Skip to content

Resources

Additional online material

 

Day 1: Layering

Learn about the cybersecurity principle layering and about how to secure your passwords

Day 2: Information Hiding

Learn about the cybersecurity principle information hiding and about making sure your firewalls are up and active

Day 3: Encapsulation

Learn about the cybersecurity principle encapsulation and solve some fun cryptographic puzzles and challenges

Day 3 Extra: Morris Worm

In this activity you will have a chance to read about a cyber-crime that took place in the early days of the internet.

The story is in 4 chapters. Each chapter, except the first one, has a code word protecting it. When you finish reading the first chapter, you will notice there is a code word at the bottom. You will have to decode the cipher and use the word you figure out to open the next section. Each chapter, (Chapter 2, 3 and 4), requires a code word to open it. I will give you one clue – each code word is related to one of the 10 principles of cybersecurity.

Day 4: Modularity

Learn about the cybersecurity principle modularity and security updates for your mobile devices and computers

Day 5: Domain Separation

Learn about the cybersecurity principle domain separation and check to see if you have an account that has been breached

Day 6: Process Isolation

Learn about the cybersecurity principle process isolation and check the security settings on your browser

Day 7: Least Privilege

Learn about the cybersecurity principle least privilege and check to be sure your app settings on your mobile devices are not giving away too much information about you

Day 8: Abstraction

 

Learn about the cybersecurity principles abstraction and simplicity of design and review the simple steps to protect your identity and data