Cybersecurity Microcredential with MCCE
ADVERSARIAL THINKING and THREAT MODELING for RISK ASSESSMENT
Background and Rationale.
Why Should Students Learn Cybersecurity?
Cybersecurity teaches students about protection of computer operating systems, networks, and data from cyber attacks. They learn how to monitor systems, assess risks to systems, and mitigate threats. For example, younger students should be aware of the consequences of using passwords that can be easily guessed and older students should learn means to minimize their risk on public wi fi and social media. As the world becomes more digitally connected, the field has growing global importance and the number of job openings at all levels is growing.
Key Concepts: Adversarial Thinking, Threat Modeling, Risk Assessment
Goal: The educator creates or selects and implements an activity that requires students to engage in modeling and weighing the risks associated with a cyber threat using situational perspective and adversarial thinking.
What is Adversarial Thinking? Threat Modelling? Risk Assessment?
Threat Modeling is an organized process to identify potential security threats and vulnerabilities, rate the seriousness of each, and prioritize techniques to prevent or lessen the severity of attacks and protect resources. These threats can be intentional or unintentional.
Adversarial thinking considers all of the ways that a system might be compromised by the "bad guys". This is a useful tool for Threat Modeling.
Risk Assessment considers all of the costs of protecting information: time, money, and resources; and balances those against the likelihood of an attack, along with the cost of the damage that could be done by an attack in order to make recommendations on how to prioritize security measures.
In any organization there are always going to be risks involved that need to be managed. Risks fall into two main categories: inherent risks (risks that cannot be avoided) and residual risk (what remains after measures are taken to stop the inherent risks). Every organization also has a risk appetite, or level of risk, that they are willing to assume.
When assessing risk, possible threats need to be considered and weighted. Threats can be environmental: hurricane, tornado, earthquake, etc. There are also man-made threats like external attempts to disrupt an organization, as well as accidental or intentional disruptions by employees. Companies should always be aware of their risks or have a good sense of risk awareness. An external evaluation is known as a risk control assessment while an internal evaluation is a risk control self-assessment. To be able to provide some sort of measurement on threats, a quantitative evaluation can be performed to include Single Loss Expectancy (SLE) or an Annualized Rate of Occurrence (ARO) to give people an understanding of the likelihood of a particular threat affecting you. Adversarial thinking requires evaluating a system by thinking about how to exploit and undermine it and identifying ways to alter its content and integrity. A complete understanding of potential risk includes knowledge of possible system compromises by adversaries. (Adapted from Cyber.org)
Assessment Rubric
To earn this micro-credential, you must receive a “passing” score for Parts 1, 2 and 3.
Part 1: Identification and implementation of the Activity
Describe the activity (up to 1 page) including these details:
- Intended grade levels
- Intended prior experience recommended for students
- Approximate time needed to implement the lesson.
- Engagement or warm-up activity
- Key take aways. Describe what students will be able to do upon completion of the lesson.
- Source of the activity (or reference sources used to create the activity) with a description of any adaptations made.
- Alignment to standards
- Differentiation and instructional supports
- Assessment
I. Alignment to the K12 Cyber Standards |
II. Instructional Supports |
III. Assessment |
The lesson aligns with the letter and spirit of the MD K-12 Cyber Standards: ___ Aligns to Cyber Standards
____ Integrates concepts and practices
|
The lesson/unit is responsive to varied student learning needs: ___ Clarity:
___ Engagement
___ Differentiation
|
The lesson/unit assesses whether students are mastering standards-based content and skills: ___ Student assessment
___ Teacher supports
___ Collaboration options
|
View Creative Commons Attribution 3.0 Unported License at http://creativecommons.org/licenses/by/3.0/. Educators may use or adapt. If modified, please attribute EQuIP and
Passing | The activity and associated practice(s) are clearly described, meaning that student and teacher actions at each stage of the activity are detailed. Citations are provided for any resources used or adapted for the activity.
Not Passing: |
Not Passing | Submission does not meet requirements. |
Part 2: Work examples and artifacts
Submit a video (5-7 minutes in length) that demonstrates highlights of the lesson. You can either record yourself teaching the lesson, record your students engaging in an activity in the lesson, or record your comments while commenting on anonymized student work submitted for the lesson. Your video should capture evidence of at least two of the three aspects (threat modelling, adversarial thinking, and risk assessment) in detail.
Passing | Video demonstrates appropriately structured activities in the educator’s classroom, evidenced by showing at least two of the 3 elements within the video. Strong evidence of one or more of the three practices of threat modelling, adversarial thinking, and risk assessment. |
Almost Passing | Video does not fully demonstrate activities, or activities are not appropriately structured. Some evidence of one or more of the three practices of threat modelling, adversarial thinking, and risk assessment. |
Not Passing | Incomplete or missing video artifact. No evidence of one or more of the three practices of threat modelling, adversarial thinking, and risk assessment. |
Part 3: Reflection
Provide a written reflection (up to 500 words) on what you learned from implementing the risk and threat activities, including at least two of the following questions:
- What was the impact of implementing your activity with your class? How successful was the activity? Provide evidence to support your answer.
- What challenges did you face when implementing this activity? How might you address those challenges for the future?
- How well did this activity fit into your lesson cycle? How might you incorporate this activity or related activities on these concepts into your teaching practice in the future?
- Do you feel that the students will be able to transfer what they learned through this activity to other tasks? Why or why not?
Passing | Reflection clearly indicates how the activity affected both the students and the educator, including changes to the educator’s pedagogical practices. The reflections are specific and supported by examples. Evidence of success includes student work or the results of formative or summative assessments. Reflection mentions the activity in the broader context of a lesson cycle or unit. Educator includes details of transferable skills, using evidence from classroom artifacts or behaviors. |
Not Passing | Submission does not meet requirements |
Glossary:
threat modelling
adversarial thinking
risk assessment