Loading color scheme

Risk

Iterative ProcessThe Risk lesson will teach students to:

1)    understand how computing resources can be misused,

2)    identify how computing resources and information assets can be vulnerable to attack,

3)    explain the role and types of protection mechanisms to achieve confidentiality, integrity, and availability of computing resources and information assets, and

4)    summarize security and privacy risks from collecting and storying personal data on a computer system.

.

 

 


Lesson Overview

 

File: Word file
Size: 168 k
Download (Word)  

 

File: PDF file
Size: 606 k
Download (PDF)  

 

 

Presentation

 

File: Powerpoint file
Size: 1 MB
Download (Powerpoint)  

 

 

Risk & Consequences Activity

 

File: Word file
Size: 132 k
Download (Word)

 

File: PDF file
Size: 369 k
Download (PDF)

 

 

 

 


Risk Scenarios Activity

 

File: Word file
Size: 136 k
Download (Word)

 

File: PDF file
Size: 600 k
Download (PDF)

 

 

 

 

Asset Identification Activity

 

File: Word file
Size: 173 k
Download (Word)

 

File: PDF file
Size: 358 k
Download (PDF)

 

 

 

 

National Vulnerability Database Activity

 

File: Word file
Size: 10 MB
Download (Word)

 

File: PDF file
Size: 541 k
Download (PDF)

 

 

 

 

Defense In Depth Activity

 

File: Word file
Size: 133 k
Download (Word)

 

File: PDF file
Size: 366 k
Download (PDF)

 

 

 

 

Activity Solutions

 

Please send an email to obtain these files. Please provide the name of your institution and title. Email to: [email protected]

 

All Lesson Files

File: Zip file containing 7 files
Size: 2 MB
Titles:
Overview
Presentation
Risk & Consequences Activity
Risk Scenarios Activity
Asset Identification Activity
National Vulnerability Database Activity
Defense In Depth Activity

Activity Solutions - Not Included (see above)


Download all (Zip file)  

 

 

 

 

 

 

 View All Cybersecurity Lessons