ALEX Classroom Resource

  

Cybersecurity Lab

  Classroom Resource Information  

Title:

Cybersecurity Lab

URL:

https://www.pbs.org/wgbh/nova/labs/lab/cyber/

Content Source:

Other
PBS (pbs.org)
Type: Interactive/Game

Overview:

In the game, players work for a start-up social network company that is the target of increasingly sophisticated cyber attacks. Working alongside their friend and colleague—a brilliant, business-savvy entrepreneur—their goal is to grow their tiny company into a global empire. To do this, players must complete challenges to strengthen their cyber defenses and thwart their attackers. There are four major gameplay components: a coding challenge, a password challenge, a social engineering challenge, and a series of cyber battles.

The Lab also features stories of real-world cyber attacks, a glossary of cyber terms, short animated videos, and video quizzes. The videos explain the need for cybersecurity; privacy versus security; cryptography (cyber codes); and what exactly hackers are.

This alignment results from the ALEX Resource Development Summit.

Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 9-12
13) Compare various security measures of a computer system.

Examples: Usability, security, portability, and scalability.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • identify security measures of a computer system.
  • compare various security measures of a computer system.
Teacher Vocabulary:
Cyber security, computer systems
Knowledge:
Students know:
  • how to identify security measures of a computing system.
  • how to evaluate usability, security, portability, or scalability of the security measures of a computing system.
Skills:
Students are able to:
  • identify security measures of a computing system.
  • evaluate usability, security, portability, or scalability of the security measures of a computing system.
Understanding:
Students understand that:
  • Usability, security, portability, or scalability are important features of computer security measures.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 9-12
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • explain the tradeoffs when selecting and implementing cybersecurity recommendations.
  • describe pros and cons of two factor authentication (TFA).
  • describe the importance of password requirements.
  • describe the use of geolocation requirements.
Teacher Vocabulary:
  • cybersecurity
  • two-factor authentication (TFA)
  • geolocation
  • privacy
  • cryptography
Knowledge:
Students know:
  • how to evaluate the tradeoffs of cybersecurity recommendations.
  • how to articulate the pros and cons of TFA.
  • the importance of password requirements.
  • how to articulate the pros and cons of geolocation.
Skills:
Students are able to:
  • explain pros and cons of cybersecurity recommendations.
  • describe the use of two-factor authentication.
  • explain the importance of password requirements.
  • describe the use of geolocation.
Understanding:
Students understand that:
  • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.
Tags: coding, cyber security, cybersecurity, networking, password cracking, social engineering
License Type: Custom Permission Type
See Terms: https://aptv.pbslearningmedia.org/help/terms-of-use/#.XQLvz9NKjMI
For full descriptions of license types and a guide to usage, visit :
https://creativecommons.org/licenses
Partnered Event: ALEX Resource Development Summit
AccessibilityAudio resources: includes a transcript or subtitles
Comments

An assessment and teacher guide are provided on the webpage.

PBS LearningMedia is a free resource.  Teachers can create a free account to gain access to additional resources including videos, interactives, and instructional material.  Teachers can also assign resources through Google Classroom.

  This resource provided by:  
Author: Aimee Bates
The event this resource created for:ALEX Resource Development Summit