Please enable JavaScript to use CodeHS

Nevada Cybersecurity 1

Description

In this lesson, students will discuss and examine policies regarding privacy and security. Using best practices like setting strong passwords, reading privacy policies, and using https can help in staying safe online.

Objective

Students will be able to:

  • Use best practices in personal privacy and security, including strong passwords, using https, and reading privacy policies
Description

In this lesson, students will learn what copyright laws are and how to avoid copyright infringement. They will explore why copyright laws are important and how they protect the creators.

Objective

Students will be able to:

  • Explain what copyright laws are and why they are important
  • Find images they are legally allowed to use in their projects
  • Accurately attribute images they find and want to use
Description

In this portion of the project, students will come up with a fictitious company and feel the impact of reacting to a security breach without any pre-developed policy in place. Students will then learn about some of the common policies companies put in place and set forth on the task of developing strong policies for their company.

Objective

Students will be able to:

  • Reflect on why policy documentation is important for security
  • Identify examples of policy documentation
Description

Incident response plans are essential to ensure that companies are prepared to effectively respond to any breach in security. In this portion of the project, students will develop a set of policies regarding strong passwords and employee training. They will test their policies against a series of employee negligence scenarios and reflect on what would need to be added to strengthen their policy.

Objective

Students will be able to:

  • Develop a set of policies regarding strong passwords and employee training
  • Reflect on the strength of policy documentation
Description

In this portion of the project, students will create an abbreviated Incident Response plan. They will respond to a cyber attack using their IR plan and reflect on how they were able to handle this attack as well as how to strengthen their policy.

Objective

Students will be able to:

  • Develop an incident response plan
  • Reflect on the strength of policy documentation
Description

Data can be one of a company’s most valuable resources, not to mention most regulated. Developing a strong plan for keeping data secure is essential, especially as more and more companies turn to the cloud to keep track of the massive amounts of data that are being collected every day. In this portion of the project, students will review an example privacy policy and then complete their own abbreviated policy. They will test their data policies against a data breach and reflect on what would need to be added to strengthen their policy.

Objective

Students will be able to:

  • Develop a data privacy policy
  • Reflect on the strength of policy documentation
Description

Change management is the approach to preparing and supporting individuals and/or teams to successfully adopt organizational change. When implementing changes within a company, it is essential to consider how you will present the change to employees and support them in adopting and implementing the change. In this portion of the project, students will synthesize the changes that need to be made to strengthen their policies. They will develop a change management plan to implement new policies effectively.

Objective

Students will be able to:

  • Develop a change management plan