Updating search results...

Search Resources

60 Results

View
Selected filters:
  • cybersecurity
Emerging Threats in Cybersecurity
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

13. Brave New World - Emerging Threats: Cybersecurity

The trifecta of globalization, urbanization and digitization have created new opportunities and challenges across our nation, cities, boroughs and urban centers. Cities in particular are in a unique position at the center of commerce and technology becoming hubs for innovation and practical application of emerging technology. In this rapidly changing 24/7 digitized world, governments are leveraging innovation and technology to become more effective, efficient, transparent and to be able to better plan for and anticipate the needs of its citizens, businesses and community organizations. This class will provide the framework for how cities and communities can become smarter and more accessible with technology and more connected.

Subject:
Career and Technical Education
Electronic Technology
Material Type:
Lesson
Provider:
CUNY Academic Works
Provider Set:
Medgar Evers College
Author:
Rhonda S. Binda
Date Added:
10/30/2020
Fundamentals of Cybersecurity and Intelligence Gathering - Case Study Assignment
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Case Study Assignment for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Homework/Assignment
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Fundamentals of Cybersecurity and Intelligence Gathering - "Confidentiality, Integrity, Availability"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #1 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Fundamentals of Cybersecurity and Intelligence Gathering - "Encryption & Hashing"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #4 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Fundamentals of Cybersecurity and Intelligence Gathering - "Hackers"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #3 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Fundamentals of Cybersecurity and Intelligence Gathering - "Vulnerabilities & Exploits"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #2 for the course: CIS 356 - Fundamentals of Cybersecurity and Intelligence Gathering. Delivered at Lehman College in Spring 2020 by Fahad Chowdhury as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Lehman College
Author:
Fahad Chowdhury
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Homeland Security: Safeguarding the U.S. Against Domestic Catastrophic Destruction
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

What is homeland security and why do we need it? What was unique about the 9/11 attacks that prompted the largest reorganization of the Federal government since the end of World War II? What is the difference between homeland security and national security? Why is critical infrastructure protection so critical? Why is emergency management an essential mission area within homeland security? What is the relationship between homeland security and DoD, National Guard, FBI, and State and Local law enforcement? Explore these questions and the events that made homeland security what it is today. Find out why homeland security is an unprecedented historical challenge requiring an unprecedented government response. Review the homeland security mission areas and understand not only what is being done but also why. Discover “who’s who and what do they do” within the Department of Homeland Security and the greater Homeland Security Enterprise. This book provides the most comprehensive overview and most concise resource for understanding homeland security today. Within these pages you will find insight to the most pressing challenges of the 21st century confronting the nation, your community, and you.

Subject:
Business and Communication
Career and Technical Education
Criminal Justice
History
Law
Management
Political Science
Social Science
U.S. History
Material Type:
Textbook
Date Added:
06/13/2019
Impersonation and Identity Theft
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

A lot of what we do online requires having digital accounts. So how do we keep those accounts (and our personal information) secure? And what could happen if we don't? In this lesson, students will learn about the potential impacts of impersonation and identity theft, and review strategies to strengthen their cybersecurity skills.

Subject:
Economics
Social Science
Material Type:
Lesson
Provider:
Common Sense Media
Author:
Common Sense Education
Date Added:
05/03/2024
An Introduction to Cyberbiosecurity for Food Science
Unrestricted Use
CC BY
Rating
0.0 stars

As technology becomes ever integrated into our food system and everyday life, our food industry and supply become ever more vulnerable to attack. Cyber attacks continue to threaten large and small companies, government agencies, individuals, and food and agriculture. This module, ‘Securing the Food Industry,’ aims to introduce the idea of cyberbiosecurity through a lecture format along with three case studies allowing students to interact and think through the concepts and materials. This module was built for implementation into college level courses with connection or interest in the food industry, food science, and agriculture as well as and technology courses focused on real world applications.
The lecture starts by introducing the amount of technology in food science and the food industry then transitions into concerns about security. After discussing multiple subtypes of security already integrated into the food industry, cyberbiosecurity is introduced. The term and definition are discussed before the categories of cyber attacks are introduced. The lecture relates these ideas back to the food industry before sharing a few real-life examples of detrimental cyber-attacks. The lecture concludes are explain the impact a cyber attack can cause, who is responsible for preventing and recovering from these attacks, as well as suggested practices to reduce vulnerabilities. Three theoretical but realistic case studies with discussion questions follow the lecture. These studies were written to act as small group discussion starters but could be used for whole class discussion, individual writing assignments, or other applications.
A list of additional resources can be found with the course material. This list provides a small sampling of additional documents which discuss cyberbiosecurity. The resources listed at the end of the lecture are not included in the additional resources document but also provide helpful information in the exploration and understanding of cyberbiosecurity. Food science resources are also included in this document to provide additional background around the food industry portion of this course material.

Securing the Food Industry is an open educational resource (OER). Instructors reviewing, adopting, or adapting the module should indicate their interest at https://forms.gle/orFRGhYs8owBP7gD6.

Subject:
Agriculture
Applied Science
Career and Technical Education
Computer Science
Material Type:
Case Study
Module
Provider:
Virginia Tech
Provider Set:
VTech Works
Author:
Andrew Ray
Rebekah J. Miller
Susan E. Duncan
Yun Yin
Date Added:
09/16/2022
K12 SIX Cybersecurity Frameworks (October 2022)
Unrestricted Use
CC BY
Rating
0.0 stars

The K12 Security Information eXchange (K12 SIX) released “Cybersecurity Frameworks: What K-12 Leaders Need to Know,” a new resource for state and local education leaders encouraging the adoption of nationally recognized cybersecurity best practices. This white paper was commissioned by the State Educational Technology Directors Association (SETDA) as part of the work of its Cybersecurity & Privacy Collaborative.

Subject:
Education
Educational Technology
Material Type:
Case Study
Author:
K12 SIX
Date Added:
10/18/2022
Lecture 11: Cybersecurity - "Identity & Access Management"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #11 for the course: CS 3550: Cybersecurity - "Identity & Access Management". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Baruch College
Author:
Michael Whiteman
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Lecture 12: Cybersecurity - "Network & Endpoint Security"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #12 for the course: CS 3550: Cybersecurity - "Network & Endpoint Security". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Baruch College
Author:
Michael Whiteman
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Lecture 13: Cybersecurity - "Patching & Vulnerability Management"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #13 for the course: CS 3550: Cybersecurity - "Patching & Vulnerability Management". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Baruch College
Author:
Michael Whiteman
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Lecture 14: Cybersecurity - "Business Continuity & Disaster Recovery"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #14 for the course: CS 3550: Cybersecurity - "Business Continuity & Disaster Recovery". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Baruch College
Author:
Michael Whiteman
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Lecture 15: Cybersecurity - "Application Security"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #15 for the course: CS 3550: Cybersecurity - "Application Security". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Baruch College
Author:
Michael Whiteman
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Lecture 16: Cybersecurity - "Mobile Devices & Wireless Connectivity"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #16 for the course: CS 3550: Cybersecurity - "Mobile Devices & Wireless Connectivity". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Baruch College
Author:
Michael Whiteman
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Lecture 17: Cybersecurity - "Cloud Security"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #17 for the course: CS 3550: Cybersecurity - "Cloud Security". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Baruch College
Author:
Michael Whiteman
NYC Tech-in-residence Corps
Date Added:
07/17/2020
Lecture 18-19: Cybersecurity - "Anatomy of a Breach"
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Lecture #18-19 for the course: CS 3550: Cybersecurity - "Anatomy of a Breach". Delivered at Baruch College in Spring 2020 by Michael Whiteman as part of the Tech-in-Residence Corps program.

Subject:
Applied Science
Computer Science
Information Science
Material Type:
Lecture
Provider:
CUNY Academic Works
Provider Set:
Baruch College
Author:
Michael Whiteman
NYC Tech-in-residence Corps
Date Added:
07/17/2020