3-16-2020
Monday
Week of 3-16-2020
Monday
Cypher and Early Cryptograph
Tuesday
Cypher and Early Cryptograph
Wednesday
Cypher and Early Cryptograph
Thursday
Symmetric and asymmetric Encryption
Friday
Symmetric and asymmetric Encryption
Week of 3-9-2020
Monday
Learning Target: I will be able to describe the difference between normal and abnormal network traffic related to wireless networks.
Complete 3.3.4: Analyzing Wireless Authentication
Tuesday
Learning Target: I will be able to complete and turn in all work for section 3.3: Analyzing Packet Fragmentations and review for Wednesday's quiz.
Wednesday
3.3 Quiz
Introduce 4.1: Ciphers and Early Cryptography
Thursday
Continue Exploring Ciphers
Create your own message using the above ciphers.
Friday
NO SCHOOL
Week of 3-02-2020
Monday
3.3.3: Analyzing Packet Fragmentation
Tuesday
3.3.3: Analyzing Packet Fragmentation Continued
Wednesday
3.3.4: Analyzing Wireless Authentication
Thursday
3.3.4: Analyzing Wireless Authentication Continued
Friday
NO SCHOOL
Week of 2-24-2020
Monday
Learning Target: I will be able to tell the difference between normal and abnormal network traffic related to the Address Resolution Protocol (ARP).
Analyzing Address Resolution
Customizing Wireshark
Tuesday
Analyze Control Message
Wednesday
Analyze Control Message
Thursday
Analyze Packet Fragmentation
Friday
Analyze Packet Fragmentation
Week of 2-3-2020
Monday
3.2.3: Unknown Network Traffic
Tuesday
3.2.4: Analyze and Defend Network Traffic
Wednesday
3.2.4: Analyze and Defend Network Traffic (continued)
Thursday
3.2.4: Analyze and Defend Network Traffic (continued)
Friday
Exploring Security Frameworks
Week of 1-27-2020
Monday
NO SCHOOL
Tuesday
3.2.3: Unknown Network Traffic
Wednesday
3.2.3: Unknown Network Traffic (Continued)
Thursday
3.2.4: Analyze and Defend Network Attacks
Friday
3.2.4: Analyze and Defend Network Attacks (continued)
Week of 1-20-2020
Monday
3.1.2: Access Control
Tuesday
Complete 3.1.2: Access Control
Wednesday - Thursday - Friday
3.1.3: Analyzing Processes in Linux
Week of 1-2-2020
Monday
Learning Target: I will be able to retell past concepts by playing a review game about 1st semester topics.
Review Game
Tuesday
Complete 3.1.1:
Changes needed?
Reread cyber case
complete Lab
Wednesday
3.1.2: Access Control
Thursday
3.1.2: Access Control
Friday
3.1.3: Analyzing Processess
Week of 12-16-2019
Monday
Learning Target: I will be able to use Linux command lines to navigate file systems and navigate files and directories.
Linux Operating System
Tuesday
Learning Target: I will be able to use Linux command lines to navigate file systems and navigate files and directories.
Linux Operating System
Wednesday
Learning Target: I will be able to learn Linux commands by playing Linux games.
Printed Linux commands
Thursday
NO CLASS. SEMESTER FINALS SCHEDULE
Friday
Learning Target: I will be able to learn Linux commands by playing Linux games.
Printed Linux commands
Week of 12-9-2019
Monday
Server Attacks
Tuesday
Confirm Communication is Valid
Wednesday
Unit test and vocab
Thursday
2.4.1: Ecommerce Enrichment
Friday
2.4.1: Ecommerce Enrichment
Plan a Pentest
Monday
Learning Target: I will be able to describe how data packets travel through hosts and routers by playing the Router Game.
3.2.2: Stopping the Spread of Malware
Tuesday
Learning Target: I will be able to describe what Wireshark is and what the program does.
Wireshark in the Lab.
Wednesday
Learning Target: I will be able to describe what Wireshark is and what the program does.
Wireshark in the Lab
Thursday
Learning Target: I will be able to describe various types of packets and and how they are involved in a brute force attack.
Server Attacks
Friday
Learning Target: I will be able to describe various types of packets and and how they are involved in a brute force attack.
Server Attacks
Monday
Guest speaker
Former NW student: Brady Semm will come and speak to the Cybersecurity class about his education and employment as a Cybersecurity Analysis.
Tuesday:
Learning Target: I will be able to describe what Structured Query Language (SQL) is, how attackers exploit SQL, and how to protect against attacks.
Structured Query Language
Wednesday
CANSTRUCTION
short day
Thursday and Friday
NO SCHOOL
THANKSGINVING
Week of 11-18-2019
Monday
Learning Target: I will complete my Cybersecurity Notebook responses, screenshots, conclusions, and review for Tuesday's test.
Tuesday
Wednesday
Learning Target: I will be able to describe the network topology of the client-server architecture and how JavaScript programs work
Securing Ecommerce Data
Thursday
Learning Target: I will be able to describe the network topology of the client-server architecture and how JavaScript programs work
Continue Securing E-commerce Data
Friday
Learning Target: I will be able to analyze data packets and reduce a ping flood attack.
Stopping the Spread of Malware
11-11-2019
Monday
Learning Target: I will be able to reduce web vulnerabilities by using direct browsing and moving log files.
2.2.4: Server Analysis
Tuesday
Learning Target: I will be able to reduce server vulnerabilities and document steps.
2.2.4: Secure the Server
Document steps to secure server
Wednesday
Learning Target: I will be able to successfully pass the unit test over server vulnerabilities.
unit test and vocab
Thursday
Secure Ecommerce Data
Learning Target: I will be able to describe the client-server architecture.
Friday
NO SCHOOL
Week of 11-4-2019
Monday
Learning Target: I will be able to describe levels of sophistication of malware types and what motivates malicious users.
2.2.1: More on Malware
Malware in Depth
In cyberteams, research the following DDoS attacks. Share your research with the team.
Tuesday
Learning Target: Investigate a web server for directory browsing and log file location vulnerabilities.
Server Vulnerabilities
Wednesday
Learning Target: Investigate a web server for directory browsing and log file location vulnerabilities.
Server Vulnerabilities
Thursday and Friday
Learning Target: I will make web servers less vulnerable by using directory browsing, default log file location, and unanimous FTP.
Server Analysis
Week of 10-28-2019
Monday
Learning Target: I will be able to collaborate with my Cybersecurity team to create a network topology.
Network Topology Introduction
Tuesday
Learning Target: I will be able to collaborate with my Cybersecurity team to create a network topology.
Compare Amazon topology with other cyber team in class
Wednesday
Learning Target: I will be able to collaborate with my Cybersecurity team to create a network topology.
Present your network topology to class
Thursday
Learning Target: I will be able to describe levels of sophistication of malware types and what motivates malicious users.
2.2.1: More on Malware
Friday
Learning Target: I will be able to describe levels of sophistication of malware types and what motivates malicious users.
2.2.1: More on Malware
Malware in Depth
Week of 10-21-2019
Monday
Learning Target: I will be able to analyze systems while causing minimal impact.
Tuesday:
Learning Target: I will be able to analyze systems while causing minimal impact.
Wednesday
Learning Target: I will be able to begin to design an unplugged network topology for a client's website.
Thursday
Learning Target: I will be able to begin to design an unplugged network topology for a client's website.
Friday
Learning Target: I will be able to describe the difference between a Black Hat, White Hat, or Grey Hat Hacker
More on Malware
Week of 10-14-2019
Monday
Learning Target: I will be able to describe what the Cybersecurity CIA Triad is by defining confidentiality, integrity, and availability.
Clarify expectations when completing Cybersecurity Notebook
You have been hired to set up a secure network for your customer’s e-commerce business.
The CIA Triad (15 minutes)
#6: Team members record in Cybersecurity Notebooks
The E-commerce Site (10 minutes)
Tuesday.
Learning Target: I will be able to activate the Google extension called Disconnect to stop popup ads from appearing when browsing the Internet.
Cybersecurity is Everywhere:
The Internet of Things (IoT)
CIA, IoT, and Social Engineering
#13: Launch Security Lab
Quick Research
If students complete Activity 2.1.1 early, you may choose to have them research an IoT-related cyberattack or breach that’s been published in the news (article or video). Students answer the following questions in their notebooks:
Conclusion
Wednesday
Week of 10-7-2019
Monday -Wednesday
1.3.1: Protect Your Data
Thursday and Friday
2.1.1: Confidentiality, Integrity and Availability
Week of 9-30-2019
Monday
Complete 1.2.5: It's a Trap
Learning Target: I will collaborate with my team to using strategies to secure a computer against a variety of security weaknesses learned from 1.2.1, 1.2.2, 1.2.3, and 1.2.4.
Tuesday
Learning Target: I will be able to successfully pass Unit 1.2 test and vocabulary
Wednesday / Thursday / Friday
Learning Target: I will be able to secure a computer against suspicious processes, downloads, and files.
1.3: A Dangerous Situation
Monday
Week of 3-16-2020
Monday
Cypher and Early Cryptograph
- Bell Ringer: Christmas Story: Ovaltine secret message
- Self Assessment
- Read Cybercase
- Independent Practice with partner: Match correct terms, definitions, and picture together
- Read history of cryptograph
- Assign ciphers to groups
- encrypt and decrypt a code
Tuesday
Cypher and Early Cryptograph
- encrypt and decrypt your code
- make (encrypt) a code for class
- teach class how to decrypt your specific encryption type
- give class your encrypted code
- class decrypts your code
- 4 groups
Wednesday
Cypher and Early Cryptograph
- Origami Cipher Key
- create origami cypher key
- create skip reading key
- create homophone substitution
Thursday
Symmetric and asymmetric Encryption
- Keeping info secret
- symmetric key encryption
- symmetric key confidentiality
- creating symmetric keys
- advantages and disadvantages of symmetric encryption
Friday
Symmetric and asymmetric Encryption
- Asymmetric Key Encryption
- Asymmetric Confidentiality
- Asymmetric Algorithm
- Asymmetric Encryption Integrity
- Advantages and disadvantages of Asymmetric Encryption
Week of 3-9-2020
Monday
Learning Target: I will be able to describe the difference between normal and abnormal network traffic related to wireless networks.
Complete 3.3.4: Analyzing Wireless Authentication
- Cracking Wireless Passwords
- Aircrack-ng Tool
- Protect against wireless password attacks
- Conclusion questions
Tuesday
Learning Target: I will be able to complete and turn in all work for section 3.3: Analyzing Packet Fragmentations and review for Wednesday's quiz.
- update notebook
- review for Wednesday's quiz
Wednesday
3.3 Quiz
Introduce 4.1: Ciphers and Early Cryptography
- History of Cryptography
- Exploring Cyphers
- Caesar Cipher
- Affine Cipher
- Vigenere Cipher
- Pigpen Cipher
Thursday
Continue Exploring Ciphers
Create your own message using the above ciphers.
Friday
NO SCHOOL
Week of 3-02-2020
Monday
3.3.3: Analyzing Packet Fragmentation
- IP Packets in Detail
- Internet Protocol Fragmentation
Tuesday
3.3.3: Analyzing Packet Fragmentation Continued
- TCP Teardrop
- Wireshark Data Visualization
- Protect Against TCP Teardrop Attacks
Wednesday
3.3.4: Analyzing Wireless Authentication
- Wireless Networking
- 802.11 Packet
Thursday
3.3.4: Analyzing Wireless Authentication Continued
- Cracking Wireless Passwords
- Protecting against wireless password attacks
- Conclusion questions
Friday
NO SCHOOL
Week of 2-24-2020
Monday
Learning Target: I will be able to tell the difference between normal and abnormal network traffic related to the Address Resolution Protocol (ARP).
Analyzing Address Resolution
- Segments, Packets and Frames
- ARP Requests
- ARP Responses
- ARP Tables
- Details within the ARP Package Request
- Details within the ARP Package Reply
Customizing Wireshark
Tuesday
Analyze Control Message
- Review ARP and OSI Model
- Internet Control Message
- Time to Live (TTL)
- Traceroute in Wireshark
Wednesday
Analyze Control Message
- Smurf Attack
- Protect against Denial of Service (DoS)
- Conclusion
Thursday
Analyze Packet Fragmentation
- IP Packet Details
- Internet Protocol
- Fragmentation
Friday
Analyze Packet Fragmentation
- Wireshark Data Visualization
- Protect against TCP Teardrop Attacks
Week of 2-3-2020
Monday
3.2.3: Unknown Network Traffic
- complete section and lab
- catch up work day
Tuesday
3.2.4: Analyze and Defend Network Traffic
- Analyze Data
- Activate Lab
- Network and Host Based Firewalls
Wednesday
3.2.4: Analyze and Defend Network Traffic (continued)
- IP Tables Utility
- Improving Network Security
Thursday
3.2.4: Analyze and Defend Network Traffic (continued)
- Verify Firewall Rules
Friday
Exploring Security Frameworks
- Ethical Hacking
- Reconnaissance
- Activate lab
- Scanning
Week of 1-27-2020
Monday
NO SCHOOL
Tuesday
3.2.3: Unknown Network Traffic
- Detecting Network Attacks
- Network Scans
- Execute a Zenmap Network Scan
- Activate lab
Wednesday
3.2.3: Unknown Network Traffic (Continued)
- Browse Web01 from PumpMonitor
- Transfer a File from WEB01 to Pump PLC
Thursday
3.2.4: Analyze and Defend Network Attacks
- analyze the data
- lab
- network and host based firewalls
- improving network security
- verify firewall rules
Friday
3.2.4: Analyze and Defend Network Attacks (continued)
- improving network security
- verify firewall rules
Week of 1-20-2020
Monday
3.1.2: Access Control
- user access to system resources
- permission matrix
- Activate Lab
- file types in Linux
Tuesday
Complete 3.1.2: Access Control
- a security scenario
- hidden files
- encryption
- second security scenario
- ethical scenario
- Cell phone
Wednesday - Thursday - Friday
3.1.3: Analyzing Processes in Linux
- process status Command -ps
- system files and more commands
- monitory process ownership
- background processes
- a simple shell script
- malicious user
- use grep to search
- terminal process with KILL
- the su command
- conclusion
Week of 1-2-2020
Monday
Learning Target: I will be able to retell past concepts by playing a review game about 1st semester topics.
Review Game
Tuesday
Complete 3.1.1:
Changes needed?
Reread cyber case
complete Lab
Wednesday
3.1.2: Access Control
- user access to system resources (read)
- Permission Matrix
- Activate Lab
- file types in Linux
Thursday
3.1.2: Access Control
- a security scenario
- hidden files
- encryption
- second security scenario
- ethical situation: smartphone data
Friday
3.1.3: Analyzing Processess
Week of 12-16-2019
Monday
Learning Target: I will be able to use Linux command lines to navigate file systems and navigate files and directories.
Linux Operating System
- Everything is a file
- Use the ls Command to list files
- Working the directories: cd and pwd
- use cat to Concatenate Data to the Screen
Tuesday
Learning Target: I will be able to use Linux command lines to navigate file systems and navigate files and directories.
Linux Operating System
- use mkdir to make a directory
- use mv to move files
- use touch to create a file
- use cp to copy a file
- remove files and directories: mv mvdir
- Conclusion questions
Wednesday
Learning Target: I will be able to learn Linux commands by playing Linux games.
Printed Linux commands
- online Linux games.
Thursday
NO CLASS. SEMESTER FINALS SCHEDULE
Friday
Learning Target: I will be able to learn Linux commands by playing Linux games.
Printed Linux commands
- online Linux games.
Week of 12-9-2019
Monday
Server Attacks
- Establish Connections
- Broadcast
- Handshake
- Request Web Content
- Hyper Transfer Protocol
- Responding with Web Content
Tuesday
Confirm Communication is Valid
- Brute Force Attack
- Discover evidence of brute force attack using Wireshark
- Complete notebook and screenshots
Wednesday
Unit test and vocab
Thursday
2.4.1: Ecommerce Enrichment
- unit intro
- read and review unit 2 cyber case
- unit 2 self assessment
Friday
2.4.1: Ecommerce Enrichment
Plan a Pentest
- ID customer architecture is sufficient
- Detect: How to test security of web server software
- Protect: Recommendations to secure web server
- Respond: how to provide evidence of test results
Monday
Learning Target: I will be able to describe how data packets travel through hosts and routers by playing the Router Game.
3.2.2: Stopping the Spread of Malware
- Router Game
- Introducing Wireshark
- 3.22minute video clip introducing Wireshark
- Packet Sniffing
Tuesday
Learning Target: I will be able to describe what Wireshark is and what the program does.
Wireshark in the Lab.
- activate lab
- work lab steps 8-20
Wednesday
Learning Target: I will be able to describe what Wireshark is and what the program does.
Wireshark in the Lab
- complete Wireshark steps 21-40
- complete all prompts, screenshots, and conclusion
Thursday
Learning Target: I will be able to describe various types of packets and and how they are involved in a brute force attack.
Server Attacks
- Captured Data using Wireshark
- steps 1-3
- Steps to Request Web Page
- steps 4-13
Friday
Learning Target: I will be able to describe various types of packets and and how they are involved in a brute force attack.
Server Attacks
- Establishing a Connection
- steps 14-20
- Request Web Content
- steps 21-25
- Responding to Web Content
- steps 26-29
Monday
Guest speaker
Former NW student: Brady Semm will come and speak to the Cybersecurity class about his education and employment as a Cybersecurity Analysis.
Tuesday:
Learning Target: I will be able to describe what Structured Query Language (SQL) is, how attackers exploit SQL, and how to protect against attacks.
Structured Query Language
- What is SQL?
- How attackers exploit SQL.
- How to protect against exploits.
Wednesday
CANSTRUCTION
short day
Thursday and Friday
NO SCHOOL
THANKSGINVING
Week of 11-18-2019
Monday
Learning Target: I will complete my Cybersecurity Notebook responses, screenshots, conclusions, and review for Tuesday's test.
- complete notebook responses
- complete lab screenshots
- complete lab conclusion questions
- review vocab and concept questions for Tuesday's test
Tuesday
- Vocab and content test
Wednesday
Learning Target: I will be able to describe the network topology of the client-server architecture and how JavaScript programs work
Securing Ecommerce Data
- Client-Server Architecture
- Client-Server Communication
- Software Layers
- HTML
- JavaScript
- VBScript
- Java
- Python
- SQL
- Cross-Site Script
- What is Cross-Site Script
- Linux
Thursday
Learning Target: I will be able to describe the network topology of the client-server architecture and how JavaScript programs work
Continue Securing E-commerce Data
- Protection measures against XSS
- SQL Injection Exploits
- Database Data Organization
- Manipulating the Data
- Protection measures against SQL injection
Friday
Learning Target: I will be able to analyze data packets and reduce a ping flood attack.
Stopping the Spread of Malware
- Hosts and Routers
- Router Game
11-11-2019
Monday
Learning Target: I will be able to reduce web vulnerabilities by using direct browsing and moving log files.
2.2.4: Server Analysis
- Disable Direct Browsing
- Move Log File Locations
- Remove FTP: File Transfer Protocol
Tuesday
Learning Target: I will be able to reduce server vulnerabilities and document steps.
2.2.4: Secure the Server
Document steps to secure server
- mail services
- error messages
- verify
Wednesday
Learning Target: I will be able to successfully pass the unit test over server vulnerabilities.
unit test and vocab
Thursday
Secure Ecommerce Data
Learning Target: I will be able to describe the client-server architecture.
- client-server communication
- software layers
- java script
Friday
NO SCHOOL
Week of 11-4-2019
Monday
Learning Target: I will be able to describe levels of sophistication of malware types and what motivates malicious users.
2.2.1: More on Malware
Malware in Depth
- Botnet
- Keylogger
- Man in the Middle
- Ransomware
- Rootkit
- Programming Errors
In cyberteams, research the following DDoS attacks. Share your research with the team.
- Ping flood
- Ping of death
- Smurf attack
- Mailbomb
- Teardrop
- #4, #5, #6
- 3.26 minute video about Stuxnet Attack
- answer conclusion questions
Tuesday
Learning Target: Investigate a web server for directory browsing and log file location vulnerabilities.
Server Vulnerabilities
- How do web servers work
- Forceful Directory Browsing
- Website Directory Structure
- Log Files
Wednesday
Learning Target: Investigate a web server for directory browsing and log file location vulnerabilities.
Server Vulnerabilities
- Exploitable Services
- Exploitable Services
- Use 'remote site'
- CyberSecurity Notebook questions and Conclusion
Thursday and Friday
Learning Target: I will make web servers less vulnerable by using directory browsing, default log file location, and unanimous FTP.
Server Analysis
- Analyzing the Server
- IIs Manager
- Disable Direct Browsing
- TARGETWINDOWS01 program
- Move Log File locations
- Remove FTP (File Transfer Protocol)
- Answer CyberSecurity Notebook questions and Conclusion
Week of 10-28-2019
Monday
Learning Target: I will be able to collaborate with my Cybersecurity team to create a network topology.
Network Topology Introduction
- using new knowledge from this section, create a network topology for the your company to ensure it secure and accessible to both its online customers and its internal staff
- review basic models (and components) of topologies
- Draw a rough sketch of a basic topology for Amazon.com
Tuesday
Learning Target: I will be able to collaborate with my Cybersecurity team to create a network topology.
Compare Amazon topology with other cyber team in class
- list components needed then design
- share, compare, verify, and justify your model to other team's topology model using prompt #4 in lab
- make modifications to your teams topology if needed
- create a network topology for your company's topology according to the rubric provided
- list the components needed and why they are needed, what is their function
- draw out your topology and be ready to describe and justify your design
Wednesday
Learning Target: I will be able to collaborate with my Cybersecurity team to create a network topology.
Present your network topology to class
- each partner will assign themselves their responsibilities for what they present
- go to front board and draw out your topology for BBB
- each partner will describe the components and what they do
- PRESENT
Thursday
Learning Target: I will be able to describe levels of sophistication of malware types and what motivates malicious users.
2.2.1: More on Malware
- Introduction: Differences between Black-hat, White-hat, and Gray-hat hackers
- Sophistication Levels of Hacking
- Script Kiddie
- Insider
- Hacktivist
- Cyber Syndicate
- Warfare / Espionage
- Motivation and Goals of Hackers
- Ethical Choices
- compare White-hat to Black-hat careers
Friday
Learning Target: I will be able to describe levels of sophistication of malware types and what motivates malicious users.
2.2.1: More on Malware
Malware in Depth
- Botnet
- Keylogger
- Man in the Middle
- Ransomware
- Rootkit
- Programming Errors
Week of 10-21-2019
Monday
Learning Target: I will be able to analyze systems while causing minimal impact.
- Whois- Shows publicly available information about a valid, registered domain.
- Real of fake site
- nslookup- Reports the domain name and IP address when given either a URL or IP address
- (not all host on internet have a registered domain name)
Tuesday:
Learning Target: I will be able to analyze systems while causing minimal impact.
- tracert- shows the network path to a give host or IP address, reporting on the routers, servers, and DNS servers your host used to get there
- netstat- Shows all remote (foreign) hosts that are currently exchanging data with your host
Wednesday
Learning Target: I will be able to begin to design an unplugged network topology for a client's website.
- Product Catalog
- Customer and Order Information
Thursday
Learning Target: I will be able to begin to design an unplugged network topology for a client's website.
- Website Information
- Employee Information
- Conclusion
- Compare your design to another team’s design. Is there anything you’d like to improve or would recommend to the other team to modify? Explain your thoughts.
- Is there such a thing as “too much security”? Why or why not?
Friday
Learning Target: I will be able to describe the difference between a Black Hat, White Hat, or Grey Hat Hacker
More on Malware
- Introduce chapter
- Distinguish the difference between
- Black Hat
- White Hat
- and Gray Hat Hackers
Week of 10-14-2019
Monday
Learning Target: I will be able to describe what the Cybersecurity CIA Triad is by defining confidentiality, integrity, and availability.
Clarify expectations when completing Cybersecurity Notebook
- Walk through lessons together logging and recording accurate responses
You have been hired to set up a secure network for your customer’s e-commerce business.
The CIA Triad (15 minutes)
- #4: Watch video together as a class
- Partners work together to answer questions A-E in Cybersecurity Notebooks
- After partners are done, students share out loud together.
- What is the CIA Triad?
- Define the Confidentiality component of CIA and list some ways of protecting it.
- Define the Integrity component of CIA and list some ways of protecting it.
- Define the Availability component of CIA and list some ways of protecting it.
- Why is the CIA Triad important to Bikes, Boards, and Beyond as they launch their new website?
- After reading paragraph, watch 2:17 video clip together
- Answer the Discussion Prompts: What are the trade-offs?
- Review CIA Triad Component table
#6: Team members record in Cybersecurity Notebooks
- Draw one CIA Triad in your notebook
- Write down the prompts in #6 in the proper location in the Triad
- Do not just write a,b,c,d; write the description so you can refer back to it later.
- SS # highly confidential
- Family calendar: availability
- Online personal health records: confidential
- Online shopping: available
- Do not just write a,b,c,d; write the description so you can refer back to it later.
The E-commerce Site (10 minutes)
- Reread the Unit 2 Cyber Case:
- #11: Read “Things to Consider”
- Complete the E-commerce CIA Information Table
Tuesday.
Learning Target: I will be able to activate the Google extension called Disconnect to stop popup ads from appearing when browsing the Internet.
Cybersecurity is Everywhere:
The Internet of Things (IoT)
- Read paragraph out loud
CIA, IoT, and Social Engineering
- Read Paragraph out loud
- It is up to individuals users to protect their information and keep it as confidential as possible. One way to do that is to block tracking websites.
#13: Launch Security Lab
- While lab is loading, open a new tab and go to an ecommerce site such as Cabellas, a gaming site,….
- Shop around for a few minutes…
- Now close tab, open a new one and go to another site such as CNN, FoxNews… and select any article…
- Are there advertisements appearing on your screen?
- Do they look familiar
- Disconnect Extension blocks those ads
- Walk through #20 discussion prompts together
Quick Research
If students complete Activity 2.1.1 early, you may choose to have them research an IoT-related cyberattack or breach that’s been published in the news (article or video). Students answer the following questions in their notebooks:
- When did the attack happen?
- What was the targeted device?
- Who/what did the attack impact?
- In your opinion, what are the ethical concerns related to this attack?
- Walk through steps together until activity is complete.
Conclusion
- #1 and 2
Wednesday
Week of 10-7-2019
Monday -Wednesday
1.3.1: Protect Your Data
- Risk Detection
- process
- downloaded file
- other suspicious files
- firewall rules
- Design correct level of Protection to
- suspicious processes related to application files
- suspicious downloads
- other suspicious files
- Configure settings for
- firewall rules
- out of date software
- computer settings
- Recover deleted files
Thursday and Friday
2.1.1: Confidentiality, Integrity and Availability
- Define and understand differences between Confidentiality, Integrity and Availability
- CIA Triad, personal comfort level
- Pretest, Self Assessment
- Ecommerce Sites
- Internet of Things (IoT)
- Ring, Furnace, Alexa, ...
- "Disconnect" Extension
- how companies track computer use and inject ads in your browsing
- how to stop companies from tracking your computer usage
- Security lab
Week of 9-30-2019
Monday
Complete 1.2.5: It's a Trap
Learning Target: I will collaborate with my team to using strategies to secure a computer against a variety of security weaknesses learned from 1.2.1, 1.2.2, 1.2.3, and 1.2.4.
- Finalize Questions form activity and complete notebook
Tuesday
Learning Target: I will be able to successfully pass Unit 1.2 test and vocabulary
- Test
- Vocab quiz
Wednesday / Thursday / Friday
Learning Target: I will be able to secure a computer against suspicious processes, downloads, and files.
1.3: A Dangerous Situation
- Take Unit 1 Assessment as a post assessment and compare the pre-assessment answers to new knowledge
- Teams will pair wit a second team
- ID security issues related to ...
- Processes
- downloaded files
- other suspicious files
- firewall rules
- Configure settings for firewall rules
- Remove all ...
- suspicious processes and application files
- suspicious downloads
- other suspicious files
- Recover deleted files
- Create thorough documentation explaining rusks and how to correct
- ID security issues related to ...
Week of 9-23-2019
Monday
1.2.4: Secure Your Browser (3 days)
-HTTP or HTTPS
-URL and Browser Extension
-Browser Security Setting
-Privacy and Security Settings
-History
-Clearing Data
-Cookies
-Site Certificates
-Downloads
Tuesday
1.2.4: Secure Your Browser (3 days)
-HTTP or HTTPS
-URL and Browser Extension
-Browser Security Setting
-Privacy and Security Settings
-History
-Clearing Data
-Cookies
-Site Certificates
-Downloads
Wednesday (Short day due to PT Conferences)
1.2.4: Secure Your Browser (3 days)
-HTTP or HTTPS
-URL and Browser Extension
-Browser Security Setting
-Privacy and Security Settings
-History
-Clearing Data
-Cookies
-Site Certificates
-Downloads
Thursday (Short day due to PT Conferences)
Complete 1.2.4
Friday
NO SCHOOL
Week of 9-16-2019
Monday
Learning Target:
-I will be able to configure a firewall to protect against malware.
-I will be able to explain the difference between ports, 20, 21, 80, and 443.
Complete Firewall Protection from 1.2.1: Firewalls and Malware
Identify the differences between ports 20, 21, 80, and 443.
Tuesday and Wednesday
-Tuesday read through activity and record required content
-Wednesday work activity in SecureLab
Learning Target: I will be able to safely access files and identify ownership.
1.2.2: File Management
-All Data is a File
-Basic File Types
-How to open a ZipFile
-File Extension and Behavior
-Predicting how a file will operate by recognizing the extension
Thursday and Friday
Learning Target: I will be able to recognize and terminate suspicious files.
Thursday: Read through activity and record required information
Friday: Work the activity in the Security Lab
1.2.3: Process Management
-Data as Processes
-Short cuts and application files
-Process Ownership
-Killing Processes
9-9-2019
Monday
Learning Target: I will review my Cybersecurity notebook for Tuesday's unit test
- make sure notebook is complete and ready to turn in for grade
-review with partner for unit test
Tuesday
Learning Target: I will successfully ACE my Cybersecurity test.
-Take test
-check test in class if time
Wednesday
Learning Target: I will be able to take a stance and defend my reasoning on controversial Cybersecurity issues.
-Vote With Your Feet
-move and stand in a place to the degree on which you agree with a statement
-give justification for your belief
Thursday AND Friday
Learning Target: I will be able to describe how networks are connected and how a firewall protects networks against malware.
- Read through directions of 1.2.1: Firewalls and Malware,
-DO NOT WORK ACTIVITY UNTIL YOU READ ENTIRE ACTIVITY TO UNDERSTAND THE BIG PICTURE
-Network Devises
-Internet Service and Malware
-Types of Malware
-Weakest Link in a Network
-Protecting Your Network, Operating System using Firewalls
Week of 9-4-2019
Monday:
1.1.3: Email and Social Media Risks
-Spam and Phishing
-How to identify and why to avoid
-Suspicious Emails
-How to identify and why to avoid
-Social Engineering
-Hackers use any personal info to gain access to hack your devises
Wednesday and Thursday
1.1.4: Save the Day Project
- You are hired to a cybersecurity team to help coworkers secure personal info and identity.
- Identify all characteristics of suspicious emails
identify all characteristics inappropriate / risky social media posts
-Identify all characteristics of a strong password
-Provide thorough documentation of project
Friday
Complete Unit
-Turn in Cybersecurity Notebook, reflections, vocab, and online responses.
Week of 8-26-2019
Monday, Tuesday, and Wednesday
1.1.2: Password Protection and Authentication
Virtual Lab: Password Protection
-Setting Sleep timer on devises
-Common Password Complications using Python
-algorithms to test different types of passwords
-making passwords with more characters and more complicated
Thursday and Friday
1.1.3: Email and Social Media Risks
-Protecting Social Media in Virtual laboratories
-Protecting against Spam and Phishing
-Recognizing suspicious emails
Week of 8-9-2019
Monday
-Enroll in PLTW website
-Cyber Sites
-Notebook
Tuesday
-Complete Enrollment
-Overview of Website
- tour and explore layout to get comfortable navigating
Wednesday
-1.1.1: Cyber Security and Code of Conduct
-Read instructions to get familiar with lesson expectations, record vocabulary
-Log into PLTW website and work activity
Thursday
-1.1.1: Cyber Security and Code of Conduct
-Log into PLTW website and work activity
Friday
-1.1.2: Password Protection and Authentication
-Read instructions to get familiar with lesson expectations, record vocabulary
-Log into PLTW website and work activity
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam, quis nostrud exercitation ullamco laboris nisi ut aliquip ex ea commodo consequat.