Upon completion of the Information Security & The CIA Triad lesson, students will:
1) explain confidentiality, integrity, and availability (CIA Triad) as the foundation of information security,
2) explore how email phishing attacks, fake social media accounts, ransomware,and identity theft can violate the cybersecurity goals of confidentiality, integrity and availability,
3) describe security controls that can be used to protect computing resources.
All materials in this Cybersecurity Concept Lesson is based upon work supported by the NCyTE Center and the National Science Foundation under Grant No. 1548315, Catalyzing Computing and Cybersecurity in Community Colleges (C5). C5 is a grant-funded project based at Whatcom Community College in Bellingham, WA. One of its goals is to develop and disseminate instructional materials to enhance computer science and cybersecurity courses.