330 likes | 335 Views
T he N ew WI Computer Science Academic Standards and Cybersecurity. Joe Kmoch joe@jkmoch.com WMC, May 4 , 2018-8:00am http:// csitresources.pbworks.com. Can you ID recent examples?. Let’s name some CyberSecurity Issues and Events. Cybersecurity Problems Growing.
E N D
The New WI Computer Science Academic Standards and Cybersecurity Joe Kmoch joe@jkmoch.com WMC, May 4, 2018-8:00am http://csitresources.pbworks.com
Can you ID recent examples? Let’s name some CyberSecurity Issues and Events
Cybersecurity Problems Growing • Cyber crime continues to be a significant and growing problem, both in the US and around the world. • For example a record 79% of respondents to a recent Price Waterhouse Cooper study reported that they had detected a security incident within the past 12 months
Cybersecurity News • Can the Law Stop Ransomware? • Data Stolen from Saks Customers • Hackers Demand Bitcoin in Cyberattack • Report: Little Progress on Voting Security • Report: Russia Will Meddle in 2018 Elections • Readying for the Next (Cyber) War • …some recent headlines from one news publication
Employment Needs • With increasing cyberattacks on industries across the globe, the demand for cybersecurity and cybercrime professionals has never been higher. • It’s hard to find a professional career that outpaces cyber security. • US BLS, job growth from 2012-2022 for information Security Analysis is projected to be 37% compared with 18% for all computer occupations and 11 percent for all occupations
Issues in Cybersecurity Hiring • #1 IT Career currently • Hard to find people trained in dealing with Cybersecurity • On the top of the hiring list of nearly every company • NSA (aka No Such Agency, National Security Agency) • openly recruiting; even appearing at HS events • eequire US citizens
During this session • Basics of WI Computer Science Standards • Cybersecurity existence in the CS Framework • WI CS Standards structure • Strand Standard Learning Priority Learning Indicators • Where Cybersecurity fits into WI CS Standards • Computational Thinking • Resources
Basics of WI CS Standards • Informed by the K-12 CS Framework (rel 9/2016) • http://k12cs.org • 5 Core Concepts – what students should know • Major content areas in CS • 7 Core Practices – what students should do • Behaviors computationally literate use to engage with the core concepts
Themes Interwoven throughout the Framework • Equity inclusion and diversity • Powerful ideas to solve real world problems • Computational thinking • Breadth of application
Cybersecurity? • Why Cybersecurity in the Framework and our Standards? • to strengthen national security, • to deliver innovative STEM education, and • to provide preparation for good, well-paying jobs
Cybersecurity? • How does Cybersecurity fit in? • Explicitly addressed in concepts (strands) • Networking and the Internet • Impacts of Computing • Implicitly addressed in all five strands • Studying issues in cybersecurity at a high level • Requires much CS
Framework to Standards The K–12 ComputerScience Framework informs standards and curriculum, professional development, and the implementation of computer science pathways.
WI Academic CS Standards • Adopted June, 2017 • Informed by the Framework • Five FW core concepts become five strands • Practices inform all of the indicators
Overall Org of WI CS Stds • Five Strands • Inside each Strand there are 2 or more Standards • Within each Standard there are 2 or more Learning Priorities • Within each Learning Priority there are between 3 and 22 Indicators divided over 4 grade bands • The goal in our CS courses is for students to know, understand and be able to do the Learning Priorities. • The Indicators are measurable and written so that teachers can measure them. These are written appropriate to grade bands
Cybersecurity and CS • Framework identifies knowledge and behaviors by grade band (K-2, 3-5, 6-8, 9-12) • Authentication, info privacy, backup, piracy, encryption, social engineering, legal issues, algorithms • These are reflected in the WI CS Standards
Cybersecurity & CS • Mostly the Framework and Standards focus on the user – assuring the user understands enough to protect her/himself • Learning details about security in systems involves much CS but is beyond the scope of the Framework and Standards
Computational Thinking (CT) • CT is a cornerstone of Computer Science • Concepts and Practices • Data collection, analysis, visualization • Decomposition, patterns, algorithm, abstraction, automation • Modeling/simulation, parallelization • Dispositions (similar to Math Practices) • Deal with open ended problems, ambiguity, complexity, persistence, communication & collaboration
Resources for Cybersecurity– focus on CS standards and beyond • Cybersecurity Unit for APCS Principles • Bob Juranitch • What students/teachers will learn:. • Students will recognize the importance of cybersecurity and the vulnerabilities that are inherent in the design of the Internet. • Students will recall cybersecurity attack terminology and their definitions. • Students will differentiate the various cyber-attacks when given contextual examples. • Students will identify the best defense for each cybersecurity attack vector. • Students will deconstruct cyber incidents into case studies. • Students will research cyber incidents and correctly apply new cybersecurity terminology when appropriate. • Students will collaborate with their classmates to prepare a presentation. • Students will explain to others the various terminology and scenarios in cybersecurity incidents.
Other Cybersecurity resources • APCS-P includes cybersecurity objectives • Beauty and Joy of Computing • Code.org • Mobile-based NSF course • PLTW Software Engineering • …others • CSUnplugged.org activities
Other Cybersecurity resources • High School & Middle School Programs • CyberPatriot Competition • National Youth Cyber Education Program • http://uscyberpatriot.org • NSA Day of Cyber • Job shadow a real cyber professional at NSA • https://www.nsadayofcyber.com
Other Cybersecurity resources • Cisco Network Academy Intro to Cybersecurityand Essentials Courses • Some of the security benchmarks include • Identify basic security threats and solutions for both small and large networks. • Explain why security measures are necessary on network devices. • Identify security vulnerabilities. • Identify general security mitigation techniques. • Configure network devices with device hardening features to mitigate security threats. • https://www.netacad.com/courses/intro-cybersecurity/ • https://www.netacad.com/courses/cybersecurity-ess/
Other Cybersecurity resources • National Cyber League • Cybersecurity competitions and coursware • Hands on preparation for Security+ and Certified Ethical Hacker certifications • Including lab exercises and game play • https://www.nationalcyberleague.org
In depth certification • Security+ course and certification • Aimed at two year colleges and other certification programs • Some high schools offer this • Mark Ciampa book is extensive
NCL Security+ SupplementalSyllabus Topics • Based on Mark Ciampa’s text • Introduction to Security • Malware and Social Engineering Attacks • Application and Networking-Based Attacks • Host, Application, and Data Security • Cryptography • Network Security • Administering a Secure Network • Mobile Security • Access Control Fundamentals • Authentication and Account Management • Business Continuity • Risk Mitigation • Vulnerability Assessment and Third Party Integration
NCL Certified Ethical HackerSupplemental Syllabus Topics • Based on several texts • Background knowledge needed for CEHTMv8 • Analysis and Assessment • Security • Tools/Systems/Programs • Procedures/Methodology • Regulation/Policy • Ethics
Other Cybersecurity resources • SEED Labs • Hands-on Labs for Security Education • Over 30 Labs • Free workshops • Textbook • http://www.cis.syr.edu/~wedu/seed/book.html
Other Cybersecurity resources • Cybrary • Free and Open Source Learning for Cyber Security • https://www.cybrary.it/ • CyberAce.org– Advanced Cyberforensics Education – camps, clubs, curricula in SE US • CyberAces.org– SANS adult online curriculm Fundamentals of Cybersecurity • Segments on Operating Systems, Networking, System Administration
Discussion? Questions? Thank You! Joe Kmoch joe@jkmoch.com Presentation available at http://csitresources.pbworks.com 4/29/2018