Lesson Plan
Last updated
Last updated
Recognize a social engineering attack
Restate examples of personal identifiable information
Give examples of ethical violations
Give examples of proper reporting authorities
Recite code of conduct
Ask a student what their middle name is
Ask a student what their birthday is
Ask a student what their pet's name is
Ask a student where they were born
Define social engineering
Psychological manipulation to get someone to divulge confidential information
The questions that you were just asked are typical banking website security questions
Understanding information security is paramount
What is Personal Identifiable Information (PII)
Birthday
Parents' information
Address
Social Security Number
Don't give out PII to anyone who doesn't need it
Don't post about activities until after they happen
Vacations
Deployments
CAP missions
Respect others digital persona
Posted pictures with friends could compromise their security
Are they on vacation
Could someone be monitoring you to get to them
Victims of crimes could be hiding from their attackers
Don't post pictures that could compromise their location
Bottom Line
Keep private data private
Be respectful of each other
Think before you post, text, share
Define Operational Security (OPSEC)
5-step process
ID Critical Information
Analysis of threats
Analysis of vulnerabilities
Assessment of risk
Apply appropriate measures
One or two minor details could be combined to uncover a major operation
Example: A picture of a crash scene
Just a picture to some
EXIF data gives GPS coordinates and time when picture was taken
Define ethics
How humans define right or wrong conduct
Cyberspace may seem like the wild west
It's our duty to not: lie, cheat, or steal
Lie
Impersonate someone
Give false information
Cheat
Hack a voting machine to change an election
Break into school computer to change grades
Steal
Pirate software
Use the Internet to illegally take money
Discuss forensic procedures
Define Locards Exchange Principle
We can leave digital fingerprints
Law enforcement can use these to incriminate you
Just because you "clean your browser history" doesn't mean you're safe to commit a crime
It's our duty to report wrong doing
Report to your mentors/teachers
Report to your parents
Most cybersecurity certifications require a code of conduct
Violators may loose their certifications
Violators may loose their security clearance (government)
Read your course code of conduct
Students will take a five question quiz for this module
School Code of Conduct
Social Engineering - Wikipedia Ethics - Wikipedia Locards Exchange Principle - Wikipedia Operations Security - Wikipedia
Course:
Principles of Cybersecurity
Lesson:
Conduct and Ethics in a Digital World
Intensity:
Low
Duration:
1.0 hour