Jump to content

UTPA STEM/CBI Courses/Computer Science/Operating Systems

From Wikiversity

Course Title: Computer Science

Lecture Topic: Operating Systems

Instructor: Yang Liu

Institution: University of Texas - Pan American

Backwards Design

[edit | edit source]

Course Objectives

  • Primary Objectives- By the next class period students will be able to:
    • Explain security issues at different level
    • Identify common attacks to computer systems.
  • Sub Objectives- The objectives will require that students be able to:
    • Describe threats/attacks at different level
    • Summarize methods to prevent threats/attacks
  • Difficulties- Students may have difficulty:
    • Identifying software attacks if they are not familiar with program
  • Real-World Contexts- There are many ways that students can use this material in the real-world, such as:
    • Detect virus in email attachment
    • Identify a Trojan horse in downloaded software
    • Recognize spyware

Model of Knowledge

  • Concept Map
    • Threats/attacks
    • Preventive methods
  • Content Priorities
    • Enduring Understanding
      • Security issues at different level and of different format
    • Important to Do and Know
      • Implementation details of software attacks
    • Worth Being Familiar with
      • Other challenges that exist affecting security

Assessment of Learning

  • Formative Assessment
    • In Class (groups)
      • Explain several threats/attacks
    • Homework (individual)
      • Identify possible threats/attacks for a given scenario
  • Summative Assessment
    • Connect threats/attacks to their examples

Legacy Cycle

[edit | edit source]

OBJECTIVE

By the next class period, students will be able to:

  • analyze security issues for a system

The objectives will require that students be able to:

  • identify different threats/attacks and preventive methods

THE CHALLENGE

What should we consider to protect the normal working state of amazon servers?

GENERATE IDEAS

What needs to be protected? What is the best way to protect it? Are the protections sufficient?

MULTIPLE PERSPECTIVES

System security

Threats/attacks

Preventive methods

RESEARCH & REVISE

Other topics for system issues such as policy.

TEST YOUR METTLE

Connect threats to their examples.

GO PUBLIC

Present threats/attacks for this challenge

Pre-Lesson Quiz

[edit | edit source]
  1. What is meant by system security?
  2. What can break system security?

Test Your Mettle Quiz

[edit | edit source]
  1. Give an example of spyware.
  2. Explain the difference between threats and attacks.