Senior Cybersecurity Basics Badge: Identify Functions and Privileges
Setup: Not frosting a cake before
baking it is an example of resource encapsulation
. This cybersecurity
idea labels parts of the program or data based on who can use it and
how it’s used. This protects the code or data from revealing any
more about itself than it needs to run a program. Programmers
bundle, or encapsulate, data and label it. While all the contents of
the bundle still work, encapsulation means the user and the rest of
the program don’t have access to the details.
A related idea is least privilege. That means as few people as necessary should have access to digital “stuff.” Identifying who can use computer hardware, programs, and data—and limiting how they can be used—limits the way hackers make trouble.
Time needed: 25 minutes
First, choose an object anywhere in your house that’s a container, like a refrigerator, someone's backpack, a drawer, or a leftovers container in the refrigerator.
Then, on a sticky note, write down the kinds of objects that can “use” or go along with your object. This is called USE.
For example: what objects should go inside a drawer, a backpack, or a refrigerator? What objects go in the bathroom?
On a second sticky note, write down who can use this object—and who cannot use this object. Be as specific as possible. These are called PRIVILEGES (or permissions, depending on the specific computer system).
Think about who might be in proximity to these devices at any given time: family members, friends, neighbors, etc. Label each object with examples of people who should have access and those who should not.
On a third sticky note, write down instructions about how to use your object. This is called OPERATIONS. In particular, think about any security features and ways to access the object.
For example: A backpack might have a zipper or a bathroom might have a lock.
Next, choose another “container” object and label its uses, privileges, and operations.
Sample Object: Bathroom Drawer
Then, wrap up the activity by reading the Things to Know below.
THINGS TO KNOW:
If you have extra time, repeat the labeling process again with a few other objects.
Note: Girls, volunteers and families are encouraged to take the time and space they need to adjust to this period of rapid change and uncertainty. When they’re ready, we’re here to support Senior and Ambassador Girl Scouts to safely take action in their communities—whether it’s helping ensure kids are still getting the nourishment and enrichment they need out of school, responding to the possible ramifications of isolation during social distancing, adapting an existing project to positively impact local communities today, or something else entirely!
Troop Leaders: The instructions for all badge steps are available free of charge in your Girl Scout Volunteer Toolkit.
Girl Scout Activity Zone activities have been adapted from existing Girl Scout programming.