Unit 10: Cybersecurity Principles

It worker suffering data loss
This unit discusses more basic concepts in IT security including: application security, common hacking techniques, and anti-virus software.
The following activities can be tailored to fit the needs of your students and the goals your study program.

Reading Activity: Security Operations Center (SOC)

Students will be able to correctly answer true/false questions after reading and listening to topical short articles and dialogs featuring topical vocabulary.

Scene: It is 8:12AM in the SOC war room. Overnight, malware alerts have spiked sharply. A major client portal is timing out for some users in Europe. CISO: Good morning soldier! Bring me up to speed on the incident. SOC Analyst: Again, I am not really a soldier, but at 02:41 AM last night, our intrusion detection system flagged anomalous lateral movement from… Continue

Multiple Choice Activity

Students will be able to select the best match between unit terms and their definitions.

You must sign in to try this activity.

Listening Comprehension Activity

Students will be able to listen to short audio clips in English and then spell them correctly.

You must sign in to try this activity.

Login to view the Listening Activity

Spelling and Recognition

Students will be able to identify and spell a vocabulary term correctly given only the definition.

You must sign in to try this activity.

Login to see the Spelling Activity

Speaking Practice Activity

Students will be able to speak and record 5 example sentences from the unit vocabulary and then submit them for grading by the classroom teacher. If no teacher is available or desired, then the students will be shown good examples of other students' work.

US
UK
Stuxnet was a computer worm that used multiple zero-day exploits to infiltrate Iranian nuclear enrichment facilities and sabotage their centrifuges.
US
UK
As many popular Internet protocols are still vulnerable to spoofing attacks, the general rule of programming is still: "trust nothing".
US
UK
Replay attacks can be prevented by tagging login attempts with a quickly expiring session ID or token.
US
UK
Using weak passwords is a sure way to compromise your digital safety.
US
UK
The CISO was instructed to develop a plan to prevent, detect, and recover from potential attacks at all 10 of the company's data centers.

You must sign in to try this activity.

Login to see the Speaking Activity

Writing Practice Activity

Students will write a short essay to be graded by the teacher. If no teacher is available or desired, then the student is shown previous examples of other writings by students.

  • Describe a time when your network or computer was attacked by malware. Who was the bad actor? Where did the attack originate from? How did you resolve the issue?
  • Who was behaving more realistically, The SOC Analyst or the CISO? Was the SOC Analyst really a soldier? What did the narrator mean when she said, "Well, that was a bit much"? Do you agree with the narrator?
  • You must sign in to try this activity.

    Login to see the Writing Activity