Introduction to Cybersecurity Hand Concepts
This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general overview then have instruction and student work time for all of the 6 parts: Confidentiality (index), integrity (ring), Availability (thumb), Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm). Finally, at the end of the two days, we will wrap up knowledge and allow students work time to finish any activities. For Part 1, we will focus on Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm).
OVERVIEW
Activity Overview:
This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general overview then have instruction and student work time for all of the 6 parts: Confidentiality (index), integrity (ring), Availability (thumb), Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm). Finally, at the end of the two days, we will wrap up knowledge and allow students work time to finish any activities. For Part 1, we will focus on Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm).
Meta description
- Grade Level : 9-12
- Subject Area: Computer Science, Mathematics, Science, Reading/Language Arts, Technology
- Cybersecurity Concept:
- Defense in Depth, Confidentiality, Integrity, Availability, Think Like an Adversary, Keep it Simple
- Computer Science Domains:
- Computing Systems, Impacts of Computing
- Computer Science Principles:
- Fostering an Inclusive Computing Culture
- Materials:
- Website
- Considerations: +
Lesson Plan
Overview
This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general overview then have instruction and student work time for all of the 6 parts: Confidentiality (index), integrity (ring), Availability (thumb), Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm). Finally, at the end of the two days, we will wrap up knowledge and allow students work time to finish any activities. For Part 1, we will focus on Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm).
PRE/POST-TEST
Pre: What do you already know about cyber security? Post: What have you learned about cyber security?
OBJECTIVES
Students Will Be Able To (SWBAT) identify the 6 parts of the hand and how they relate to cybersecurity. SWBAT compare and contrast the 6 different parts of the hand and their relationship with cybersecurity.
CATCH/HOOK
Students will trace out their hand on a paper and label them.
ACTIVITY INSTRUCTIONS
Week 1 Meeting 1: Introduction to Cybersecurity Hand Concepts Part 1 Warm Up On a sticky note, write down what you already know about cybersecurity. Lesson Activity 1 (15 min): General Overview Teaching the hand parts Activity 2 (25 min): Confidentiality (Index) Instruction - 12 min Video 1 Video 2 Student work - 13 min Super Hero Name All week 1 activities are linked here. Activity 3 (25 min): Integrity (Ring) Instruction - 12 min Video Student work - 13 min Thought Experiment All week 1 activities are linked here. Activity 4 (25 min): Availability (Thumb) Instruction - 12 min Video Student work - 13 min Two systems = too available, too secure, or well balanced? All week 1 activities are linked here.
https://docs.google.com/document/d/1AwGdRpNkUa_o1Bu3yFZBGIAtG1Eh3xOsJG15rbxfuXI/edit?usp=sharing
W1M1 - Intro to Cybersecurity Hand Concepts Part 1 Gencyber Lesson Plan - Ashley Gecewicz.pdf
REVIEW
Students will submit activities per part of the hand.
STANDARDS
FL