Updating search results...

Search Resources

68 Results

View
Selected filters:
  • cybersecurity
Cybersecurity-The Silk Road Market
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This presentation is about the Silk Road Market, one of the largest cases of illegal drug activity on the dark web, that the federal government has prosecuted. Beyond discussing the case, the presentation adds general facts about the US Department of Justice, the FBI and the DEA, and federal sentencing. The case discussion includes information about: Ross Ulbricht the creator and head of the market; how the Silk Road operated; the involvement of the FBI and DEA; the trial; the fourth amendment violations alleged by the defense; and the sentencing.

Subject:
Education
Higher Education
Law
Material Type:
Lesson
Provider:
CUNY Academic Works
Provider Set:
Hostos Community College
Author:
Amy J Ramson
Date Added:
07/04/2020
Cybersecurity and crime
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime, including viruses, malware, DDOS attacks and phishing scams.

Subject:
Applied Science
Computer Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/14/2021
Emerging Threats in Cybersecurity
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

13. Brave New World - Emerging Threats: Cybersecurity

The trifecta of globalization, urbanization and digitization have created new opportunities and challenges across our nation, cities, boroughs and urban centers. Cities in particular are in a unique position at the center of commerce and technology becoming hubs for innovation and practical application of emerging technology. In this rapidly changing 24/7 digitized world, governments are leveraging innovation and technology to become more effective, efficient, transparent and to be able to better plan for and anticipate the needs of its citizens, businesses and community organizations. This class will provide the framework for how cities and communities can become smarter and more accessible with technology and more connected.

Subject:
Career and Technical Education
Electronic Technology
Material Type:
Lesson
Provider:
CUNY Academic Works
Provider Set:
Medgar Evers College
Author:
Rhonda S. Binda
Date Added:
10/30/2020
Fundamentals of Cybersecurity and Intelligence Gathering - Case Study Assignment
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Case Study Assignment for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Fundamentals of Cybersecurity and Intelligence Gathering - "Confidentiality, Integrity, Availability"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #1 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Fundamentals of Cybersecurity and Intelligence Gathering - "Encryption & Hashing"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #4 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Fundamentals of Cybersecurity and Intelligence Gathering - "Hackers"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #3 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Fundamentals of Cybersecurity and Intelligence Gathering - "Vulnerabilities & Exploits"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #2 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Homeland Security: Safeguarding the U.S. Against Domestic Catastrophic Destruction
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

What is homeland security and why do we need it? What was unique about the 9/11 attacks that prompted the largest reorganization of the Federal government since the end of World War II? What is the difference between homeland security and national security? Why is critical infrastructure protection so critical? Why is emergency management an essential mission area within homeland security? What is the relationship between homeland security and DoD, National Guard, FBI, and State and Local law enforcement? Explore these questions and the events that made homeland security what it is today. Find out why homeland security is an unprecedented historical challenge requiring an unprecedented government response. Review the homeland security mission areas and understand not only what is being done but also why. Discover “who’s who and what do they do” within the Department of Homeland Security and the greater Homeland Security Enterprise. This book provides the most comprehensive overview and most concise resource for understanding homeland security today. Within these pages you will find insight to the most pressing challenges of the 21st century confronting the nation, your community, and you.

Subject:
Business and Communication
Career and Technical Education
Criminal Justice
History
Law
Management
Political Science
Social Science
U.S. History
Material Type:
Textbook
Date Added:
06/13/2019
Identity Theft: Preventing, Detecting, and Responding
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Attribution: SANS Security Awareness In today's digital age, your personal information is more valuable than ever. Unfortunately, this also makes it a prime target for identity theft. Understanding this threat, detecting it, and knowing how to protect yourself are essential elements in safeguarding your online digital life. 

Subject:
Economics
Material Type:
Reading
Author:
Aujalee Moore
Date Added:
05/20/2024
Identity Theft – Protecting Yourself
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Attribution: SANS Security Awareness Identity theft happens when a criminal steals information about you and uses that information to commit fraud, such as requesting unemployment benefits, tax refunds, or a new loan or credit card in your name. If you don’t take precautions, you may end up paying for products or services that you didn’t buy and dealing with the stress and financial heartache that follows identity theft. Your personal information exists in numerous places all over the internet. Every time you browse or purchase something online, watch a video, buy groceries, visit your doctor, or use an app on your smartphone, information about you is being collected. That information is often legally sold or shared with other companies. Even if just one of these gets hacked, the criminals can gain access to your personal information. Assume that some information about you is already available to criminals and consider what you can do to slow down or detect the use of your information for fraud

Subject:
Economics
Material Type:
Reading
Author:
Aujalee Moore
Date Added:
05/20/2024
Impersonation and Identity Theft
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

A lot of what we do online requires having digital accounts. So how do we keep those accounts (and our personal information) secure? And what could happen if we don't? In this lesson, students will learn about the potential impacts of impersonation and identity theft, and review strategies to strengthen their cybersecurity skills.

Subject:
Economics
Social Science
Material Type:
Lesson
Provider:
Common Sense Media
Author:
Common Sense Education
Date Added:
05/03/2024
An Introduction to Cyberbiosecurity for Food Science
Unrestricted Use
CC BY
Rating
0.0 stars

As technology becomes ever integrated into our food system and everyday life, our food industry and supply become ever more vulnerable to attack. Cyber attacks continue to threaten large and small companies, government agencies, individuals, and food and agriculture. This module, ‘Securing the Food Industry,’ aims to introduce the idea of cyberbiosecurity through a lecture format along with three case studies allowing students to interact and think through the concepts and materials. This module was built for implementation into college level courses with connection or interest in the food industry, food science, and agriculture as well as and technology courses focused on real world applications.
The lecture starts by introducing the amount of technology in food science and the food industry then transitions into concerns about security. After discussing multiple subtypes of security already integrated into the food industry, cyberbiosecurity is introduced. The term and definition are discussed before the categories of cyber attacks are introduced. The lecture relates these ideas back to the food industry before sharing a few real-life examples of detrimental cyber-attacks. The lecture concludes are explain the impact a cyber attack can cause, who is responsible for preventing and recovering from these attacks, as well as suggested practices to reduce vulnerabilities. Three theoretical but realistic case studies with discussion questions follow the lecture. These studies were written to act as small group discussion starters but could be used for whole class discussion, individual writing assignments, or other applications.
A list of additional resources can be found with the course material. This list provides a small sampling of additional documents which discuss cyberbiosecurity. The resources listed at the end of the lecture are not included in the additional resources document but also provide helpful information in the exploration and understanding of cyberbiosecurity. Food science resources are also included in this document to provide additional background around the food industry portion of this course material.

Securing the Food Industry is an open educational resource (OER). Instructors reviewing, adopting, or adapting the module should indicate their interest at https://forms.gle/orFRGhYs8owBP7gD6.

Subject:
Agriculture
Applied Science
Career and Technical Education
Computer Science
Material Type:
Case Study
Module
Provider:
Virginia Tech
Provider Set:
VTech Works
Author:
Andrew Ray
Rebekah J. Miller
Susan E. Duncan
Yun Yin
Date Added:
09/16/2022
K12 SIX Cybersecurity Frameworks (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

The K12 Security Information eXchange (K12 SIX) released “Cybersecurity Frameworks: What K-12 Leaders Need to Know,” a new resource for state and local education leaders encouraging the adoption of nationally recognized cybersecurity best practices. This white paper was commissioned by the State Educational Technology Directors Association (SETDA) as part of the work of its Cybersecurity & Privacy Collaborative.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
K12 SIX
Date Added:
10/18/2022
Lecture 11: Cybersecurity - "Identity & Access Management"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #11 for the course: CS 3550: Cybersecurity - "Identity & Access Management". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Baruch College
Author:
Michael Whiteman
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Lecture 12: Cybersecurity - "Network & Endpoint Security"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #12 for the course: CS 3550: Cybersecurity - "Network & Endpoint Security". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Baruch College
Author:
Michael Whiteman
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Lecture 13: Cybersecurity - "Patching & Vulnerability Management"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #13 for the course: CS 3550: Cybersecurity - "Patching & Vulnerability Management". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Baruch College
Author:
Michael Whiteman
NYC Tech-in-residence Corps
Date Added:
07/17/2020