Intro to Cybersecurity HAND Concepts Part 2
This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general overview then have instruction and student work time for all of the 6 parts: Confidentiality (index), integrity (ring), Availability (thumb), Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm). Finally, at the end of the two days, we will wrap up knowledge and allow students work time to finish any activities. For Part 2, we will focus on Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm).
OVERVIEW
Activity Overview:
This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general overview then have instruction and student work time for all of the 6 parts: Confidentiality (index), integrity (ring), Availability (thumb), Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm). Finally, at the end of the two days, we will wrap up knowledge and allow students work time to finish any activities. For Part 2, we will focus on Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm).
Meta description
- Grade Level : 9-12
- Subject Area: Computer Science, Science, Technology
- Cybersecurity Concept:
- Defense in Depth, Think Like an Adversary, Keep it Simple
- Computer Science Domains:
- Computing Systems
- Computer Science Principles:
- Fostering an Inclusive Computing Culture
- Materials:
- Website
- Considerations: +
Lesson Plan
Overview
This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general overview then have instruction and student work time for all of the 6 parts: Confidentiality (index), integrity (ring), Availability (thumb), Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm). Finally, at the end of the two days, we will wrap up knowledge and allow students work time to finish any activities. For Part 2, we will focus on Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm).
PRE/POST-TEST
Pre: What do you know about Cybersecurity already? Post: What have you learned about cyber security?
OBJECTIVES
Students Will Be Able To (SWBAT) identify the 6 parts of the hand and how they relate to cybersecurity. SWBAT compare and contrast the 6 different parts of the hand and their relationship with cybersecurity.
CATCH/HOOK
Get to work with micro:bits in further lessons and be hands on with technology.
ACTIVITY INSTRUCTIONS
Week 1
Meeting 2: Introduction to Cybersecurity Hand Concepts Part 2 Warm Up On a sticky note, recall the three parts of cybersecurity we learned yesterday and their hand counterparts. Lesson Activity 5 (25 min): Think like an Adversary (Middle) Instruction - 12 min Video Student work - 13 min Ethics activity All week 1 activities are linked here. Activity 6 (25 min): Keep it Simple (Pinky) Instruction - 12 min Video Student work - 13 min KIS Activity for Radio All week 1 activities are linked here. Activity 7 (25 min): Defense in Depth (Palm) Instruction - 12 min Video Student work - 13 min Activity of reading about cyber defense. All week 1 activities are linked here. Conclusion (35 minutes): Wrap up knowledge (5 min) Allow students work time (10 min)
https://docs.google.com/document/d/1cu5OrlQeVre0EQXso-3xTQ33rBA_U_clSQSwNAkkjpw/edit?usp=sharing
W1M2 - Intro to Cybersecurity Hand Concepts Part 2 Gencyber Lesson Plan - Ashley Gecewicz.pdf
REVIEW
Go over the hand concepts and allow student work time.
STANDARDS
FL