the perpetrator, demanded $4.4 Million from Colonial Pipeline before they would provide a key to unlock the frozen control and billing systems. Businesses across a spectrum of industries, large and small, got concerned about their own situations and data protection. What can small businesses do to protect their digital assets against ransomware attacks? Attendees will learn about the following topics: • Background on ransomware. • Current state-of-the-art Information Technology against ransomware. • A risk-based protection strategy. • Practical tools & tips against ransomware.
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a …
The Health Insurance Portability and Accountability Act of 1996 (HIPAA) is a federal law that requires the creation of national standards to protect sensitive patient health information from being disclosed without the patient’s consent or knowledge. The US Department of Health and Human Services (HHS) issued the HIPAA Privacy Rule to implement the requirements of HIPAA. The HIPAA Security Rule protects a subset of information covered by the Privacy Rule (URL: https://www.cdc.gov/phlp/publications/topic/hipaa.html).
Small businesses that deal with healthcare information must comply with HIPAA. What can small business owners do to manage the compliance risks, yet to be cost-effective?
Topics to be covered include: - What are the business requirements for HIPAA security? - What stages of IT audit do small businesses need to plan for HIPAA security compliance? - What technology and tools can be used to protect HIPAA-related data and to assure compliance?
Presentation Time: 50 minutes plus 10 minutes Q&A.
This textbook offers a full 7-week college undergraduate/graduate course on cybersecurity risk …
This textbook offers a full 7-week college undergraduate/graduate course on cybersecurity risk quantification. A companion Excel-based toolkit with models is included and available for download in the book's resource section.
No prior experience with risk quantification is required.
The course is divided into seven modules. Students are introduced to basic and advanced methods and models for quantifying cyber risk. Students will perform a risk analysis and present their findings in week 7. In module 1, they are given background information for the course project and their first basic tool for quantifying risk. In module 2, they learn how to analyze vulnerability data and receive another tool to complete that work. In module 3, they will perform an attack analysis based on a scenario they will develop, and they are given their first model to quantify that risk. In module 4, they are given several tools and a fully functional FAIR-compliant model, and they will quantify risk in financial terms. In module 5, they are given two advanced models: a probability tree and a Bayesian Inference model. In module 6 students focus on best practices for present their results and communiating risk. In module 7, students deliver their analysis.
With 38.5 billion smart devices in existence in 2020 and increasing every …
With 38.5 billion smart devices in existence in 2020 and increasing every year, the potential for security breaches in the Internet of things is also escalating at a dramatic pace. The goal of this team activity is to facilitate team work, critical thinking, and presentation skills in the area of cybersecurity and the Internet of Things. Students will be grouped into two teams. As a team, they will analyze cases about security cameras and smart dolls through the questions presented in the activity. They will present their analysis to the class.
This presentation is about the Silk Road Market, one of the largest …
This presentation is about the Silk Road Market, one of the largest cases of illegal drug activity on the dark web, that the federal government has prosecuted. Beyond discussing the case, the presentation adds general facts about the US Department of Justice, the FBI and the DEA, and federal sentencing. The case discussion includes information about: Ross Ulbricht the creator and head of the market; how the Silk Road operated; the involvement of the FBI and DEA; the trial; the fourth amendment violations alleged by the defense; and the sentencing.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.