Intro to Cybersecurity HAND Concepts Part 2

This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general overview then have instruction and student work time for all of the 6 parts: Confidentiality (index), integrity (ring), Availability (thumb), Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm). Finally, at the end of the two days, we will wrap up knowledge and allow students work time to finish any activities. For Part 2, we will focus on Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm).

Author: Ashley Gecewicz
Grade Level: 9-12
Standards: N/A
Materials: Website

OVERVIEW

Activity Overview:

This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general overview then have instruction and student work time for all of the 6 parts: Confidentiality (index), integrity (ring), Availability (thumb), Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm). Finally, at the end of the two days, we will wrap up knowledge and allow students work time to finish any activities. For Part 2, we will focus on Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm).

Meta description

  • Grade Level : 9-12
  • Subject Area: Computer Science, Science, Technology
  • Cybersecurity Concept:
    • Defense in Depth, Think Like an Adversary, Keep it Simple
  • Computer Science Domains:
    • Computing Systems
  • Computer Science Principles:
    • Fostering an Inclusive Computing Culture
  • Materials:
    • Website
  • Considerations: +

Lesson Plan

Overview

This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general overview then have instruction and student work time for all of the 6 parts: Confidentiality (index), integrity (ring), Availability (thumb), Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm). Finally, at the end of the two days, we will wrap up knowledge and allow students work time to finish any activities. For Part 2, we will focus on Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm).

PRE/POST-TEST

Pre: What do you know about Cybersecurity already? Post: What have you learned about cyber security?

OBJECTIVES

Students Will Be Able To (SWBAT) identify the 6 parts of the hand and how they relate to cybersecurity. SWBAT compare and contrast the 6 different parts of the hand and their relationship with cybersecurity.

CATCH/HOOK

Get to work with micro:bits in further lessons and be hands on with technology.

ACTIVITY INSTRUCTIONS

Week 1

Meeting 2: Introduction to Cybersecurity Hand Concepts Part 2 Warm Up On a sticky note, recall the three parts of cybersecurity we learned yesterday and their hand counterparts. Lesson Activity 5 (25 min): Think like an Adversary (Middle) Instruction - 12 min Video Student work - 13 min Ethics activity All week 1 activities are linked here. Activity 6 (25 min): Keep it Simple (Pinky) Instruction - 12 min Video Student work - 13 min KIS Activity for Radio All week 1 activities are linked here. Activity 7 (25 min): Defense in Depth (Palm) Instruction - 12 min Video Student work - 13 min Activity of reading about cyber defense. All week 1 activities are linked here. Conclusion (35 minutes): Wrap up knowledge (5 min) Allow students work time (10 min)

https://docs.google.com/document/d/1cu5OrlQeVre0EQXso-3xTQ33rBA_U_clSQSwNAkkjpw/edit?usp=sharing

W1M2 - Intro to Cybersecurity Hand Concepts Part 2 Gencyber Lesson Plan - Ashley Gecewicz.pdf

REVIEW

Go over the hand concepts and allow student work time.

STANDARDS

FL