In this lesson, students will explore the importance of decision-making, ethical considerations in cybersecurity, and optimization strategies using real-world and computational problems. They will analyze network security threats, discuss accountability, and apply graph theory to solve the Muddy City problem.
Students will be able to:
- Discuss ethical implications of network security breaches.
- Identify stakeholders and accountability in cybersecurity incidents.
- Solve an optimization problem using the Minimal Spanning Tree algorithm.
- Apply decision-making strategies in real-world and computational scenarios.
In this lesson, students will explore the OSI Model through an engaging real-world analogy that simulates data transmission over a network. Students will apply critical thinking to analyze network issues and their impact on communication. The activity encourages problem-solving by having students adjust to various network disruptions and constraints.
Students will be able to:
- Describe the seven layers of the OSI Model and their functions.
- Apply the OSI Model to real-world networking scenarios.
- Analyze the impact of network disruptions and propose solutions.
This lesson introduces students to various types of network attacks, their impact on networks, and how they can be prevented. Students will engage in activities that promote critical thinking about cybersecurity threats and ethical considerations.
Students will be able to:
- Identify and describe different types of network attacks.
- Analyze the OSI model layers targeted by specific attacks.
- Evaluate the ethical and legal consequences of cyberattacks.
- Create a one-pager summarizing key information about a specific network attack.