Please enable JavaScript to use CodeHS

Introduction to Cybersecurity (Alberti)

Description

In this pre-test for the Introduction to Cybersecurity course students and teachers can determine their general skills and current knowledge base before starting the course.

Objective

SWBAT complete the assessment.

Description

In this lesson, students learn that since the Internet is used to send, receive, and store valuable personal information, users are put at risk of having this information stolen through cyber attacks. Cybersecurity is a field that involves several disciplines of computer science. It is valuable to build basic computer science literacy no matter what field you eventually enter.

Objective

Students will be able to:

  • Set individual learning goals for themselves in the cybersecurity course
  • Explain why it is important to learn computer science, regardless of their goals in college and career
Description

In this lesson, students will learn what is meant by cybersecurity and explore a few news worthy cyber attacks. They will also discuss the Internet of Things and the increase in connected devices.

Cybersecurity is the protection of computer systems, networks, and data from digital attacks. Increased connectivity via the Internet of Things and reliance on computer devices to send and store data makes users more vulnerable to cyber attacks.

Objective

Students will be able to:

  • Define cybersecurity
  • Describe how the Internet of Things makes people more vulnerable to cyber attacks
  • Reflect on recent cyber attacks and identify the financial and societal impact of the attack
Description

In this lesson, students will learn and examine recent cyber attacks. Cyber attacks result in financial loss, lowered trust, disruption of important services, and more. There is a growing need for cybersecurity experts, and careers in the field are lucrative with high-impact.

Objective

Students will be able to:

  • Evaluate recent cyber attacks and understand the negative consequences of these attacks
  • Understand career opportunities in the field of cybersecurity
Description

In this lesson, students will learn about The CIA Triad. The CIA Triad is a widely-accepted security measure that should be guaranteed in every secure system. It stands for Confidentiality, Integrity, and Availability.

  • Confidentiality is the protection of information from people who are not authorized to view it.
  • Integrity aims at ensuring that information is protected from unauthorized or unintentional alteration.
  • Availability is the assurance that systems and data are accessible by authorized users when and where needed.
Objective

Students will be able to:

  • Identify what the CIA triad is and how it relates to cybersecurity
  • Identify which part of the CIA triad has been broken in a given scenario
Description

In this lesson, students complete a summative assessment of the unit’s learning objectives.

Objective

Students will be able to:

  • Prove their knowledge of basic cybersecurity concepts and its impacts through a multiple choice quiz
Description

In this lesson, students understand how they can control and protect their footprint. As students use the Internet, they are building their digital footprint. This includes social media posts, emails, picture and video uploads amongst other online activities.

Objective

Students will be able to:

  • Understand how their online activity contributes to a permanent and public digital footprint
  • Articulate their own social media guidelines to protect their digital footprint
Description

In this lesson, students will learn about and discuss cyberbullying. Cyberbullying is the use of electronic communication to harass or target someone. Cyberbullying includes sending, posting, or sharing negative, harmful, false, or mean content about someone else.

Objective

Students will be able to:

  • Understand the impact of cyberbullying, and identify unacceptable bullying behavior
  • Identify proper actions to take if they are victims of cyberbullying or if they observe someone being cyberbullied
Description

In this lesson, students will learn to recognize online predatory behavior and strategies on how to avoid and respond to it. The Internet is a great place to socialize, but it is important to be aware of risks. Common sense and following safety guidelines can help students stay safe online.

Objective

Students will be able to:

  • Identify predatory behavior and how to respond to it online
Description

In this lesson, students will discuss and examine policies regarding privacy and security. Using best practices like setting strong passwords, reading privacy policies, and using https can help in staying safe online.

Objective

Students will be able to:

  • Use best practices in personal privacy and security, including strong passwords, using https, and reading privacy policies
Description

In this lesson, students will learn about and discuss information literacy. Information literacy is having the ability to find information, evaluate information credibility, and use information effectively.

Objective

Students will be able to:

  • Effectively search for and evaluate resources
Description

In this lesson, students will learn what copyright laws are and how to avoid copyright infringement. They will explore why copyright laws are important and how they protect the creators.

Objective

Students will be able to:

  • Explain what copyright laws are and why they are important
  • Find images they are legally allowed to use in their projects
  • Accurately attribute images they find and want to use
Description

In this lesson, students will explore and discuss the ethics and legality around hacking. A security hacker is someone who seeks to break through defenses and exploit weaknesses in a computer system or network. There are white hat hackers, who help companies find and protect exploits in their systems, and black hat hackers who hack maliciously.

Objective

Students will be able to:

  • Identify the difference between white hat hacking and black hat hacking
  • Explain career opportunities in cybersecurity
Description

Now that students have learned about digital citizenship and cyber hygiene, they will take what they have learned and create a PSA to inform members in the community about a topic!

Objective

Students will be able to:

  • Create a public service announcement for members of their community about a topic in digital citizenship or cyber hygiene
  • Use google sheets to store and analyze data, and create a data visualization.
Description

In this lesson, students complete a summative assessment of the unit’s learning objectives.

Objective

Students will be able to:

  • Prove their knowledge of digital citizenship and cyber hygiene concepts through a multiple choice quiz
Description

In this lesson, students will learn how basic encryption and decryption works. There is a need for secrecy when sending and receiving personal information. Encryption and decryption are used to protect personal information.

Objective

Students will be able to:

  • Define cryptography, cryptology, and cryptanalysis
  • Explain the need for encryption and how basic encryption and decryption works
  • Relate encryption with how it affects the CIA Triad
Description

In this lesson, students will learn the history of cryptography. Humans have always had reasons to hide information, and throughout history they have used crypto systems of varying complexity to keep information safe.

Objective

Students will be able to:

  • Explain the purpose of cryptography and how different crypto systems have been used throughout history
Description

Encryption enforces the confidentiality and integrity of a network by preventing from unauthorized parties from viewing or tampering with information.

Objective

SWBAT explain which parts of the CIA triad are strengthened by encryption.

Description

In this lesson, students will learn and practice using the Caesar Cipher. The Caesar Cipher is an encryption method that predates computers in which each letter of the message is shifted by a certain amount, called the key.

Objective

Students will be able to:

  • Encrypt and decrypt messages using the Caesar Cipher
Description

In this lesson, students will practice using brute force and letter frequency to crack the Caesar Cipher. The Caesar Cipher is an encryption method in which each letter of the message is shifted by a certain amount, called the key. Cracking the Caesar Cipher with brute force (trying every combination) is a trivial matter for modern computers.

Objective

Students will be able to:

  • Explain why the Caesar Cipher is so easy for a computer to crack
  • Use basic letter distribution analysis to decrypt a simple message
Description

In this lesson, students will learn and use the Vigenère Cipher. The Vigenère Cipher consists of several Caesar ciphers in sequence with different shift values based on a keyword, so brute force and letter frequency analysis do not work.

Objective

Students will be able to:

  • Explain how the Vigenère Cipher works and why it is not as easy to crack as the Caesar Cipher
Description

In this lesson, students will review the Caesar cipher and history of cryptography until the present day to bridge to the current topic of advanced cryptography. They will examine a high-level view of “hard” vs. “easy” problems. Symmetric vs. asymmetric encryption and public-key encryption will be emphasized.

Objective

Students will be able to:

  • Identify the problems with symmetric key encryption and why modern cryptography involves more complex mathematics

  • Explain the difference between symmetric and asymmetric encryption

Description

In this lesson, students will learn and use hashing functions. They will look at what hashing is, requirements of a good hashing algorithm, how hashing is used, what the ideal hash function does, collisions in hashing, and how hackers try to crack a hashing algorithm.

Objective

Students will be able to:

  • Identify what a hashing algorithm is and its related vocabulary, such as digest and collisions
  • Describe what makes an ideal hashing algorithm and why they are important in encryption and cybersecurity overall
  • Describe how malicious actors try to crack hashing algorithms
Description

In this lesson, students look at hash function development by delving into modulo math. Modulo math is very important in advanced cryptography since it’s a one-way function where the output hides the input very well. This makes it useful in creating hashing functions.

Objective

Students will be able to:

  • Solve simple modulo problems
  • Explain why modulo math is useful in hashing algorithms and protecting data in cybersecurity
Description

In this project, students will get to create a newscast about a cipher! This could be pre-recorded or presented live and could be a great way to vary the standard group presentation on a topic. The components of the presentation should include:

  • Introduction to newscast
  • Breaking news or lead story
  • Expert or on-scene interview (this can be part of the lead story or second story)
  • Second story
  • Commercial
  • Wrap-up of newscast
Objective

Students will be able to:

  • Create a newscast as part of a group to report out about a cipher
Description

In this lesson, students complete a summative assessment of the unit’s learning objectives.

Objective

Students will be able to:

  • Prove their knowledge of basic crytography concepts through a multiple choice quiz
Description

Now that students have learned about digital citizenship and cyber hygiene, they will take what they have learned and create a PSA to inform members in the community about a topic!

Objective

SWBAT create a public service announcement for members of their community about a topic in digital citizenship or cyber hygiene.