Risk Lesson
Upon completion of the Risk lesson, students will:
1) Understand how computing resources can be misused,
2) Identify how computing resources and information assets can be vulnerable to attack,
3) Explain the role and types of protection mechanisms to achieve confidentiality, integrity, and availability of computing resources and information assets,
4) Summarize security and privacy risks from collecting and storing personal data on a computer system.
All materials in this Cybersecurity Concept Lesson is based upon work supported by the NCyTE Center and the National Science Foundation under Grant No. 1548315, Catalyzing Computing and Cybersecurity in Community Colleges (C5). C5 is a grant-funded project based at Whatcom Community College in Bellingham, WA. One of its goals is to develop and disseminate instructional materials to enhance computer science and cybersecurity courses.
A downloadable print version of this lesson, developed through a collaboration between the NSF-funded NCyTE Center and the CLARK cybersecurity curriculum library, is hosted on https://clark.center. Register for a free account on the CLARK website to download these and other cybersecurity teaching materials.
A web-based version of this lesson, developed through a collaboration between the NSF-funded NCyTE Center and CodeHS, is hosted on https://codehs.com. Register for a free CodeHS teacher account to access all the materials for this lesson.