In this lesson, students learn that since the Internet is used to send, receive, and store valuable personal information, users are put at risk of having this information stolen through cyber attacks. Cybersecurity is a field that involves several disciplines of computer science. It is valuable to build basic computer science literacy no matter what field you eventually enter.
Students will be able to:
In this lesson, students will learn what is meant by cybersecurity and explore a few news worthy cyber attacks. They will also discuss the Internet of Things and the increase in connected devices.
Cybersecurity is the protection of computer systems, networks, and data from digital attacks. Increased connectivity via the Internet of Things and reliance on computer devices to send and store data makes users more vulnerable to cyber attacks.
Students will be able to:
In this lesson, students will learn and examine recent cyber attacks. Cyber attacks result in financial loss, lowered trust, disruption of important services, and more. There is a growing need for cybersecurity experts, and careers in the field are lucrative with high-impact.
Students will be able to:
In this lesson, students will learn about The CIA Triad. The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.
Students will be able to:
In this lesson, students complete a summative assessment of the unit’s learning objectives.
Students will be able to:
In this lesson, students understand how they can control and protect their footprint. As students use the Internet, they are building their digital footprint. This includes social media posts, emails, picture and video uploads amongst other online activities.
Students will be able to:
In this lesson, students will learn about and discuss cyberbullying. Cyberbullying is the use of electronic communication to harass or target someone. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.
Students will be able to:
In this lesson, students will learn to recognize online predatory behavior and strategies on how to avoid and respond to it. The Internet is a great place to socialize, but it is important to be aware of risks. Common sense and following safety guidelines can help students stay safe online.
Students will be able to:
In this lesson, students will discuss and examine policies regarding privacy and security. Using best practices like setting strong passwords, reading privacy policies, and using https can help in staying safe online.
Students will be able to:
In this lesson, students will learn about and discuss information literacy. Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.
Students will be able to:
In this lesson, students will learn what copyright laws are and how to avoid copyright infringement. They will explore why copyright laws are important and how they protect the creators.
Students will be able to:
In this lesson, students will explore and discuss the ethics and legality around hacking. A security hacker is someone who seeks to break through defenses and exploit weaknesses in a computer system or network. There are white hat hackers, who help companies find and protect exploits in their systems, and black hat hackers who hack maliciously.
Students will be able to:
In this lesson, students complete a summative assessment of the unit’s learning objectives.
Students will be able to:
Now that students have learned about digital citizenship and cyber hygiene, they will take what they have learned and create a PSA to inform members in the community about a topic!
Students will be able to:
In this lesson, students will learn how basic encryption and decryption works. There is a need for secrecy when sending and receiving personal information. Encryption and decryption are used to protect personal information.
Students will be able to:
In this lesson, students will learn the history of cryptography. Humans have always had reasons to hide information, and throughout history they have used crypto systems of varying complexity to keep information safe.
Students will be able to:
This lesson has been merged with Cryptography, Cryptology, and Cryptanalysis.
In this lesson, students will learn and practice using the Caesar Cipher. The Caesar Cipher is an encryption method that predates computers in which each letter of the message is shifted by a certain amount, called the key.
Students will be able to:
In this lesson, students will practice using brute force and letter frequency to crack the Caesar Cipher. The Caesar Cipher is an encryption method in which each letter of the message is shifted by a certain amount, called the key. Cracking the Caesar Cipher with brute force (trying every combination) is a trivial matter for modern computers.
Students will be able to:
In this lesson, students will learn and use the Vigenère Cipher. The Vigenère Cipher consists of several Caesar ciphers in sequence with different shift values based on a keyword, so brute force and letter frequency analysis do not work.
Students will be able to:
In this lesson, students will review the Caesar cipher and history of cryptography until the present day to bridge to the current topic of advanced cryptography. They will examine a high-level view of “hard” vs. “easy” problems. Symmetric vs. asymmetric encryption and public-key encryption will be emphasized.
Students will be able to:
Identify the problems with symmetric key encryption and why modern cryptography involves more complex mathematics
Explain the difference between symmetric and asymmetric encryption
In this lesson, students will learn and use hashing functions. They will look at what hashing is, requirements of a good hashing algorithm, how hashing is used, what the ideal hash function does, collisions in hashing, and how hackers try to crack a hashing algorithm.
Students will be able to:
In this lesson, students look at hash function development by delving into modulo math. Modulo math is very important in advanced cryptography since it’s a one-way function where the output hides the input very well. This makes it useful in creating hashing functions.
Students will be able to:
In this lesson, students complete a summative assessment of the unit’s learning objectives.
Students will be able to:
In this project, students will get to create a newscast about a cipher! This could be pre-recorded or presented live and could be a great way to vary the standard group presentation on a topic. The components of the presentation should include:
Students will be able to:
In this lesson, students will look under the hood of web sites and web applications by using “view page source” in a browser. This will enable them to see HTML markup for images, navigation, and page layouts, CSS styling, and even JavaScript source code or links to JS files. Students will also view code that has been minified and understand what that means. Lastly, students will also take a first look at OWASP (Open Web Application Security Project) which is an important organization in cybersecurity.
Students will be able to:
In this lesson, students will learn about and use the developer tools in a browser. Web developers actually use these to help build and test websites. Cyber professionals need to be very familiar with the different ways of looking at how sites and apps function so they can use various tools to detect vulnerabilities or even detect attacks as they are starting.
Students will be able to:
In this lesson, students will take a look at what databases are, how they are organized and used, the major parts of a database, and what a database schema is and generally looks like.
Students will be able to:
In this lesson, students take a look at what client and server devices and applications are, the client-server model, and how databases are part of that client-server model. They will get a high-level view of how clients and servers work together to help exchange information and data over a network or the Internet.
Students will be able to:
In this lesson, students will be introduced to SQL (structured query language). Students will also learn how a database is structured into tables and rows.
Students will be able to:
This lesson has been merged with What is SQL?
In this lesson, we learn about and use the SELECT statement in SQL. The SELECT statement is used to query the database and return a row or multiple rows from a table in the database.
Students will be able to:
In this lesson, students learn about the WHERE clause and basic filtering of queries in SQL.
Students will be able to:
In this lesson, students learn the overall concept of security: what it means to them personally and what it means to organizations in a digital world. They will reflect on what makes them feel secure.
Students will be able to:
This lesson provides an overview of what SQL injection is, the impact, how it works, and how hackers use SQL to attack a site. The lesson also has connections on the Equifax cyber attack that was a very large scale SQL injection.
Students will be able to:
In this lesson, students will learn and discuss types of SQLi and ways to prevent or at least mitigate an attack.
Students will be able to:
In this lesson, students will learn about and discuss cross-site scripting (XSS), which is another major OWASP (Open Web Application Security Project) cybersecurity risk.
Students will be able to:
In this lesson, students complete a summative assessment of the unit’s learning objectives.
Students will be able to:
In this lesson, students will explore at a high-level what the internet is and how the internet works.
Students will be able to:
In this lesson, students will explore the hardware that makes up the internet and the characteristics of that hardware that define our experience on the internet.
Students will be able to:
In this lesson, students will explore how internet hardware communicates using Internet Addresses and the Internet Protocol.
Students will be able to:
In this lesson, students will explore the DNS system and how it maps human readable domain names into actual accessible IP addresses.
Students will be able to:
In this lesson, students explore how messages get from one address on the internet to another.
Students will be able to:
In this lesson, students learn about the last piece of the puzzle for how the Internet works: Packets and Protocols. All information sent over the internet is broken down into small groups of bits called packets. The format for creating and reading packets is defined by open protocols so that all devices can read packets from all other devices.
Students will be able to:
In this lesson, students learn how all of the pieces of the puzzle (IP addresses, the DNS system, routing, and packets and protocols) fit together to send information over the internet. Students will extend these new concepts to consider net neutrality and its ramifications on cybersecurity.
Students will be able to:
In this lesson, students are presented with different ways that the Internet impacts their lives. The Internet affects the way that people communicate (emails, social media, video chat) and collaborate to solve problems. It has revolutionized the way that people can learn and even buy things. Because the Internet is present in almost every facet of people’s lives, there are severe ethical and legal concerns that derive from the Internet.
Students will be able to:
In this lesson, students are presented with the main ways that networks are attacked: social engineering and DoS or DDoS. They will build on their knowledge of how the internet works by shifting the focus from understanding the internet and networks to safeguarding networks from malicious attackers.
Students will be able to:
In this lesson, students explore what a network administrator career entails.
Students will be able to:
In this lesson, students complete a summative assessment of the unit’s learning objectives.
Students will be able to:
In this culminating course project, students will get to research and create a presentation with a handout/flyer around either user education or a cyber security career with the intended audience being the general public.
Students will be able to: