• عربي
  • 中文
  • English
  • Français
  • Русский
  • Español
 
  This module is a resource for lecturers  

 

Additional teaching tools

 

Case Studies

  • Ignalina nuclear power plant (1992)
  • Davis-Besse nuclear power plant (2003).
  • Browns Ferry nuclear power plant (2006).
  • Hatch nuclear power plant (2008)
  • Korea Hydro and Nuclear Power Co. commercial network (2014)
  • The Gundremmingen Nuclear Power Plant (2016)
  • The Monju Nuclear Power Plant (2014)
  • Hydrogen Isotope Research Center at the University of Toyama (2015)
  • Ukraine's Power Grid Hack (2015)
  • The Cyber Attack on Saudi Aramco (2015)

Information about these cases can be found in the following documents:

 

Websites

 

Videos

  • Software Engineering Institute, Carnegie Mellon University. Wannacry Ransomware (length 1:45).  » This video provides a brief overview of the Wannacry Ransomware.
  • Software Engineering Institute, Carnegie Mellon University.  Insider Threat (length 1:48).  » This video provides a brief introduction of the insider threat.
  • Centre for Strategic & International Studies. Countering Disinformation: Interdisciplinary Lessons for Policymakers (length 1:38:27).  » This video covers a panel discussion on disinformation hosted by the Centre for Strategic & International Studies on disinformation.
  • France 24 English. "You're fake news:" Propaganda and disinformation in the digital age (length 45:33).  » Experts hosted by France 24 debate fake news in the digital age, cover the techniques individuals can use to detect fake news, and critically examine the measures used to counter fake news.  
  • International Centre for the Study of Radicalisation and Political Violence (ICSR). What is cyberterrorism? (length 7:03).  » Dr. Thomas Rid discusses what cyberterrorism is.
  • Center for the Protection of National Infrastructure (CPNI), UK. Be savvy about the social engineer (length 2:05).  » Brief animated video on social engineering.
  • Center for the Protection of National Infrastructure (CPNI), UK. Deter Detect Delay Detain (length 1:42).  » Brief video describes how to respond to a cybercrime, using the four D's of response (deter, detect, delay and detain).
  • Center for the Protection of National Infrastructure (CPNI), UK. Insider Incident - Fraud (length 1:02).  » Brief animated video on insider threats, particularly insiders committing fraud.
  • Center for the Protection of National Infrastructure (CPNI), UK. Insider Incident - IP Theft (length 1:10).  » Brief animated video on insider threats, particularly insiders committing intellectual property crime.
  • Center for the Protection of National Infrastructure (CPNI), UK. Insider Incident - System Sabotage (length 1:05).  » Brief animated video on insider threats, particularly insiders sabotaging systems.
  • Center for the Protection of National Infrastructure (CPNI), UK. Phishing and Spear Phishing (length 2:45).  » Brief animated video on phishing and spearphishing.
  • Cisco Annual Security Report 2014. Watering Hole Attacks (length 2:46).  » CISCO expert discusses watering hole attacks and the techniques used by perpetrators to commit these attacks.

 

Back to top