Identification should include
- considering the scale of the operation along with
- defining biosecurity (e.g., all in/all out, sanitation, isolation, vaccination, vectors)
- defining cybersecurity
- assets – what businesses seek to protect (e.g., people, property, information)
- tangible (e.g., databases, company records)
- intangible (e.g., reputation)
- proprietary information
-
- threat – anything that can exploit a vulnerability, intentionally or accidentally, and obtain, damage, or destroy an asset.
- vulnerabilities – flaws in a system that can leave it open to attack; any type of weakness in a computer system, in a set of procedures, or in anything that leaves information security exposed to a threat*
- risk – the likelihood that a vulnerability will occur and that a loss occurs if that vulnerability is exploited.
- defining production and farm hazards
- biological (e.g., vaccinations, environmental, diseases)
- mechanical (e.g., machinery equipment)
- chemical (e.g., fertilizer, pesticides)
- radiological (e.g., x-rays, radiological leak, screening, and diagnostic imaging?)
- environmental/physical (e.g., weather, work activities)
- situational awareness (e.g., livestock handling, self-awareness).
Teacher Resources:
Process/Skill Questions:
- What is an asset?
- What is the difference between tangible and intangible assets?
- What are the vulnerabilities regarding each of these assets?
- What is an example of a database that businesses may use to improve their record keeping?
- What is a threat?
- What is the difference between intentional and accidental exploitation?
- What is an example of a vulnerability in American history that resulted in damaged or destroyed assets?
- Why are threats harder to identify now than they were 15 years ago?
- What are examples of potential cyber threats to the agriculture industry?
- What does vulnerability mean?
- What are weaknesses or gaps that could be exploited in a security program to gain unauthorized access to an asset?
- How is it possible to secure a system from all vulnerabilities?
- How can the next generation of the cybersecurity workforce be educated to be proactive in identifying vulnerabilities?
- What is the digital trilemma?
- What is a risk?
- Who defines risk – the stakeholder, government, or the consumer? Is risk objective or subjective?
- How are assets lost, damaged, or destroyed as a direct result of threats?
- What formula is used to determine risk?
- What is essential to understanding risks to assets?