6.9. Cybersecurity

This lesson introduces concepts and terminology involved with computer security - how computer systems and data are kept safe. Multi-factor authentication is introduced and explained.

Professional Development

The Student Lesson: Complete the activities for Mobile CSP Unit 6: Lesson 6.9 Cybersecurity

Materials

6.9.1. Learning Activities

Estimated Length: 45 minutes

  • Hook/Motivation (5 minutes): Recall that in Unit 5, we saw that it is very difficult to guess a long complex password. Open howsecureismypassword.net in a browser. Try entering the following potential passwords and record the results. Then discuss the students’ findings as a class as well as ask: What would you do if your password is stolen? How might certain apps/websites try to prevent other people from logging into your account using your password?
    • abc123
    • ComputerScience123
    • ComputerSciencer0ck$
  • Experiences and Explorations (35 minutes):
    • Part 1: Authentication - Using Video 1 (1:59), discuss two-factor and multi-factor authentication. Describe in general how multi-factor authentication works and the types of evidence used (e.g. Something you know, something you have, something you are). Using Video 2 (2:24), further explain biometric authentication. After watching the video, take 2-3 minutes to ask students to share what types of biometric authentication they have seen in real life or in movies.
    • Part 2: Malware - Explain that although multi-factor authentication and complex passwords can be used to try to prevent unauthorized account access, another computer security issue to be aware of is malware. Using Video 3 (2:26) discuss malware and the steps you can take to prevent malware and computer viruses.
    • Part 3: Unauthorized Access - Using Video 4 (2:31), discuss how phishing, keylogging, and rogue access points can be used to gain unauthorized access to an individual’s personal information. Explain the importance of firewalls
    • Activity: Select one or more of the following activities for students complete after watching and discussing the videos. Students should document their findings in their portfolio reflection before the end of class.
      1. Can you spot when you’re being phished? Do the Phishing Quiz working in pairs or POGIL groups: https://phishingquiz.withgoogle.com. See how many you get right.
      2. In pairs or POGIL groups, investigate this map http://cybermap.kaspersky.com/ (click on a country and more details or statistics) and http://securelist.com/statistics/  which shows the current week’s infections and attacks. What are the top 3 attacked countries? What country has the highest rate of infections? What is the top infection (virus) currently?
      3. Investigate a famous or recent malware, hacking, or security breach incident. Write down who, what, when, where, how, and the consequences of the incident.
  • (Optional) Activity (30 minutes): Divide students into groups of 2-4. First, they should discuss and write down their responses to the questions designated before the video. Then, show the video. After watching the PBS video, they should discuss and write down their responses to the questions designated after the video. Facilitate groups sharing their answers to both sets of questions.
  • Rethink, Reflect and/or Revise (5 minutes): In the time that remains, have students complete the self-check questions and their portfolio reflections.

AP Classroom

The College Board's AP Classroom provides a question bank and Topic Questions. You may create a formative assessment quiz in AP Classroom, assign the quiz (a set of questions), and then review the results in class to identify and address any student misunderstandings.The following are suggested topic questions that you could assign once students have completed this lesson.

Suggested Topic Questions:

  • Topic 5.6 Safe Computing

Assessment Opportunities and Solutions

Solutions:

Assessment Opportunities

Differentiation: More Practice

Background Knowledge: More on Programming and Abstraction

6.9.2. Professional Development Reflection

You have attempted of activities on this page