Lesson Plan
Last updated
Last updated
Define the Internet in their own words
Recall the difference between IAAS, PAAS, and SAAS
Understand that content placed on the Internet is permanent
Define the term "cyberspace"
Define the term "information security"
Define the term "information assurance"
Summarize how security fits into cyberspace
Recall and explain each part of the CIA triad
A distributed network of computers
Global in nature
Redundant
Define it as a "content delivery system"
World Wide Web
Social Media
Defining Cloud Computing
Users can access resources from anywhere in the world
Resources are typically redundantly stored and accessible
Defining "Cloud-As-A-Service"
Three types of service: IAAS, PAAS, SAAS
Define Infrastructure As A Service
Cloud accessible computing resources
Users have direct access to: operating system, storage, networking, etc
How they are accessed:
Remote Desktop
SSH
Web
Example: Amazon Elastic Cloud Computing (your lab)
Define Platform As A Service
Abstracted computing resources
Users never access the server hardware directly
Allows users to focus on application development and not server administration
Examples: Google AppEngine, Microsoft Azure
Define Software As A Service
Cloud accessible software
Instead of installing software on your workstation, its in the cloud
Examples: Google Apps, Dropbox
Define the data security problem
Due to the nature of the Internet, once something is posted it is there forever
Define cyberspace
Explain the difference between the "Internet" and "Cyberspace"
Explain that the US Military conducts operations in the following "domains": Land, Sea, Air, and Space
What makes cyberspace so different?
Cyberspace is a completely man-made
Operations are either offensive or defensive in nature
Define Cyber Operations
Cyber Offensive Operations
Exploit vulnerabilities for information gathering
Deceive or influence enemy
Deny, Degrade, Disrupt, Destroy enemy resources
Cyber Defensive Operations
Leverages intelligence, law enforcement, and state of the art technology
Prevent unauthorized access
Detect all instances of violations
Respond to all attacks and breaches
Define information security
Define information assurance (IA)
Explain how IA is important in cyberspace
Define each part of the CIA Triad
Confidentiality - keeping the data secure (e.g. encryption)
Integrity - preventing unauthorized modifications
Availability - allowing authorized access
Students will take a four-question quiz for this module
Understanding Abstraction - Chris Domas: The 1s and 0s behind cyber warfare
Defining IAAS, PAAS, SAAS Cyberspace Definition - Oxford Information Security - Wikipedia Information Assurance - Wikipedia Joint Publication 3-12: Cyberspace Operations
Course:
Principles of Cybersecurity
Lesson:
Cybersecurity Concepts
Intensity:
Low
Duration:
1.0 hour