Resources for Teaching Cyber Security - University of Tulsa

Resources for Teaching Cyber Security - University of Tulsa

Cybersecurity: Threat Matrix Janica Edmonds Cybersecurity First Principles Domain separation Process Isolation Resource encapsulation Layering Modularization

Least Privilege Information hiding Abstraction Simplicity Minimization 2 Cyber Realm

Card game Created by GenCyber Duo at California State University, San Bernardino Played in pairs 3 Security Needs Confidentiality Integrity Availability

4 Security Threats A potential occurrence, malicious or otherwise, that might damage or compromise assets. Interception asset is diverted. Interruption asset is delayed Modification asset is altered. Fabrication asset is manufactured. 5 Security Assets Components of the system or network. Hardware

Software People Data 6 Example: Mom & Pop Shop Mom & Pop Shop Running a touristy type business selling handmade crafts Keep accounts and business transactions records on a computer

Running a website to advertise their business Security What are the assets? How does CIA apply? What are ways that CIA could be threatened? 7 Threat Matrix

Threat/Asset HW SW People Data Interception Interruption Modification

Fabrication 8 Example: Threat Matrix Mom & Pop Shop Threat/Asset HW SW People

Data Interception Interruption Modification Fabrication 9 Example: Principles Applied Domain separation Layering Least privilege Information hiding

Simplicity Minimization Modularization 10

Recently Viewed Presentations

  • Advanced manufacturing Lab, Industrial Enginnering Dep ...

    Advanced manufacturing Lab, Industrial Enginnering Dep ...

    Implementation consideration. Mapping the Extracted Manufacturing Features to Process Planning. After extracting the manufacturing features from the designed part, it is necessary to map all the extracted manufacturing features to the process planning point of view as an application of...
  • INDIAN INSTITUTE OF TECHNOLOGY MADRAS Department of Engineering

    INDIAN INSTITUTE OF TECHNOLOGY MADRAS Department of Engineering

    Performance enhancement of Industrial robots using calibration data ... link inertia and mass form the new complete dynamic models were used for refining the dynamic model of the robot. Robot simulations using the refined model have shown high correlation with...
  • Rectal Microbicides

    Rectal Microbicides

    Rectal Microbicides: New Hope for Non-Condom Prevention of HIV and other STDs
  • CONTROLADORES - Ing. Jorge Cosco Grimaney

    CONTROLADORES - Ing. Jorge Cosco Grimaney

    Con Kp = 30 y Ki = 70, Incrementa el tiempo de subida Reduce el sobreimpulso máximo Disminuye el tiempo de establecimiento Mejora el sobreamortiguamiento Acción I (Integral) CONTROLADOR PID Controladores PID Aplicación simultánea de 3 acciones: proporcional, integral y...
  • The Holocaust - Craven County Schools

    The Holocaust - Craven County Schools

    The Holocaust A Brief Introduction What was it? The Holocaust took place in Europe between the years of 1933 and 1945. It was Adolf Hitler's and the Nazi party's attempt to arrest, displace, and exterminate the Jewish people of Europe....
  • Introduction to CSCE 221 - Lab

    Introduction to CSCE 221 - Lab

    Vector ADT. The Vector ADT extends the notion of array by storing a sequence of arbitrary objects. An element can be accessed, inserted or removed by specifying its rank (number of elements preceding it)
  • BIOGRAPHIES of PARTICIPANTS MANFRED AUSTER is Minister-Counsellor and

    BIOGRAPHIES of PARTICIPANTS MANFRED AUSTER is Minister-Counsellor and

    Her main interests lie in international and Canadian refugee and immigration policy, with an emphasis on international human rights, gender‑sensitivity and anti‑racism, and in NGO networking and advocacy. Janet has a BA (in Classics and Modern Languages) from the University...
  • Gravity, D-branes, and Large Extra Dimensions

    Gravity, D-branes, and Large Extra Dimensions

    GR is coordinate independent Spacetime Diagram & Light Cones Flat line element in spherical coordinates Notice: For constant time slice, spherical wave front Light cone is a one-way surface Consider radial null curves ( & = const, ds 2 =...