Content: You will learn best practices for staying safe online and be introduced to computer science principles and the architecture of online networks. This through a fun and engaging Cybersecurity Lab from NOVA Labs.
Language: You will synthesize your learning by successfully navigating through the NOVA Labs Cybersecurity Game.
Social: You will engage in collaborative online activities and face-to-face interactive experiences.
Lesson 1: Cybersecurity 101: Video, Quiz and NOVA Cybersecurity Lab Game Level 1.
Lesson 2: Cybersecurity Lab Vocabulary Quizlet Study Sets
Lesson 3: Hacking and Privacy Videos and Quiz
Lesson 4: Cyber Codes Video and Quiz
Lesson 5: Password vs. Passphrase
Lesson 6: NOVA Cybersecurity Lab Game
Lesson 7: (Optional) Reflection: Create an Infographic
"I can explain computer science terminology related to coding, password protection, social engineering, and network security."
"I can describe how encryption works to protect privacy."
"I can describe recent network security breaches and how companies defend against them."
"I can explain why the term “hacker” is extremely flexible and describe the variety of roles that hackers play."
"I can navigate a robot through a maze using Blockly code."
"I can distinguish between phishing attempts, fraudulent websites, and phone scammers."
"I can create strong passwords."
"I can analyze reports of unfolding security breaches and apply my understanding of security networks to them."
Whenever we go online—to shop, chat with our friends, or do anything else—we put ourselves at risk of cybercrime. Computer viruses can corrupt our files, hackers can steal our data, and criminals can trick us into revealing sensitive information. But luckily there are simple steps we can take to protect our digital lives.
NOVA has teamed up with cybersecurity experts to create the Cybersecurity Lab, a game in which players will discover how they can keep their digital lives safe and develop an understanding of cyber threats and defenses. Players will advance by using computer coding, logical reasoning, critical thinking, and vulnerability detection to solve various problems. These are the same skills employed regularly by cybersecurity professionals. However, players won’t need any prior cybersecurity or coding expertise to succeed.
There are four major gameplay components of the Lab:
You will need to take notes during each of the videos, during your challenges in the NOVA Lab Game and other resources provided in this experience. Here are your options:
Learn why protecting your information online is crucial with this video from the NOVA Cybersecurity Lab. The Internet was originally designed to connect large computers at universities, businesses, and governments. It grew exponentially once personal computers became common in the 1980s. Connecting to the Internet leaves computers vulnerable. People can use computers to delete data, spread viruses, or even steal someone’s identity. The good news is that there are several ways to stay safe online. You can learn about protecting information by trying coding, password cracking, and spotting email scams in NOVA’s Cybersecurity Lab.
Cyber 101 | NOVA Labs | PBS." http://www.pbs.org/wgbh/nova/labs/lab/cyber/1/1/. Accessed 9 Jan. 2018.
The Internet is fundamentally insecure. However, there are simple things you can do to protect yourself and your information. Learn what they are in NOVA’s Cybersecurity Lab.
After watching the video to the left:
After viewing the video above, try to answer the quiz questions to test your knowledge
What is a network in this video?
▢ Interconnected computers or devices
▢ A super computer
▢ A computer vulnerability
▢ An Internet service provider
▢ All of the above
Why are cyber vulnerabilities unlikely to ever go away?
▢ The government won’t allow people to fix them.
▢ Criminals need them to steal identities.
▢ They are side effects of the freedom and ease of communicating online.
▢ They’re protected in a secret base on the moon.
Which of these groups exploits cyber vulnerabilities?
▢ Criminals
▢ Governments
▢ Hacktivists
▢ All of the above
Below are links to the Cybersecurity Lab Glossary and Quizlet Study Sets. As shown in the image to the right you have five different Study Modes to learn, practice and assess your knowledge of the vocabulary you need to understand Cybersecurity including: Match, Learn, Test, Flashcards and Spell. You can change your study mode using the dropdown arrows found at the bottom right corner of the Quizlet box. Try them all!
Learn what can happen when you post information online with this video from the NOVA Cybersecurity Lab. When you upload something to a social media site, that information is stored on the website’s server. People can access your information from a website’s server, including governments, advertisers, and identity thieves. You could unintentionally reveal personal information, including your full name, address, and phone number through an innocent post. Identity thieves can use this information to access your bank account and the accounts of your friends, jeopardizing their personal information, too. In fact, over 10 million Americans have their identities stolen every year.
Learn about different types of hackers with this video from the NOVA Cybersecurity Lab. Hacking is solving problems in creative or unexpected ways. Hacks have been used for everything from Galileo’s telescope to Apollo 13. Similarly, there are many reasons that people hack computers. Some are just curious about how systems work, others hack to find and fix security flaws before they are exploited by criminals. Some hackers have bad intentions fueled by greed, attention, or rebellion. There are some hackers who have good intentions, but use questionable methods of getting information. “Hacking” isn’t good or bad – it depends on how and why people hack.
Follow the trials and tribulations of Tim as a seemingly innocent piece of digital information threatens to ruin his life when it falls into the wrong hands.
"A Cyber Privacy Parable - YouTube." 15 Sep. 2014, http://www.pbs.org/wgbh/nova/labs/lab/cyber/2/1/. Accessed 10 Jan. 2018.
This video can also be accessed at: http://www.pbs.org/wgbh/nova/labs/lab/cyber/2/1/
Hackers may not be who we think they are. In fact, you might be a hacker and not even know it. Learn the true meaning of hacking and some of the many reasons hackers hack.
"The Secret Lives of Hackers - YouTube." 15 Sep. 2014, https://www.youtube.com/watch?v=DKzi5CYNFAg. Accessed 10 Jan. 2018.
This video can also be accessed at:
After viewing the videos above, try to answer the quiz questions to test your knowledge
What did the identity-theft crime ring use Tim’s photo for?
▢ To create a Tim-like disguise
▢ To make a counterfeit passport
▢ They sent it in spam emails to Tim’s friends
▢ To figure out Tim’s address
Why do hackers hack?
▢ To make discoveries
▢ To protect information
▢ To steal information and money
▢ To expose corruption
▢ All of the above
Which of these is not a hack?
▢ Using a bicycle to power a computer
▢ Stealing an unlocked bicycle
▢ Building a working bicycle out of discarded umbrellas
▢ Creating a kinetic bicycle sculpture
Learn how encryption keeps online information private in this video from the NOVA Cybersecurity Lab. Your messages are coded by email programs and websites to prevent others from reading them. Codes have been used in messages for centuries. Caesar sent coded messages to his military in ancient Rome. In the 1940s, the Allied forces cracked the German Enigma Code, saving lives during World War II. Today, emails are protected through public-key cryptography, which uses numbers from both the sending and receiving email servers to create a key. However, not all online activity is encrypted and in some cases your browsing history, text messages, and data from apps can be intercepted.
"Cyber Codes - YouTube." 15 Sep. 2014, https://www.youtube.com/watch?v=q6FanLhvsEs. Accessed 16 Jan. 2018.
Do you trust the security of your email, text messages, and browser history? Learn how trustworthy online communication actually is and how encryption can protect your privacy. Sometimes.
After viewing the video above, try to answer the quiz questions to test your knowledge
Which of these is regularly used for secure online communication?
▢ Caesar cipher
▢ Public-key cryptography
▢ Morse code
▢ Enigma code
How can you tell if a website encrypts its traffic?
▢ Google it.
▢ Look for the lock symbol in a URL.
▢ All websites encrypt their traffic.
▢ Encrypted sites take longer to load.
What can you trust to be secure 100 percent of the time?
▢ Text messages
▢ Emails
▢ Browser history
▢ Apps
▢ None of these
Passwords can be thought of as a needle in a haystack. Your password is the needle. Every possible combination your password could be is the haystack.
Identify what's wrong with these snapshots taken from a Password Generator. Discuss with a partner why the password generated on the left is not considered as secure as the password generated on the right.
From: @AaronToponce. https://twitter.com/AaronToponce/status/988761412464857088
Click on the image to the left or on the title above to go to Aaron Toponce's resources to learn about passphrase vs. password entropy.
Complete the remaining challenges in the Cybersecurity Lab Game by clicking on the NOVA Labs image to the right. Good Luck!
Click on the image above to take you to the Nova Labs Cybersecurity Lab Game website. This is where you can access all the interactive resources for this week and keep your own "Lab Report." Your teacher will decide how many of the gameplay components you will complete.
"Piktochart Tutorial: A Simple Guide to Piktochart for ... - YouTube." 28 Jan. 2017, https://www.youtube.com/watch?v=Eq-85gzw3GI. Accessed 16 Jan. 2018.
Teachers: Why not print and post these in the classroom as a reminder of how to stay safe online?
Content on this page comes from: NOVA Labs a free digital platform that engages teens and lifelong learners in games and interactives that foster authentic scientific exploration.
Permission requested for use of Logo and images from the Nova Labs website.
"Do You Know" Image courtesy of Stuart Miles at FreeDigitalPhotos.net
Quizlet created by Mary Kraus and with open access.
Screenshots of @AaronToponce Twitter post and online resources used with permission from Aaron Toponce, May 3, 2018.