# Lesson Plan

| **Course:**    | Principles of Cybersecurity |
| -------------- | --------------------------- |
| **Lesson:**    | Cybersecurity Concepts      |
| **Intensity:** | Low                         |
| **Duration:**  | 1.0 hour                    |

## LEARNING OBJECTIVES

* Define the Internet in their own words
* Recall the difference between IAAS, PAAS, and SAAS
* Understand that content placed on the Internet is permanent
* Define the term "cyberspace"
* Define the term "information security"
* Define the term "information assurance"
* Summarize how security fits into cyberspace
* Recall and explain each part of the **CIA triad**

## SUMMARY OF TASKS

### What is the Internet?

* A distributed network of computers
  * Global in nature
  * Redundant
* Define it as a "content delivery system"
  * World Wide Web
  * Email
  * Social Media
* Defining Cloud Computing
  * Users can access resources from anywhere in the world
  * Resources are typically redundantly stored and accessible
* Defining "Cloud-As-A-Service"
  * Three types of service: IAAS, PAAS, SAAS
  * Define Infrastructure As A Service
    * Cloud accessible computing resources
    * Users have direct access to: operating system, storage, networking, etc
    * How they are accessed:
      * Remote Desktop
      * SSH
      * Web
    * Example: Amazon Elastic Cloud Computing (your lab)
  * Define Platform As A Service
    * Abstracted computing resources
    * Users never access the server hardware directly
    * Allows users to focus on application development and not server administration
    * Examples: Google AppEngine, Microsoft Azure&#x20;
  * Define Software As A Service
    * Cloud accessible software
    * Instead of installing software on your workstation, its in the cloud
    * Examples: Google Apps, Dropbox
* Define the data security problem
  * Due to the nature of the Internet, once something is posted it is there forever

### What is Cyberspace?

* Define cyberspace
* Explain the difference between the "Internet" and "Cyberspace"
* Explain that the US Military conducts operations in the following "domains": Land, Sea, Air, and Space
  * What makes cyberspace so different?
    * Cyberspace is a completely man-made
  * Operations are either offensive or defensive in nature
    * Define Cyber Operations
    * Cyber Offensive Operations
      * **Exploit** vulnerabilities for information gathering
      * **Deceive** or **influence** enemy
      * **Deny, Degrade, Disrupt, Destroy** enemy resources
    * Cyber Defensive Operations
      * Leverages intelligence, law enforcement, and state of the art technology
      * **Prevent** unauthorized access
      * **Detect** all instances of violations
      * **Respond** to all attacks and breaches

### What is Information Security and Information Assurance?

* Define information security
* Define information assurance (IA)
* Explain how IA is important in cyberspace
  * Define each part of the CIA Triad
    * **Confidentiality** - keeping the data secure (e.g. encryption)
    * **Integrity** - preventing unauthorized modifications
    * **Availability** - allowing authorized access

## EVALUATION CRITERIA

Students will take a four-question quiz for this module

## RESOURCES

[Understanding Abstraction - Chris Domas: The 1s and 0s behind cyber warfare](https://www.ted.com/talks/chris_domas_the_1s_and_0s_behind_cyber_warfare)<br>

## REFERENCES

[Defining IAAS, PAAS, SAAS](https://www.computenext.com/blog/when-to-use-saas-paas-and-iaas/)\
[Cyberspace Definition - Oxford](https://en.oxforddictionaries.com/definition/us/cyberspace)\
[Information Security - Wikipedia](https://en.wikipedia.org/wiki/Information_security)\
[Information Assurance - Wikipedia](https://en.wikipedia.org/wiki/Information_assurance)\
[Joint Publication 3-12: Cyberspace Operations](http://www.dtic.mil/doctrine/new_pubs/jp3_12R.pdf)<br>


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://cap-cdta.gitbook.io/cyberspace-principles-course-instructors-guide/summary/cybersecurity-concepts/lesson-plan.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
