Unit One - Introduction To CyberPatriot and Cyber Security
Unit One - Introduction To CyberPatriot and Cyber Security
CYBERPATRIOT
NATIONAL YOUTH CYBER EDUCATION PROGRAM
UNIT ONE
Introduction to CyberPatriot and
Cybersecurity
www.uscyberpatriot.org
AIR FORCE ASSOCIATION’S
CYBERPATRIOT
NATIONAL YOUTH CYBER EDUCATION PROGRAM
SECTION ONE
Introduction to CyberPatriot
www.uscyberpatriot.org
1
What Is CyberPatriot?
SAMPLE SCHEDULE:
Sunday Monday Tuesday Wednesday Thursday Friday Saturday
1 2 3 4 5
Competition Round
Preparation Email sent
6 7 8 9 10 11 12
13 14 15 16 17 18 19
Image Download and StartEx Email sent
Instructions Email sent COMPETITION
20 21 22 23 24 25 26
Round Results
ROUND Email sent
27 28 29 30 1 2 3
CYBERPATRIOT
NATIONAL YOUTH CYBER EDUCATION PROGRAM
SECTION TWO
Introduction to Cybersecurity
www.uscyberpatriot.org
12
What is Cybersecurity?
Source: www.UMUC.edu
• 2011: DHS plants USB drives and CDs outside of government and
government contractor buildings. The majority are picked up by
employees and inserted directly into their organization’s
computers.
Answer: People make mistakes.
Cybersecurity is often about protecting organizations and individuals from themselves.
Sources: CSO magazine, www.csoonline.com, Bloomberg News, www.bloomberg.com, GCN Magazine, www.gcn.com
Attackers infiltrate
Criminals capture Criminals launch
RSA’s network
the algorithms used attack on Luckily, Lockheed’s
through malware
to generate Lockheed’s security team is able
deployed in spoof
Lockheed Martin’s networks using the to thwart the
emails sent to the
random SecurID® algorithms they stole attacks.
company’s
passwords from RSA
employees
• Cyber workers
‐ Employees that maintain day-to-day
security and strengthen their
organization’s protection
• Cyber defenders
‐ Government or contractor employees
that protect American networks and
information from attacks
• Cyber sleuths
‐ Professionals that watch for espionage
and insider threats and perform digital
forensics for law enforcement
• Cyber leaders
‐ Industry veterans that decide company
security policies, train new employees,
and conduct R&D