The HANDbook

Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.

Author: Everett Fleming
Grade Level: 9-12
Standards: N/A
Materials: Website, MS Word

OVERVIEW

Activity Overview:

Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.

Meta description

  • Grade Level : 9-12
  • Subject Area: Mathematics
  • Cybersecurity Concept:
    • Defense in Depth, Confidentiality, Integrity, Availability, Think Like an Adversary, Keep it Simple
  • Computer Science Domains:
    • Computing Systems, Networks and The Internet
  • Computer Science Principles:
    • Fostering an Inclusive Computing Culture, Collaborating Around Computing
  • Materials:
    • Website, MS Word
  • Considerations:
    • Teachers should start to be able to determine sample questions from the students to be sure the learning process is more complete.

Lesson Plan

Overview

Implementing effective cybersecurity measures is particularly challenging today because there are more devices than people, and attackers are becoming more innovative.

PRE/POST-TEST

Tell me what 3 objectives of the program

OBJECTIVES

Define the 6 Components of the HAND. Describe 4 aspects of each objectives.

CATCH/HOOK

This should allow the students to demonstrate what they have learned through practice.

ACTIVITY INSTRUCTIONS

“Talk to the Hand” and “Think like an Adversary”

The HANDbook - tres Fleming.docx

REVIEW

We will review the information that we learned every 2 weeks.

STANDARDS

FL

MA.8.DP.2 Represent and find probabilities of repeated experiments. MA.912.AR.2.5 Solve and graph mathematical and real-world problems that are modeled with linear functions. Interpret key features and determine constraints in terms of the context.