Download presentation
Presentation is loading. Please wait.
1
JMU GenCyber Boot Camp Wrap up
2
Goals Have fun! Teach you about Cyber Defense so that you can:
Interest your students in Cyber Defense Teach your students about Cyber Defense Cyber Defense Clubs CyberPatriot Program
3
Exercises Virtual machines (VMs) are great for hands-on Cyber Defense exercises You can create and use VMs with your students using free software: VirtualBox: VMWare Player:
4
Why You (and Your Students) Should Not Be Attackers
It is illegal: United States Code, Title 18, Section 1030 (and others) USA Patriot Act, Homeland Security Act, PROTECT Act Basically: Unauthorized access or use of a computer or network system is illegal Unintentional attacks are illegal too
5
Understanding the Systems You are Defending
You cannot effectively defend what you don't understand Think about what needs to be defended (security triad)
6
Understanding Your Adversaries
Can evaluate systems you defend as attackers will Can implement countermeasures designed to thwart attackers Better understand the implications of certain decisions
7
Understanding Tools and Techniques at Your Disposal
What security policies and mechanisms you will employ? What are your goals? Prevention Detection Recovery What policies and mechanisms are justified?
8
© 2015 James Madison university
Cyber Defense Protect Detect Triage Respond Prepare JMU GenCyber Boot Camp © 2015 James Madison university 8 8
9
© 2015 James Madison university
The Security Triad Confidentiality – information is protected from unauthorized access Example? Integrity – information is protected from unauthorized modification Availability – timely access to information (by authorized people) is ensured JMU GenCyber Boot Camp © 2015 James Madison university 9 9
10
© 2015 James Madison university
GenCyber Cybersecurity First Principles Domain Separation Process Isolation Resource Encapsulation Modularity Least Privilege Abstraction Data Hiding Layering Conceptually Simple Minimization JMU GenCyber Boot Camp © 2015 James Madison university 10 10
11
Useful Links https://www.nist.gov/itl/applied-cybersecurity/nice
NICE is a national campaign designed to improve the cyber behavior, skills, and knowledge of every segment of the population, enabling a safer cyberspace. Securing our online lives is a shared responsibility. To educate and empower our global digital society to use the internet safely and securely. Securing Our eCity organization provides awareness of potential issues and offers free cybersecurity information and education. - OnGuardOnline.gov is the federal government’s website to help you be safe, secure and responsible online.
12
Useful Links - A Free Educational Resource Created by Carnegie Mellon University to Empower You to Secure Your Part of Cyberspace - At the Carnegie Cyber Academy, cadets complete several training missions in Cyberspace that equip them with the skills they need to be good cybercitizens and Cyber Defenders of the Internet. - NetSupport School is the class-leading training software solution, providing teachers with the ability to instruct and visually/audibly monitor, as well as interact with their students, individually, as a pre-defined group or to the whole class.
13
Useful Links (cont) - US-CERT’s mission is to improve the nation's cybersecurity posture, coordinate cyber information sharing, and proactively manage cyber risks to the nation while protecting the constitutional rights of Americans. - The SANS Institute was established in 1989 as a cooperative research and education organization. Its programs now reach more than 165,000 security professionals around the world. - The Information Systems Security Association's official website. - Cyber security resources and certification information. - Federal trade commission provides several resources in identity theft, file sharing, and others.
14
Other web-based resources
This website contains downloadable tip sheets, cyberbullying stats, and a downloadable PDF book entitled, Words Wound: Delete Cyberbullying and Make Kindness Go Viral. Link to PDF of book that could be used for journal activities: The Price of Shame: Monica Lewinsky TedTalk The Amanda Todd Story
15
Other web-based resources
• • • • •
16
Final Thoughts Thank you for your participation!
We hope you can use what we have learned to interest your students in Cyber Defense If we can be of assistance in the future, just ask Have a Great Summer
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.