Updating search results...

Search Resources

40 Results

View
Selected filters:
  • security
Attacks on American Soil: Pearl Harbor and September 11
Unrestricted Use
CC BY
Rating
0.0 stars

This collection uses primary sources to compare American responses to Pearl Harbor and September 11. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.

Subject:
History
U.S. History
World History
Material Type:
Primary Source
Provider:
Digital Public Library of America
Provider Set:
Primary Source Sets
Author:
Albert Robertson
Date Added:
01/20/2016
CoSN Cybersecurity Staffing Resource for K-12
Unrestricted Use
CC BY
Rating
0.0 stars

Cybersecurity represents a comprehensive challenge facing all staff in K-12 organizations and requires the creation of a culture of cybersecurity within each K-12 organization. This paper identifies and addresses staffing cybersecurity across the K-12 organization, including identifying several strategies for staffing cybersecurity within the school system. These strategies include developing focused cybersecurity positions; incorporating cybersecurity duties and responsibilities in all existing K-12 technology positions, leveraging cross-district collaboration and/or managed services to augment cybersecurity staffing; and expanding the expectation that cybersecurity is a responsibility of all members of the K-12 education community.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
CoSN
Date Added:
10/05/2022
Computer Network Security
Unrestricted Use
CC BY
Rating
0.0 stars

This course will emphasize basic security concepts (authentication, confidentiality, accounting and integrity), apply these concepts to computer networks, and amplify the theory with hands-on aspects of configuring and using secure networks. Topics include: review of networking concepts, general security concepts, user authentication and authorization, encryption, network attacks (including hacking, viruses, worms and denial of service) and network protection. Defense tools including firewalls, Virtual Private Networks (VPNs), and filters will be discussed in depth, as they relate to effective and safe e-commerce and other applications in the real world. Case studies along with projects will be assigned and performed.

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
Middlesex Community College
Author:
Ryan Fried
Date Added:
05/13/2019
Computer Systems Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The text, labs, and review questions in this book are designed as an introduction to the applied topic of computer security (cybersecurity). With these resources students will learn ways of preventing, identifying, understanding, and recovering from attacks against computer systems. This text also presents the evolution of computer security, the main threats, attacks and mechanisms, applied computer operation and security protocols, main data transmission and storage protection methods, cryptography, network systems availability, recovery, and business continuation procedures.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Activity/Lab
Homework/Assignment
Syllabus
Textbook
Author:
Ryan Tolboom
Date Added:
03/01/2023
Dementia, Big Data and Open Science
Unrestricted Use
Public Domain
Rating
0.0 stars

Although there is clear potential to improve science and innovation systems through big data and open science, barriers still remain with respect to data sharing efforts. How can the available massive and diverse data collections be used and shared more efficiently to boost global research and innovation and improve care? What actions are needed to facilitate open access to research data generated with public funding?

The OECD is bringing together policy makers, funding agencies and researchers to tackle the issue of open access to data, focused around developing good practice and principles on data governance. Four case studies highlight best practice and identify barriers to progress.

Following an OECD-hosted consultation with the Ontario Brain Institute (OBI), the United Kingdom Medical Research Council (MRC), and the US Alzheimer’s Association, two concrete examples of global data sharing have been created. The first, focused on providing a wealth of open-source biomedical data for the community (deep data), builds upon GAAIN, the Global Alzheimer’s Association Interactive Network, and links eleven international partners through a federated network of data resources. The capability of this network is being extended significantly through connections with the French National Alzheimer’s Database (BNA), the European Medicines Informatics Framework (EMIF), and the Canadian based Longitudinal Online Research and Imaging System (LORIS). The second focused on linking big data approaches at the population level (broad data), is a complementary collaboration between the Canadian Consortium on Neurodegeneration in Ageing and the Dementias Platform UK to share and analyse large-scale complex population-wide datasets from up to 2 million individuals, including imaging, genomics and health data.

As a result, these collaborations will enable the aggregation of an unprecedented volume of individual and population-level data, offering an open science solution to help research to more efficiently tackle Alzheimer’s disease and related disorders.

Subject:
Biology
Life Science
Material Type:
Reading
Author:
OECD
Date Added:
07/16/2021
Ethical Hacking for Effective Defense (Modules, Labs, and Lectures)
Unrestricted Use
CC BY
Rating
0.0 stars

The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:

https://oer.galileo.usg.edu/compsci-collections/8/

Topics include:

TCP/IP Level Attacks
Port Scanning
DDoS
Footprinting and Social Engineering
Enumeration
Programming for Security Professionals
Operating System Vulnerabilities
Embedded System Security
Hacking Web Servers
Hacking Wireless Networks
Cryptography
Protecting Networks with Security Devices

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
University System of Georgia
Provider Set:
Galileo Open Learning Materials
Author:
Hossain Shahriar
Date Added:
06/20/2018
Globalization, Migration, and International Relations, Spring 2006
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Tracing the evolution of international interactions, this course examines the dimensions of globalization in terms of scale and scope. It is divided into three parts; together they are intended to provide theoretical, empirical, and policy perspectives on source and consequences of globalization, focusing on emergent structures and processes, and on the implications of flows of goods and services across national boundaries -- with special attention to the issue of migration, on the assumption that people matter and matter a lot. An important concern addressed pertains to the dilemmas of international policies that are shaped by the macro-level consequences of micro-level behavior. 17.411 fulfills undergraduate public policy requirement in the major and minor. Graduate students are expected to explore the subject in greater depth through reading and individual research.

Subject:
Political Science
Social Science
Material Type:
Full Course
Provider:
MIT
Provider Set:
MIT OpenCourseWare
Author:
Choucri, Nazli
Date Added:
01/01/2006
Growing Up Digital-Provided by Baltimore County Public Schools
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

This website is a comprehensive look at digital citizenship for K-12 students, parents and teachers. It covers a wide variety of topics including: online security, online relationships and cyberbullying, digital footprint, digital citizenship, the use of copyrighted information and much more.

Subject:
Education
Material Type:
Activity/Lab
Diagram/Illustration
Student Guide
Date Added:
07/11/2018
Hidden in Plain Sight
Read the Fine Print
Educational Use
Rating
0.0 stars

Steganography is the science and art of hiding messages in plain sight so only the sender and intended recipient know the existence of a message. Steganography can be characterized as security through obscurity. Through this lesson, students experience a portion of the engineering design process as they research steganography and steganographic methods; identify problems, criteria and constraints; brainstorm possible solutions; and generate ideas. These are the critical first steps in the engineering design process, often overlooked by students who want to get to the "doing" phases—designing, building and testing. In computer science, a thorough design phase makes program implementation much easier and more effective. Students obtain practice with a portion of the design process that may be less exciting, but is just as important as the other steps in the process.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Derek Babb
Date Added:
09/18/2014
An Implementation of Steganography
Read the Fine Print
Educational Use
Rating
0.0 stars

Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated with this task, brainstorm solutions, select a solution, and implement it. Once their messages are hidden, classmates attempt to decipher them. Based on the outcome of the testing phase, students refine and improve their solutions.

Subject:
Applied Science
Computer Science
Engineering
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Brian Sandall
Derek Babb
Date Added:
09/18/2014
Inquiry Based Project: Privacy v. Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This Problem-Based Learning Assignment addresses the following questions:

- When do Americans have the right to privacy?
- Are there ever any circumstances where Americans should give up certain rights to privacy in order to have greater security measures to be protected by the government?

Grabber: a John Oliver video and two articles about snapchat and internet privacy, relevant to students' worlds

Introductory mini lesson is included

In the Culminating Activity students are researching the FBI v. Apple debate. They are split into four group sand must collaborate together to come up with a stance their perspective would agree with alongside historical events in history that support their side.

Subject:
Social Science
Material Type:
Lesson Plan
Date Added:
12/17/2018
K12 SIX Cybersecurity Frameworks (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

The K12 Security Information eXchange (K12 SIX) released “Cybersecurity Frameworks: What K-12 Leaders Need to Know,” a new resource for state and local education leaders encouraging the adoption of nationally recognized cybersecurity best practices. This white paper was commissioned by the State Educational Technology Directors Association (SETDA) as part of the work of its Cybersecurity & Privacy Collaborative.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
K12 SIX
Date Added:
10/18/2022
Living in an era of global terror
Conditional Remix & Share Permitted
CC BY-SA
Rating
0.0 stars

In this podcast, Professor Richard Aldrich from the School of Politics and International Relations, discusses the impact of globalisation, the opportunities this affords to global terrorists and the challenges faced by the intelligence services.

Globalisation has led to a free flow of money, people and ideas, which has benefited many people in the West in recent years and enhanced our standard of living, but the price paid is a reduction in security. As we see a shift towards a de-regulated global economy, with states removing controls over their borders, how does a state maintain its security? This has led to an increase in intelligence led activities and increasing expectations upon them.

In addition, Professor Aldrich discusses how mass communication has magnified the influence of terrorists and increased the problems faced by the security services. Finally, Professor Aldrich also discusses the challenges faced by the state in balancing our security, liberty and luxury. Are our civil liberties at risk?

Subject:
Social Science
Material Type:
Lecture
Provider:
University of Nottingham
Author:
Professor Richard Aldrich
Date Added:
03/21/2017
Living in an era of global terror
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this podcast, Professor Richard Aldrich from the School of Politics and International Relations, discusses the impact of globalisation, the opportunities this affords to global terrorists and the challenges faced by the intelligence services.

Globalisation has led to a free flow of money, people and ideas, which has benefited many people in the West in recent years and enhanced our standard of living, but the price paid is a reduction in security. As we see a shift towards a de-regulated global economy, with states removing controls over their borders, how does a state maintain its security? This has led to an increase in intelligence led activities and increasing expectations upon them.

In addition, Professor Aldrich discusses how mass communication has magnified the influence of terrorists and increased the problems faced by the security services. Finally, Professor Aldrich also discusses the challenges faced by the state in balancing our security, liberty and luxury. Are our civil liberties at risk?

Subject:
Social Science
Material Type:
Lecture
Provider:
University of Nottingham
Author:
Professor Richard Aldrich
Date Added:
03/22/2017
NSA Surveillance: A Debate
Unrestricted Use
CC BY
Rating
0.0 stars

Edward Snowden's revelations about government surveillance of private citizens sparked debate around the world about the trade off between privacy and security. The Institute for Humane Studies invited Professor Ronald Sievert of Texas A&M and Cindy Cohn, legal director for the Electronic Frontier Foundation to answer questions about government data collection. This is their debate.

Subject:
Political Science
Social Science
Material Type:
Lecture
Provider:
Institute for Humane Studies
Author:
Ronald Sievert
Date Added:
09/12/2017
Nuclear Security: Countering the Threat From States and Non-State Actors
Unrestricted Use
CC BY
Rating
0.0 stars

This edited volume brings together a number of articles and books written on the subject of nuclear security to provide the reader with a broad and deep understanding of the many issues that surround the subject. It is divided into three parts, covering the challenges associated with nuclear security as it pertains to countries, non-state actors/terrorism, and civilian nuclear facilities. Each of these areas poses its own unique problems and challenges.

Subject:
Political Science
Social Science
Material Type:
Textbook
Provider:
Oregon State University
Author:
Ben Wickizer
David Bernell
Meredith Bowers
Date Added:
01/06/2020
Operating Systems
Unrestricted Use
CC BY
Rating
0.0 stars

The course presents an overview of the history and structure of modern operating systems, analyzing in detail each of the major components of an operating system, and exploring more advanced topics in the field, such as security concerns. Upon successful completion of this course, the student will be able to: explain what an operating system does and how it is used; identify the various components of a computer system and how they interact with an operating system; describe the differences between a 32-bit and 64-bit operating system; explain the different types of operating systems and the major ones in use today; discuss the importance and use of threads and processes in an operating system; describe concurrency; explain the difference between a thread and a process; discuss context switching and how it is used in an operating system; describe synchronization; explain a race condition; discuss interprocess communication; describe how semaphores can be used in an operating system; discuss three of the classic synchronization problems; explain the alternatives to semaphores; discuss CPU scheduling and its relevance to operating systems; explain the general goals of CPU scheduling; describe the differences between pre-emptive and non-preemptive scheduling; discuss four CPU scheduling algorithms; explain what deadlock is in relation to operating systems; discuss deadlock prevention, avoidance, and their differences; describe deadlock detection and recovery; explain the memory hierarchy; discuss how the operating system interacts with memory; describe how virtual memory works; discuss three algorithms for dynamic memory allocation; explain methods of memory access; describe paging and page replacement algorithms; describe a file system and its purpose; discuss various file allocation methods; explain disk allocation and associated algorithms; discuss types of security threats; describe the various types of malware; explain basic security techniques; explain basic networking principles; discuss protocols and how they are used; explain reference models, particularly TCP/IP and OSI. (Computer Science 401)

Subject:
Applied Science
Computer Science
Material Type:
Full Course
Provider:
The Saylor Foundation
Date Added:
11/16/2011
Politics of Security: British and West German Protest Movements and the Early Cold War 1945-1970
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The Politics of Security tells the story of how people experienced the cold war as a war. It is about the impact of the cold war on political cultures. This crucial issue is often forgotten in historical memory. In particular, the book follows British and West German anti-nuclear-weapons activists in their attempts to campaign for and create security after the destruction of the Second World War, and how their own version of security clashed with concepts advanced by their own governments. But the book also demonstrates how, as part of the protests against nuclear weapons, activists and their societies learned to live with the Bomb: it recounts how activists first discovered the dangers of nuclear weapons, but how a different generation of activists came to focus on other issues as the Vietnam War became their primary concern. And it makes comprehensible how activists in two societies who had fought each other fiercely in the battle of dictatorships and democracies of the Second World War could now come to see each other as part of a common campaign. Fundamentally, with its transnational approach, the book highlights how these two societies drew on very similar arguments when they came to understand the cold war through the prism of the previous world war. The book is the first to capture in a transnational fashion what activists did on the marches and what it meant to them and to others. The book thus reminds us that threats are not merely out there, but that they need to be created in a political process that involves struggles for power and contestation.

Subject:
Political Science
Social Science
Material Type:
Reading
Provider:
Oxford University Press
Author:
Holger Nehring
Date Added:
01/01/2013
Privacy and Security
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This unit defines privacy, confidentiality, and security of health information, including the HIPPA Privacy and Security Rules.

Subject:
Applied Science
Health, Medicine and Nursing
Material Type:
Lecture
Provider:
Open Michigan
Provider Set:
Health IT Workforce Curriculum
Author:
Oregon Health & Science University
Date Added:
09/26/2014
Privacy and Security for Teens
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

How safe are your students online? This lesson includes resources with facts and tips about online privacy and security for students. Students will 1.) evaluate resources for best practices in cyber privacy and security and 2.) identify a goal to strengthen an area of cyber privacy and security in their online behavior. (Thumbnail image attribute: Alpha Stock Images http://alphastockimages.com/)

Subject:
Electronic Technology
Information Science
Material Type:
Lesson Plan
Author:
Alyssa King
Tracy Cramer
MSDE Admin
Date Added:
07/17/2018