Introduction to Cybersecurity�
GenCyber Teacher Pre-Camp: Day 1
Instructor: David Pratt
School of Education and Counseling
Purdue University Northwest
Purdue University Northwest
Purdue University Northwest
GenCyber Teacher Camp
Federal Program
Sustain cybersecurity interest at the K-12 level in order to build a competent, diverse, and adaptable cybersecurity workforce pipeline through alignment with the National Centers of Academic Excellence in Cybersecurity (NCAE-C).�
Purdue University Northwest
Purdue University Northwest
TODAY’s Agenda
Overview of Experience
Introductions
Overview of Cybersecurity
How to Teach Cybersecurity
Purdue University Northwest
Purdue University Northwest
Overview of Experience
Pre-Camp (online)
GenCyber Workshops (PNW)
Follow-Up Sessions
Purdue University Northwest
Purdue University Northwest
Agenda for this week
MONDAY – FRIDAY 9:00-10:30
Day 1: Camp Overview and Introductions (Dave)
Day 2: Robots, Sparki and Related Concepts (George)
Day 3: Hacking and Programming (Chuck)
Day 4: Review of SIX Cyber Security Concepts (Dave and Chuck)
Day 5: Website Resources and Lesson Plan format (Michael Tu and Dave)
Purdue University Northwest
Purdue University Northwest
Objectives
By the end of the GenCyber Teacher Camp, teachers will be able to:
Purdue University Northwest
Purdue University Northwest
Who are we??
Purdue University Northwest
Who We Are
Purdue University Northwest
Purdue University Northwest
Who are YOU?
Purdue University Northwest
Purdue University Northwest
Cybersecurity- Just for IT people???
Purdue University Northwest
Purdue University Northwest
Cybersecurity Facts for 2022
DAMAGE: $190,000 every SECOND!
Purdue University Northwest
Purdue University Northwest
Notable Cybersecurity Attacks
Reference: https://digitalguardian.com/blog/biggest-incidents-cybersecurity-past-10-years-infographic
2013–2014
Target and Home Depot
2015
Experian Data Breach
2017
Equifax Data Breach
2017
Windows Computers attacked
2017
Uber
2018
Marriot
2021
Colonial Pipeline attack
Purdue University Northwest
Purdue University Northwest
v
Purdue University Northwest
Purdue University Northwest
Purdue University Northwest
Purdue University Northwest
\
Purdue University Northwest
Approaches to Teaching
Purdue University Northwest
Purdue University Northwest
Survey of Teachers: How to Teach
207 out of 214 respondents (97%) agreed with the prompt, “I would like to learn more about cybersecurity.”
Are your students motivated to learn through playing games? YES (98%)
“If you were provided with computer games that teach cybersecurity concepts and knowledge, would you use them to teach cybersecurity or related topics in the future?” YES (85%)
Purdue University Northwest
Purdue University Northwest
Survey of Teachers: How to Teach
Question | Interested | Very interested | Total |
Cyber hacking | 39% | 44% | 83% |
Computer forensics investigation | 39% | 44% | 83% |
Robotic game programming | 37% | 45% | 82% |
3D games | 38% | 41% | 79% |
Purdue University Northwest
Purdue University Northwest
Resources for Cybersecurity
Purdue University Northwest
Purdue University Northwest
The Curriculum: Robotics and Programming
22
Purdue University Northwest
Purdue University Northwest
23
The Curriculum: Ethical Hacking
24
Purdue University Northwest
Purdue University Northwest
The Curriculum: Digital Forensics
25
Purdue University Northwest
Purdue University Northwest
26
Discussion Time
Purdue University Northwest
What can I teach about Cyber?
Careers/Post-secondary opportunities
Digital Citizenship
Cybersecurity topics
Purdue University Northwest
Purdue University Northwest
First Principles of Cybersecurity
Data Hiding – The principle of keeping information inaccessible except within the process itself.
Abstraction – The principle that the interface of a hardware or software component should be independent of its implementation.
Resource Encapsulation – The process of separating an entity (system, object or hardware) to include and isolate its own data.
Modularity – The process of separating functionality into independent pieces to ensure each piece performs a separate function and keeps its own data.
Layering – The process of providing multiple layers of protection or controls between critical data and attackers; layered security can be considered one step of defense-in-depth strategy.
Least Privilege – The principle of allowing entities (people, processes, devices) only the capabilities necessary to accomplish their assigned duties and functions.
Domain Separation – Implies that data, processes, and systems should logically define their area of control (domain).
Process Isolation – Ensuring that programs or operating systems run completely separate from other programs or operating systems for the purpose of controlling access to system resources memory.
Simplicity - the quality of designing programs, systems, and processes to be free of complexity, easier to test, easier to operate, easier to protect.
Minimization – keeping all design and functionality aspects to a minimum, reducing needless size and complexity.
Purdue University Northwest
Purdue University Northwest
Cybersecurity Concepts OVERVIEW
Each part of the "hand" works together as a whole unit, just like each of your fingers and the palm. As such, each concept is dependent on the next - when one is compromised or not optimal, the entire system is compromised.
Purdue University Northwest
Purdue University Northwest
Defense in Depth
Definition: A comprehensive strategy of including multiple layers of security within a system so that if one layer fails, another layer of security is already in place to stop the attack/unauthorized access.
Example: To make a purchase on Xbox, you must sign into Xbox, enter a password, and enter a 6-digit pin.
Terminology:
access control
Dual
Authentication
Authorization
Cipher
Cryptography
Cybersecurity
Firewall
Information security policy
Password
computer network defense
Purdue University Northwest
Purdue University Northwest
Think Like an Adversary
Definition: The strategy of putting yourself inside the mindset of a potential attacker that allows you to anticipate attack strategies and defend your systems accordingly.
data breach
denial of service
Hacker
Adversary
Ethical Hacking
Example: Programmers of grade-keeping software enhance products by looking at situations were students or parents were able to break into gradebooks.
Terminology:
Purdue University Northwest
Purdue University Northwest
Availability
Definition: The property that information or information systems are accessible and usable on demand.
Example: Soon, DESMOS graphing calculator capabilities will be accessible during the online version of the SAT.
Terminology/Vocabulary:
system administration
security policy
Purdue University Northwest
Purdue University Northwest
Integrity
Definition: The property that data or a component of a system has not been modified in an unauthorized manner. The system maintains the data as expected and updates the data as often as planned.
Example: The system maintains the data as expected and updates the data as often as planned.
Terminology/Vocabulary:
antivirus software
data integrity
trojan horse
Virus
Worm
Spyware
Spam
Spoofing
electronic signature
malicious code
Malware
Phishing
Purdue University Northwest
Purdue University Northwest
Confidentiality
Definition: The property that information is not disclosed to unauthorized individuals, entities, or processes; preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
Example: Individual's salary and benefits information is accessible to only the human resource department in a company.
Terminology/Vocabulary:
VPN
Decryption
Encryption
Purdue University Northwest
Purdue University Northwest
Keep It Simple
Definition: Value of keeping computer programming/system design simple without compromising the ability to protect information/data from unauthorized access.
Example: Writing a program with as few lines as possible, using loops and defined operations to make repeated calculations or drawings.
Purdue University Northwest
Purdue University Northwest
Lesson Plans
Purdue University Northwest
Purdue University Northwest
Resources
https://sites.google.com/view/gencyberpnw/home
Purdue University Northwest
Purdue University Northwest
Final thoughts?
Purdue University Northwest
Purdue University Northwest
Thank you!
Purdue University Northwest
Purdue University Northwest