Who Are Your Friends: A Cybersecurity Mystery is an activity developed by Northrop Grumman and Learning Undefeated to help students understand safe internet use through the lens of cybersecurity.
In this activity, students will act as members of the school’s cyber-defense team to help a student clear his name of accusations and walk the stage at graduation. Students will investigate the victim’s social media account and email for clues. Then provided objects found in the victim’s locker, students will break codes to determine who broke into the victim’s social account.
Students will be able to
- Analyze social media and email usage for suspicious content.
- Use inferences to solve ciphers, including a Caesar shift cipher.
- Identify social engineering techniques and phishing attacks.
Computer Science Teachers Association Standards Connections
1B-NI-05. Discuss real-world cybersecurity problems and how personal information can be protected.
2-NI-05. Explain how physical and digital security measures protect electronic information.
2-NI-06. Apply multiple methods of encryption to model the secure transmission of information.
2-IC-23. Describe tradeoffs between allowing information to be public and keeping information private and secure.
Maryland Computer Science Standards Connections
5.NI.C.01. Define personal identifiable information (e.g., digital footprint) and why it should be protected as related to real-world cybersecurity problems.
5.NI.C.02. Discuss real-world cybersecurity problems and explain how personal information can be protected (e.g., antivirus software, backing up data, strong passwords).
7.NI.C.01. Explain how to protect electronic information using both physical (hard drive) and digital measures; explain existing cybersecurity concerns with the internet and the systems it uses.
7.IC.SLE.01. Explain the connection between the longevity of data on the internet, personal online identity, and personal privacy.
8.NI.C.01. Evaluate physical and digital security measures that have been developed and implemented to protect electronic information; discuss the impacts of hacking, ransomware, scams, fake scams, and ethical/legal concerns.
12.NI.C.01. Compare and refine ways software developers protect devices and information from unauthorized access including complex encryption algorithms such as public key encryption.
10.NI.C.05. Recognize and prevent social engineering attacks. Differentiate between legitimate and fraudulent information.
Virginia Computer Science Standards of Learning Connections
5.9. The student will evaluate and solve problems that relate to inappropriate use of computing devices and networks.
5.10. The student will determine whether passwords are strong, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.
6.6. The student will identify physical and digital security measures used to protect electronic information.
7.6. The student will describe how physical and digital security measures protect electronic information.
7.7. The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues.
8.6. The student will evaluate physical and digital security measures used to protect electronic information.
8.7. The student will identify impacts of hacking, ransomware, scams, fake vulnerability scans, and the ethical and legal concerns involved. Exclusion: Students do not need to implement solutions.
8.9. The student will describe tradeoffs between allowing information to be public and keeping information private
8.13. The student will identify existing cybersecurity concerns associated with Internet use and Internet-based systems and potential options to address these issues.
CSF.7. The student will explain typical tradeoffs between usability and security and recommend security measures in a given scenario based on these (or other) tradeoffs.
Activities to Gather Evidence
US Cyber Challenge: Cyber Quests
Cyber Quests are a series of fun but challenging on-line competitions allowing participants to demonstrate their knowledge in a variety of information security realms. Each quest features an artifact for analysis, along with a series of quiz questions. The quests have varying levels of difficulty and complexity.
Teacher-led activities using animated videos to introduce primary school students to key online safety issues including cyberbullying, protecting personal information and sharing images.