0% found this document useful (0 votes)
11 views15 pages

Cyber Story Slides

I'm just uploading this so I can read heartstopper lol

Uploaded by

violet.palacios1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views15 pages

Cyber Story Slides

I'm just uploading this so I can read heartstopper lol

Uploaded by

violet.palacios1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Daily Warm-Up

On your warm-up doc answer the


following question:
Think about the smart devices you use (like phones,
smartwatches, or home assistants). These devices
collect a lot of personal data.
Question:
How do you think the CIA Triad (Confidentiality, Integrity,
Availability) applies to the data collected by smart
devices? Which part of the triad is the most important to
protect and why?
Write 2-3 sentences explaining your answer, and be
prepared to discuss with the class!
GUARDIANS OF
THE DIGITAL
REALM
A Cybersecurity Saga

Use the arrows to read


through this story.
YOUR TASK
Read through this cyber story and pay attention to
the words in bold lettering. Using context clues,
complete the challenge in the next item.
Prologue

Once upon a time, in the bustling city of Cyberburg, there


existed a powerful organization known as "The Cyber
Guardians." They were dedicated to protecting the digital
realm, protecting the confidentiality, integrity, and
availability of information for all the citizens of the
interconnected world.
Chapter 1: The Digital City

In Cyberburg, life was entirely dependent on the digital


world. From smart homes and self-driving cars to online
education and healthcare, the city was a beacon of
technological innovation. The Cyber Guardians' primary
mission was to safeguard this digital paradise by minimizing
all cybersecurity risks.
Can you think of other
technological devices
that could be at risk?
Chapter 2: The Rise of Threats

However, Cyberburg was not without its challenges. As


technology evolved, so did the threats. Hackers with various
motivations posed a constant risk. Some were motivated by
financial gain, seeking to exploit vulnerabilities for profit.
Others were driven by hacktivism, using their skills to fight
for social or political causes. The most sinister among them
were the cyberterrorists, who aimed to wreak havoc and
create chaos on a grand scale.
Chapter 3: The Hidden Vulnerability

One fateful day, Cyberburg's leading energy provider,


"EcoPower," discovered a vulnerability in its system. A
disgruntled employee had discovered this weakness and
planned to unleash a cyberattack that could cripple the
entire city's power supply. The Cyber Guardians received a
tip about this imminent threat and quickly sprang into
action.
Chapter 4: The Battle Against Time

As the clock ticked, the Cyber Guardians raced against time


to secure EcoPower's infrastructure. The guardian tasked
with confidentiality led the mission to protect the sensitive
information and make sure it only was accessible to Confidentiality
authorized users. Authorized users needed the proper
authentication to access information.
Chapter 4: The Battle Against Time

Next, the guardian in charge of integrity worked to ensure


that all data was accurate.

Integrity
Chapter 4: The Battle Against Time

After that, the guardian in charge of availability made sure


that all data remained accessible to those who were
authorized to access it.

Availability
Chapter 5: The Showdown

The Cyber Guardians found themselves in a virtual


showdown with the rogue employee. In a heart-pounding
battle of wits and skills, they countered the attacker's
moves, preventing a catastrophic blackout. The cyber
criminal tried to deny having led the attack, but their digital
signature proved otherwise. This ensured that the
cybercriminal was indeed guilty and could be held
accountable for their actions.

Non-repudiation
Chapter 6: The Aftermath

With the crisis averted, Cyberburg breathed a collective sigh


of relief. EcoPower's systems were patched, and the
vulnerability was sealed. Lessons were learned, and risk
management strategies were reinforced. The city's residents
gained a newfound appreciation for the Cyber Guardians,
recognizing their vital role in safeguarding their way of life.
Chapter 7: The Ongoing Vigilance

In Cyberburg, the battle for cybersecurity never truly ended.


The city's guardians remained vigilant, protecting their
digital paradise from new threats and ensuring that the
principles of confidentiality, integrity, and availability were
upheld. They knew that in the ever-evolving digital world,
the quest for information assurance was an unending saga.
THE END

Words to Know:

Confidentiality Risk
Integrity Threat
Availability Vulnerability
Authentication Patching
Non-repudiation Information Assurance
CREDITS: This presentation template was created by Slidesgo, and
includes icons by Flaticon, and infographics & images by Freepik

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy