The team at Penn State Altoona has begun to create the interactive workbook teaching young students about cyber security. At the first team meeting members decided that create the workbook in the time allotted we would need to narrow our scope. Initially we believed we would be able to cover a variety of topics in many different ways. After further discussion and an established timeline we determined to create a ten module workbook. Next, we established after two meeting the content topics of each module. The tentative module outline is as follows: Module one: Introduction (The Internet and You) Module two: Confidentiality, Integrity, Availability (CIA) Module three: Components of an Information System (software, hardware, data, people, …show more content…
Currently each module will contain a short video presenting the lesson with a pull down tab depicting the dialog and images from the video. Following the video and text there will be a game testing the user on the lesson they have just reviewed. Lastly, each module will conclude with a short assessment including either multiple choice or matching questions. In regards to creating the video for each lesson members of the team have been researching several examples that young students can relate too. At this point in our research we are still determining a particular theme for all of the videos. The Penn State Altoona team is still deciding how students will receive digital badges throughout the work book as well. In addition, we have been working on the database design for this mobile application. We are in the process of completing a detailed data model. This model will help us understand the logical and physical design choices in order to help us in the creation of the
Read the instructions for the following activities and type in your responses. At the end of the lesson, click the link on the Summary screen to open the
The assessments have been done during and after the lesson in a variety of ways; verbal response, written response, pair and group work, and making posters as a visual outcome.
I will use a variety of Formative Assessments before, during, and at the end of the class to check for understanding and I will use the Exit Ticket as a final assessment.
Activity mode aims to provide quality study notes and tutorials to the students of CIS 500 Week 6 Case Study 1 Cyber Security in order to ace their studies.
During this course there have been a number of key learning points that would help every organization protect itself from a cyber-event. These include password management, patch management, security policies, encryption, and user training. In each of the cyber security breaches one or more of these standard security protocols were not used.
Introduction: - for my research project, I would like to explore about the cyber security measures. Cybersecurity covers the fundamental concepts underlying the construction of secure systems from the hardware to the software to the human computer interface, with the use of cryptography to secure interactions. These concepts are easily augmented with hands-on exercises involving relevant tools and techniques. We have different types of computer related crimes, cybercrimes, computer related offenses, federal approaches defenses. The information resources management has the technical matters for which IT are widely known. Cyber resources and cyber power as well as cyber security. We have spent a lot of time talking about many different high level critical infrastructure protection concepts we have general rule stayed away from cyber security explaining the ins and out of how the NIPP and NRF work together to ensure that we can live our daily live in relative comfort.
• Authored cyber defense and awareness, social engineering, and cover training content for the Executive Office of the President
Activity 5: Review and organise available data, information and knowledge according to proposed structure and content
Each week, the student will have a specific portion to submit (hereunder) as described in the modules. Prepare each assignment according to the APA guidelines found in the APA Style Guide, located in the Student Success Center. An abstract is not required.
With the widespread use of technology becoming more prominent, acts of cyber terrorism pose an increased threat to safety. Cyber terrorists exploit the internet and its users to commit acts that can be increasingly detrimental to their targets. Some of the terrorist activities include large scale corruption of computer networks by using tools like computer viruses. Certain individuals even have the ability of creating severe damage to government systems, national security systems and even hospital servers. Most of the technology made today only has intentions of making life easier for people. However, skilled users can manipulate the cyber world for negative intentions. Staying informed when it comes to cyber terrorism and cybercrime is important to do because of the increased reliance on technology in society. Steps to improve cyber security before an attack ensures the safety of sensitive information. The topic of cyber security and cyber warfare are interesting topics to keep up to date with. Understanding these topics can be beneficial to my dream of being in the FBI, ensuring the safety of others by working to prevent acts of cyberterrorism.
Write a response for each of these activities. At the end of the lesson, click the link on the final screen to open the Student Answer Sheet. Use the sample answers to evaluate your own work.
As a child, I grew up enjoying mathematics and science; this led to my dream of becoming an Information Security Analyst by majoring in Computer Engineering in college. I chose this profession because over the past couple of years, the world has become more dependent on technology, which means that there is more technology that needs to be developed and better network security will need to be implanted to meet the progressing world’s standards. By being in this profession, there will always be job opportunities in small and large companies because networks, computers, cell phones and many other gadgets are prone to being compromised. For example, Boeing is a prestigious, global company that is one of the leading manufacturers of cyber security that offers several internship and job opportunities to undergraduates and graduates. Future graduates will be able to learn reliable information on what they need to become an information security analyst because an intensive amount of time was taken to research and find credible sources.
Technology has grown tremendously over the past few decades. Everyday businesses, governments, and everyday people rely on technology for things from banking to communicating with loved ones and business associates. Disrupting this technology can cause major losses monetarily and in the sense of information. According to Information Security Curriculum Creation: A Case Study, “A survey of undergraduate degree programs in Computer Science, Information Technology, Management Information Science, and others show a lack of emphasis on security issues in their curriculum.” There is a strong need to secure and protect information for many, many reasons and as such it is important that an undergraduate curriculum provides a comprehensive approach to teaching information security concepts to its students.
The proposed document will include the following specific sections. This outline is tentative and may be adjusted in accord with new developments.
The connection between our company’s network security and end users is clear with data that has been reported. We should not only provide antivirus software, but create an education program emphasizing prevention, detection and adopting a “security” way of life. Everyone, at all levels, is responsible for our security.