There are several ways of thinking about the basic theories of cybersecurity. We offer two models and definitions for you to consider.
Each part of the "hand" works together as a whole unit, just like each of your fingers and the palm. As such, each principle is dependent on the next - when one is compromised or not optimal, the entire system is compromised.
Defense in Depth – Multiple layers of security controls are put into place within a system to protect information; the multiple layers of security are in place in case one layer fails, another layer of security is already in place to stop the attack/unauthorized access.
Confidentiality– The property that information is not disclosed to unauthorized individuals, entities, or processes; preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information.
Integrity- Assurance that information is accurate and trustworthy; information must be protected from unauthorized modification/change.
Availability– Information is accessible to authorized persons.
Think Like an Adversary– A thinking process that considers the potential actions of the opposing force (adversary) working against the desired result; ability to anticipate the actions of your adversary and build security measures to defend your information/network – ultimately preventing unauthorized access and loss of data.
Keep It Simple – Value of keeping computer programming/system design simple without compromising the ability to protect information/data from unauthorized access.
(This one is a little longer but this guy is really funny! The whole thing or clips from it might be great to share with your students.)
Shorter, also suitable for introducing kids to the topic