CU In Class | Intro to Adversarial Thinking for Cybersecurity

Adversarial thinking is central to cybersecurity, and this lecture explains why it matters.

đź”— Learn more about Cedarville Cybersecurity: https://www.cedarville.edu/academics/centers/center-for-the-advancement-of-cybersecurity/cyber-at-cedarville

In this lecture, Dr. Seth Hamman introduces a homemade module on adversarial thinking that was developed with support from an NSA grant and shared publicly for cybersecurity educators. Using the familiar framework of computers and bad guys, the lecture shows why cybersecurity is distinct from other fields and why it requires more than technical best practices alone. Students are challenged to think beyond barriers like passwords, firewalls, and multi-factor authentication and consider the mindset, capabilities, and strategies of attackers.

The lecture also explores how cyberspace differs from physical space through the ideas of distance-less, digital, and dynamic environments, and how those realities shape threats to confidentiality, integrity, and availability. From there, the lecture defines adversarial thinking as the ability to embody the technological capabilities, unconventional perspectives, and strategic reasoning of hackers. Through examples like the CIA triad, the Cuckoo’s Egg, cross-site scripting, malware, rootkits, social engineering, and game theory, the lecture builds a practical framework for anticipating attacks and strengthening cybersecurity education.

Timestamps:
0:00 Introduction to the adversarial thinking module
2:04 What cybersecurity really means
4:00 The three B’s: bad guys, barriers, and bounties
11:22 Why cyberspace is harder to secure
14:02 CIA triad and hacker goals
20:19 Why cyber adversaries define the discipline
23:42 What does it mean to think?
24:37 Sternberg’s triarchic theory of intelligence
31:17 Applying the theory to hackers
37:19 Definition of adversarial thinking
39:15 The Cuckoo’s Egg and real-world hacking
45:05 The Princess Bride analogy
48:15 Strategic reasoning and game theory
51:02 Final takeaways

🎓 Admissions: https://cedar.to/Admissions
đź’° Financial Aid: https://cedar.to/FinAid
🏫 Visit Campus: https://cedar.to/Visit
📚 Academic Programs: https://cedar.to/Programs

#Cybersecurity #AdversarialThinking #GameTheory #InformationSecurity #Cedarville #HigherEducation

—

This lecture introduces adversarial thinking as a core cybersecurity skill and shows how it connects technical knowledge, creativity, and strategic reasoning. Using examples from the CIA triad, hacking case studies, and game theory, the speaker explains why cybersecurity is an adversarial conflict between defenders and attackers. The lesson highlights how students can learn to anticipate threats, spot unsafe assumptions, and think like a hacker to strengthen security practice.

Learn More About Cedarville

Request Information Visit Campus Apply Now Take a Virtual Tour Watch More on YouTube