Risk Lesson
Upon completion of the Risk lesson, students will:
1) Understand how computing resources can be misused,
2) Identify how computing resources and information assets can be vulnerable to attack,
3) Explain the role and types of protection mechanisms to achieve confidentiality, integrity, and availability of computing resources and information assets,
4) Summarize security and privacy risks from collecting and storing personal data on a computer system.
Lesson Overview
File: Word file
Size: 168 k
Download (Word)
File: PDF file
Size: 606 k
Download (PDF)
Presentation
File: Powerpoint file
Size: 1 MB
Download (Powerpoint)
Risk & Consequences Activity
File: Word file
Size: 132 k
Download (Word)
File: PDF file
Size: 369 k
Download (PDF)
Risk Scenarios Activity
File: Word file
Size: 136 k
Download (Word)
File: PDF file
Size: 600 k
Download (PDF)
Asset Identification Activity
File: Word file
Size: 173 k
Download (Word)
File: PDF file
Size: 358 k
Download (PDF)
National Vulnerability Database Activity
File: Word file
Size: 10 MB
Download (Word)
File: PDF file
Size: 541 k
Download (PDF)
Defense In Depth Activity
File: Word file
Size: 133 k
Download (Word)
File: PDF file
Size: 366 k
Download (PDF)
Activity Solutions
Please send an email to obtain these files. Please provide the name of your institution and title. Email to: info@ncyte.net
All Lesson Files
File: Zip file containing 7 files
Size: 2 MB
Titles:
Overview
Presentation
Risk & Consequences Activity
Risk Scenarios Activity
Asset Identification Activity
National Vulnerability Database Activity
Defense In Depth Activity
Activity Solutions - Not Included (see above)
![]() |
This material is based upon work supported by the National Science Foundation under Grant No.1548315. |