Lesson Plan

Course:

Principles of Cybersecurity

Lesson:

Cybersecurity Concepts

Intensity:

Low

Duration:

1.0 hour

LEARNING OBJECTIVES

  • Define the Internet in their own words

  • Recall the difference between IAAS, PAAS, and SAAS

  • Understand that content placed on the Internet is permanent

  • Define the term "cyberspace"

  • Define the term "information security"

  • Define the term "information assurance"

  • Summarize how security fits into cyberspace

  • Recall and explain each part of the CIA triad

SUMMARY OF TASKS

What is the Internet?

  • A distributed network of computers

    • Global in nature

    • Redundant

  • Define it as a "content delivery system"

    • World Wide Web

    • Email

    • Social Media

  • Defining Cloud Computing

    • Users can access resources from anywhere in the world

    • Resources are typically redundantly stored and accessible

  • Defining "Cloud-As-A-Service"

    • Three types of service: IAAS, PAAS, SAAS

    • Define Infrastructure As A Service

      • Cloud accessible computing resources

      • Users have direct access to: operating system, storage, networking, etc

      • How they are accessed:

        • Remote Desktop

        • SSH

        • Web

      • Example: Amazon Elastic Cloud Computing (your lab)

    • Define Platform As A Service

      • Abstracted computing resources

      • Users never access the server hardware directly

      • Allows users to focus on application development and not server administration

      • Examples: Google AppEngine, Microsoft Azure

    • Define Software As A Service

      • Cloud accessible software

      • Instead of installing software on your workstation, its in the cloud

      • Examples: Google Apps, Dropbox

  • Define the data security problem

    • Due to the nature of the Internet, once something is posted it is there forever

What is Cyberspace?

  • Define cyberspace

  • Explain the difference between the "Internet" and "Cyberspace"

  • Explain that the US Military conducts operations in the following "domains": Land, Sea, Air, and Space

    • What makes cyberspace so different?

      • Cyberspace is a completely man-made

    • Operations are either offensive or defensive in nature

      • Define Cyber Operations

      • Cyber Offensive Operations

        • Exploit vulnerabilities for information gathering

        • Deceive or influence enemy

        • Deny, Degrade, Disrupt, Destroy enemy resources

      • Cyber Defensive Operations

        • Leverages intelligence, law enforcement, and state of the art technology

        • Prevent unauthorized access

        • Detect all instances of violations

        • Respond to all attacks and breaches

What is Information Security and Information Assurance?

  • Define information security

  • Define information assurance (IA)

  • Explain how IA is important in cyberspace

    • Define each part of the CIA Triad

      • Confidentiality - keeping the data secure (e.g. encryption)

      • Integrity - preventing unauthorized modifications

      • Availability - allowing authorized access

EVALUATION CRITERIA

Students will take a four-question quiz for this module

RESOURCES

Understanding Abstraction - Chris Domas: The 1s and 0s behind cyber warfare

REFERENCES

Defining IAAS, PAAS, SAAS Cyberspace Definition - Oxford Information Security - Wikipedia Information Assurance - Wikipedia Joint Publication 3-12: Cyberspace Operations

Last updated