This is the fifth and final module in the Introduction to Cybersecurity for High School Students and K12 Educators course and it has as four lessons. The first is a short lesson on the key categories of cyber defense and aspects of technological defense. The second lesson introduces the types of cryptography and their application.
This is the second module in the Introduction to Cybersecurity for High School Students and K12 Educators course. It addresses the following:
The goal of this course is to familiarize the student with the elements of automated production systems from both traditional and modern (cyber-physical) perspectives, reflecting the long (20-40 year) asset lifecycles commonly seen in large manufacturing plants in both discrete and process industries.
This lab introduces the student to the Baldrige Cybersecurity Excellence Builder (BCEB), a self-assessment tool to help organizations assess how effectively they are implementing the NIST Cybersecurity Framework (NIST CSF).
In this exercise, students use Situation Awareness (SA), Gestalt Principles, design affordances, and CIA-for-HMI to design the Human-Machine Interface (HMI) for a cyber-physical system (one that will brew and serve pots of coffee).
This lab exercise explores Fitts Law, which states that response time will be the smallest when the distance to a target is small, and the size of the target is large.
This lab exercise explores the Hicks-Hyman Law (sometimes referred to as simply Hicks Law).
This lab exercise introduces the concept of quality costs and shows you how to analyze and interpret quality cost data for a hypothetical organization that uses the NIST Cybersecurity Framework for risk management, and has designed its cost accounting system around the structure of the Framework Core. It applies concepts learned during Lesson 3H in Module 3: Managing Security, Safety,
This lab exercise introduces a quantitative approach to risk analysis using Failure Mode Effects Analysis (FMEA) and Risk Priority Number (RPN), and analytical methods for prioritization (ANOVA). It applies concepts learned during Lesson 3B in Module 3: Managing Security, Safety, and Risk of the Cyber-Physical Industry course.