The module will review steps necessary to harden an IoT device using the example of a Raspberry Pi. In this lesson, we will review the importance of software updates, user management, network management, and intrusion detection systems.
High School
60 Minutes
Ask what do you already know about it Hardening an Internet connected device?
Assign two students to be personal computers in a network. Give them signs to put on their chest that say personal computer.
Assign two students to be the Firewall. Have students extend their arms out and connect them. Have them stand in front of the personal computer students.
Have one student stand behind the Firewall students and give them a sign that says Internet.
Facilitate discussion on why a Firewall is important.
Facilitate discussion on how a packet of information will travel internal and external.
Show video: (https://www.youtube.com/watch?v=6UtiQwCX2wU)
Review Firewalls as a Collection of Valves and discuss Firewall Rules.
Author ufw (uncomplicated fire wall) firewall rules for a Linux OS (Raspberry Pi)
Consider similar activities for other IoT Hardening Concepts.
Review what was discussed in the module.
Review how cybersecurity first principles were demonstrated in this module.
Students will demonstrate an understanding of definitions, terminology, and command prompts through a game of Jeopardy/Kahoot Game.
e.g. Quiz / Presentation / Project / Writing Assignment / Observation / Walk Around / Oral Questioning / Other
N/A
Point students to additional resources in the module.
Nebraska GenCyber
is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Overall content: Copyright (C) 2017-2018 Dr. Matthew L. Hale, Dr. Robin Gandhi, and Doug Rausch.
Lesson content: Copyright (C) Your name here 2017-2018.
This lesson is licensed by the author under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.