Upon completion of the Risk lesson, students will:
1) Understand how computing resources can be misused,
2) Identify how computing resources and information assets can be vulnerable to attack,
3) Explain the role and types of protection mechanisms to achieve confidentiality, integrity, and availability of computing resources and information assets,
4) Summarize security and privacy risks from collecting and storing personal data on a computer system.
All materials in this Cybersecurity Concept Lesson is based upon work supported by the NCyTE Center and the National Science Foundation under Grant No. 1548315, Catalyzing Computing and Cybersecurity in Community Colleges (C5). C5 is a grant-funded project based at Whatcom Community College in Bellingham, WA. One of its goals is to develop and disseminate instructional materials to enhance computer science and cybersecurity courses.