Learning Objectives
After completing this module, students will be able to:
- Describe how the discipline of computer science is related to cybersecurity.
- Compare and contrast authentication and authorization
- Identify the three objectives of information security
Provide examples about when to use encryption - Describe three firewall protection services
Handouts
Readings
- NIST: Computer Security Incident Handling Guide
- Inside Apple CEO Tim Cook’s Fight with the FBI
- United States Federal Employees’ Password Management Behaviors – a Department of Commerce Case Study
- Van Ommeren, et. al. The Cyber Security Game – What Matters Now. pp. 51-80
- An Overview of Cryptography
Video Resources
- Information Security: Malware
- Cybersecurity Awareness Training – Passwords
- How It Works: Internet of Things
- Crash Course Computer Science