Security

Security

Rating
Average: 4 (1 vote)
Security Network
Course
Course
IT Fundamentals
Grade Levels
Grade Levels
8
9
Duration (hours)
Duration (Approx hours)
20
Overview
In this unit, students will compare and contrast the CIA triad and explore ways to secure devices. Students will also analyze best practices for security with systems
Standards
CompTIA IT Fundamentals (FC0-U61) Objectives 6.1 – 6.7
Cyber Connections
Computational Thinking
Coding/Programming
Cybersecurity
Cryptography
Networks and Internet
Section Title
Lessons
Accordion Items
Title
6.1 – Summarize confidentiality, integrity and availability concerns
Content
  • Confidentiality concerns
    • Snooping
    • Eavesdropping
    • Wiretapping
    • Social engineering
    • Dumpster diving
  • Integrity concerns
    • Man-in-the-middle
    • Replay attack
    • Impersonation
    • Unauthorized information alteration
  • Availability concerns
    • Denial of service
    • Power outage
    • Hardware failure
    • Destruction
    • Service outage
Title
6.2 – Explain methods to secure devices and best practices
Content
  • Securing devices (mobile/workstation)
    • Antivirus/Anti-malware
    • Host firewall
    • Changing default passwords
    • Enabling passwords
    • Safe browsing practices
    • Patching/updates
  • Device use best practices
    • Software sources
    • Validating legitimate sources
    • Researching legitimate sources
    • OEM websites vs. third-party websites
    • Removal of unwanted software
    • Removal of unnecessary software
    • Removal of malicious software 
Title
6.3 – Summarize behavioral security concepts
Content
  • Expectations of privacy when using:
    • The Internet
    • Social networking sites
    • Email - File sharing
    • Instant messaging
    • Mobile applications
    • Desktop software
    • Business software
    • Corporate network
  • Written policies and procedures
  • Handling of confidential information
    • Passwords
    • Personal information
    • Customer information
    • Company confidential information 
Title
6.4 – Compare and contrast authentication, authorization, accounting and non-repudiation concepts
Content
  • Authentication
    • Single factor
    • Multifactor
    • Examples of factors
    • Password
    • PIN
    • One-time password
    • Software token
    • Hardware token
    • Biometrics
    • Specific location
    • Security questions
    • Single sign-on
  • Authorization
    • Permissions
    • Least privilege model
    • Role-based access
    • User account types
    • Rule-based access
    • Mandatory access controls
    • Discretionary access controls
  • Accounting
    • Logs
    • Tracking
    • Web browser history
  • Non-repudiation
    • Video
    • Biometrics
    • Signature
    • Receipt
Title
6.5 – Explain password best practices
Content
  • Password length
  • Password complexity
  • Password history
  • Password expiration
  • Password reuse across sites
  • Password managers
  • Password reset process
Title
6.6 – Explain common uses of encryption
Content
  • Plain text vs. cipher text
  • Data at rest
    • File level
    • Disk level
    • Mobile device
  • Data in transit
    • Email
    • HTTPS
    • VPN
    • Mobile application
Title
6.7 - Explain business continuity concepts
Content
  • Fault tolerance
    • Replication
    • Redundancy
    • Data
    • Network
    • Power
    • Backup considerations
    • Data
    • File backups
    • Critical data
    • Database
    • OS backups
    • Location
    • Stored locally
    • Cloud storage
    • On-site vs. off-site
    • Contingency plan
  • Disaster recovery
    • Data restoration
    • Prioritization
    • Restoring access