Introduction to Cybersecurity Hand Concepts

This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general overview then have instruction and student work time for all of the 6 parts: Confidentiality (index), integrity (ring), Availability (thumb), Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm). Finally, at the end of the two days, we will wrap up knowledge and allow students work time to finish any activities. For Part 1, we will focus on Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm).

Author: Ashley Gecewicz
Grade Level: 9-12
Standards: N/A
Materials: Website

OVERVIEW

Activity Overview:

This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general overview then have instruction and student work time for all of the 6 parts: Confidentiality (index), integrity (ring), Availability (thumb), Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm). Finally, at the end of the two days, we will wrap up knowledge and allow students work time to finish any activities. For Part 1, we will focus on Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm).

Meta description

  • Grade Level : 9-12
  • Subject Area: Computer Science, Mathematics, Science, Reading/Language Arts, Technology
  • Cybersecurity Concept:
    • Defense in Depth, Confidentiality, Integrity, Availability, Think Like an Adversary, Keep it Simple
  • Computer Science Domains:
    • Computing Systems, Impacts of Computing
  • Computer Science Principles:
    • Fostering an Inclusive Computing Culture
  • Materials:
    • Website
  • Considerations: +

Lesson Plan

Overview

This lesson will take two days to go over the 6 parts of the hand in relation to cybersecurity. We will do a general overview then have instruction and student work time for all of the 6 parts: Confidentiality (index), integrity (ring), Availability (thumb), Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm). Finally, at the end of the two days, we will wrap up knowledge and allow students work time to finish any activities. For Part 1, we will focus on Think like an Adversary (middle), Keep it Simple (Pinky), and Defense in Depth (Palm).

PRE/POST-TEST

Pre: What do you already know about cyber security? Post: What have you learned about cyber security?

OBJECTIVES

Students Will Be Able To (SWBAT) identify the 6 parts of the hand and how they relate to cybersecurity. SWBAT compare and contrast the 6 different parts of the hand and their relationship with cybersecurity.

CATCH/HOOK

Students will trace out their hand on a paper and label them.

ACTIVITY INSTRUCTIONS

Week 1 Meeting 1: Introduction to Cybersecurity Hand Concepts Part 1 Warm Up On a sticky note, write down what you already know about cybersecurity. Lesson Activity 1 (15 min): General Overview Teaching the hand parts Activity 2 (25 min): Confidentiality (Index) Instruction - 12 min Video 1 Video 2 Student work - 13 min Super Hero Name All week 1 activities are linked here. Activity 3 (25 min): Integrity (Ring) Instruction - 12 min Video Student work - 13 min Thought Experiment All week 1 activities are linked here. Activity 4 (25 min): Availability (Thumb) Instruction - 12 min Video Student work - 13 min Two systems = too available, too secure, or well balanced? All week 1 activities are linked here.

https://docs.google.com/document/d/1AwGdRpNkUa_o1Bu3yFZBGIAtG1Eh3xOsJG15rbxfuXI/edit?usp=sharing

W1M1 - Intro to Cybersecurity Hand Concepts Part 1 Gencyber Lesson Plan - Ashley Gecewicz.pdf

REVIEW

Students will submit activities per part of the hand.

STANDARDS

FL