UTPA STEM/CBI Courses/Computer Science/Operating Systems
Course Title: Computer Science
Lecture Topic: Operating Systems
Instructor: Yang Liu
Institution: University of Texas - Pan American
Backwards Design
editCourse Objectives
- Primary Objectives- By the next class period students will be able to:
- Explain security issues at different level
- Identify common attacks to computer systems.
- Sub Objectives- The objectives will require that students be able to:
- Describe threats/attacks at different level
- Summarize methods to prevent threats/attacks
- Difficulties- Students may have difficulty:
- Identifying software attacks if they are not familiar with program
- Real-World Contexts- There are many ways that students can use this material in the real-world, such as:
- Detect virus in email attachment
- Identify a Trojan horse in downloaded software
- Recognize spyware
Model of Knowledge
- Concept Map
- Threats/attacks
- Preventive methods
- Content Priorities
- Enduring Understanding
- Security issues at different level and of different format
- Important to Do and Know
- Implementation details of software attacks
- Worth Being Familiar with
- Other challenges that exist affecting security
- Enduring Understanding
Assessment of Learning
- Formative Assessment
- In Class (groups)
- Explain several threats/attacks
- Homework (individual)
- Identify possible threats/attacks for a given scenario
- In Class (groups)
- Summative Assessment
- Connect threats/attacks to their examples
Legacy Cycle
editOBJECTIVE
By the next class period, students will be able to:
- analyze security issues for a system
The objectives will require that students be able to:
- identify different threats/attacks and preventive methods
THE CHALLENGE
What should we consider to protect the normal working state of amazon servers?
GENERATE IDEAS
What needs to be protected? What is the best way to protect it? Are the protections sufficient?
MULTIPLE PERSPECTIVES
System security
Threats/attacks
Preventive methods
RESEARCH & REVISE
Other topics for system issues such as policy.
TEST YOUR METTLE
Connect threats to their examples.
GO PUBLIC
Present threats/attacks for this challenge
Pre-Lesson Quiz
edit- What is meant by system security?
- What can break system security?
Test Your Mettle Quiz
edit- Give an example of spyware.
- Explain the difference between threats and attacks.