TALK TO THE HAND – THINK LIKE AN ADVERSARY
In this lesson, future CyberSecurity specialists (aka students) will develop a CyberSecurity handbook where they will explore six vital CyberSecurity concepts utilizing the HAND mnemonic learning method.
OVERVIEW
Activity Overview:
In this lesson, future CyberSecurity specialists (aka students) will develop a CyberSecurity handbook where they will explore six vital CyberSecurity concepts utilizing the HAND mnemonic learning method.
Meta description
- Grade Level : 9-12
- Subject Area: Technology
- Cybersecurity Concept:
- Think Like an Adversary
- Computer Science Domains:
- Impacts of Computing
- Computer Science Principles:
- Communicating About Computing
- Materials:
- Website, micro:bit, HANDbook
- Considerations:
- Review the concept prior to starting the lesson
Lesson Plan
Overview
In this lesson, future CyberSecurity specialists (aka students) will develop a CyberSecurity handbook where they will explore six vital CyberSecurity concepts utilizing the HAND mnemonic learning method.
PRE/POST-TEST
What does it mean to me Think Like an Adversary?What are some risks associated with Think Like an Adversary not being implemented?How can a Think Like an Adversary approach be used to prevent attacks?
OBJECTIVES
Define what it mean to Think Like an Adversary Identify risks associated with Think Like an Adversary not being implemented Explain how you can use the Think Like an Adversary approach prevent attacks
CATCH/HOOK
Have students take their rubber glove and label the appropriate finger for Think like an Adversary. They will “decorate” the finger to make it more meaningful.
ACTIVITY INSTRUCTIONS
We are going to start this lesson by watching two short videos. Then we will view a PowerPoint presentation to help you develop responses to the questions of: What do you think it means to think like an adversary? How can you use the concept of Think Like an Adversary to prevent attacks? What are some of the risks associated with NOT thinking like an adversary? and What are some real-life examples of where thinking like an adversary saved the day and what are some examples where NOT thinking like an adversary led to major issues? How can a Think Like an Adversary approach impact actions taken to enhance Cyber Security? What three core values to adversaries have in common? What are three things you can do to thwart adversaries?
REVIEW
Culminating activities for this lesson may include: updating the HANDbook, revisiting the K-W-L chart, designing a visual aid to explain the importance of thinking like an adversary.
STANDARDS
FL
21.0 Configure, compare and contrast methods for mobile security and hardware platforms. 22.0 Identify and enterprise attack vectors, remove malware, viruses, and other security risk software from desktops, laptop, and mobile devices. 23.0 Demonstrate proficiency identifying, and mitigating malicious threats using social and human elements in the workplace. 48.0 Demonstrate an understanding of network security threats and mitigation techniques.