The HANDbook
Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.
OVERVIEW
Activity Overview:
Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.
Meta description
- Grade Level : 9-12
- Subject Area: Mathematics
- Cybersecurity Concept:
- Defense in Depth, Confidentiality, Integrity, Availability, Think Like an Adversary, Keep it Simple
- Computer Science Domains:
- Computing Systems, Networks and The Internet
- Computer Science Principles:
- Fostering an Inclusive Computing Culture, Collaborating Around Computing
- Materials:
- Website, MS Word
- Considerations:
- Teachers should start to be able to determine sample questions from the students to be sure the learning process is more complete.
Lesson Plan
Overview
Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.
PRE/POST-TEST
Tell me what 3 objectives of the program
OBJECTIVES
Define the 6 Components of the HAND. Describe 4 aspects of each objectives.
CATCH/HOOK
This should allow the students to demonstrate what they have learned through practice.
ACTIVITY INSTRUCTIONS
“Talk to the Hand” and “Think like an Adversary”
The HANDbook - tres Fleming.docx
REVIEW
We will review the information that we learned every 2 weeks.
STANDARDS
FL
MA.8.DP.2 Represent and find probabilities of repeated experiments. MA.912.AR.2.5 Solve and graph mathematical and real-world problems that are modeled with linear functions. Interpret key features and determine constraints in terms of the context.