Skip Navigation

Contextual Learning Portal

Cybersecurity- Assessing the Vulnerability

Basics

  • Project TitleCybersecurity- Assessing the Vulnerability
  • Employer SiteOCD Tech
    25 Braintree Hill Office Park, Suite 102,
    Braintree MA, 02184
  • Submitted By (Teacher Name)Katie Cunningham
  • SchoolBlackstone Valley Regional Vocational Technical High School
  • Brief Description and RationaleAs a technology professional, you should have the background knowledge and understanding of threat factors and security measures in order to protect yourself and others. This unit will cover the Identification of common threats, personal protection measures, and password vulnerability and cracking.
  • Grade Level9-12
  • Materials / Resourceshttps://www.pbs.org/wgbh/nova/labs/lab/cyber/
    (Video) https://www.pbs.org/wgbh/nova/labs/video_popup/5/31/

    Windows 10 computer with network access
  • Duration of lessonDigital Footprint- 1 Class Period
    Personal Protection Measures - Class Period
    Protecting Oneself and Others- 1 Class Period
    Three 45 Minute Class Periods
  • Key Vocabulary / Word WallCybersecurity
    Dictionary Attack
    Social Engineering
    Malware
    Exploit
    Phishing
    Worm
    Spam


  • Pre-Requisite KnowledgeBasic Computer Knowledge

  • Strategies to promote equityIEP/504 plans - Extended time, use of a computer/ tablet, digital copies of notes

    SEI (Sheltered English Inclusion) modifications - use of translation apps or websites.
  • Instructional ObjectivesSWBAT:
    Describe common prevention methods, security threats and password security methods by the end of this unit.

Lesson #1 | Personal Security- Digital Footprint

  • Lesson Plan 1 TopicPersonal Security- Digital Footprint
  • Lesson plan 1 objectives1. Describe a digital footprint
    2. Identify Factors that contribute to your digital footprint
  • Anticipatory set or lesson opening (to activate students` prior learning or draw student interest or involvement)Start with a slido word cloud presenting the question " What is a digital footprint?"
    This will engage the students in thinking about the term, if they have prior knowledge on it and exploring what they already know.
    https://www.sli.do/
  • Direct Instruction1. Discussion on slido question "What is a digital footprint"
    2. Presentation on Digital Footprint (powerpoint attached)

  •  

    View/Download File: Digital Footprint Presentation

  • Guided PracticeDuring Presentation the Instructor will:
    1. Have students google self- discussion
    2. Measure Footprint Activity- Discussion (link in ppt)
    3. Assess Yourself Activity- Discussion (link in ppt)
  • Independent Practice/Differentiated ActivitiesStudents will:
    1.Digital Footprint Game (link in ppt)
    2. My Digital Footprint Activity (word doc attached)
  •  

    View/Download File: My Digital Footprint Activity

  • Reflection on Employability SkillsStudents will demonstrate digital professionalism throughout these activities.
  • Lesson ClosureThe lesson with wrap up with completing Activity 1 and submitting it to canvas.
  • Summative/end of lesson assessmentThe summative assessment for this lesson will be completion of the artifact showing understanding of outlining a personal digital footprint.
  • References / Resources / Teacher Preparationhttps://www.sli.do/
    https://www.lucidchart.com/pages/
    https://www.canva.com/
    http://digitalfootprintimu.weebly.com/measure-your-footprint.html
    http://digitalfootprintimu.weebly.com/assess-yourself.html
    http://digitalfootprintimu.weebly.com/game.html

Lesson #2 | Personal Security- Threat Assessment

  • Lesson Plan 2 TopicPersonal Security- Threat Assessment
  • Lesson Plan 2 Objectives1. Describe attacks on personal security
    2. Identify different types of attacks
    3. List the defenses against personal security attacks
  • Anticipatory set or lesson opening (to activate students` prior learning or draw student interest or involvement)Start with a slido word cloud presenting the question " What is social engineering?" This will engage the students in thinking about the term, if they have prior knowledge on it and exploring what they already know.
    https://www.sli.do/
  • Direct InstructionThe instructor will:
    1. Review the following presentation with students. Discussions of material will occur ( noted in ppt) throughout.
    2. Presentation on Personal Security (powerpoint attached)
    3. Defcon Social Engineering Attack Video ( in ppt)
  •  

    View/Download File: Personal Security Presentation

  • Guided Practice1.Nova Security labs- walk through setup with students
    2. How secure is my password activity and discussion
    3. Have I been Pwned Activity and discussion
  • Independent Practice/Differentiated Activities1.Informational videos (cyber 101, hacking and privacy, and cyber codes)
    2. All videos include a quiz during, students will complete quiz as formative assessment. They will then print out the lab report page showing their results.(https://www.pbs.org/wgbh/nova/labs/lab/cyber/1/1/)
    3. Nova security labs- complete all levels
  • Reflection on Employability SkillsStudents will reflect on industry tools used in protecting and assessing potential threats. Students` employability skills will include technology access and integration, computer ethics, critical thinking, and problem-solving.
  • Lesson ClosureThe lesson with wrap up with completing the Nova Security Challenges and submitting a screenshot of the successful completion page.
  •  /project745_465/Finisher_Screen.PNG
  • Summative/end of lesson assessmentSuccessful completion of this lesson will be measured by completing the Nova Security Challenges and submitting a screenshot of the successful completion page. This lesson will also include a quiz that assess retention of material from the videos watched during the independent practice. Students will complete 3 quizzes and print out or upload the Cyber Security Lab Report with their results. Answer Key Attached.

  •  

    View/Download File: Quiz Answer Key

  • References / Resources / Teacher Preparationhttps://www.sli.do/
    https://www.youtube.com/watch?v=bjYhmX_OUQQ&t=90s
    https://www.pbs.org/wgbh/nova/labs//lab/cyber/

Lesson #3 | Personal Security- Hacking the Hacker

  • Lesson Plan 3 TopicPersonal Security- Hacking the Hacker
  • Lesson Plan 3 Objectives1. Identify and implement measures to protect yourself and others from security threats.
  • Anticipatory set or lesson opening (to activate students` prior learning or draw student interest or involvement)The instructor will have a cyber threat map running when the students walk into the class (or join on zoom) you can choose from any of the following real-time threat maps. Start the discussion of what it is, potential threats, and what is happening every second of every day around the world.

    https://threatmap.checkpoint.com/
    https://www.fireeye.com/cyber-map/threat-map.html
    https://cybermap.kaspersky.com/
    https://threatmap.fortiguard.com/
  • Direct InstructionInstructor lead presentation on "hacking the hacker" attached. During the presentation, additional activities will be presented throughout for active student engagement.
  • Guided PracticeInstructor will walk around and facilitate questions.
  • Independent Practice/Differentiated Activities1. "Have I been compromised" activity in the presentation
    2. Password strength activity in the presentation
    3. Student Exercises at end of the presentation (additional files attached)
  •  

    View/Download File: Teach the Teacher Project

    View/Download File: Presentation

    View/Download File: Exercise Resources

  • Reflection on Employability SkillsStudents` employability skills will include technology access and integration, computer ethics, critical thinking, and problem-solving.
  • Lesson ClosureThe lesson will close with students submitting completed activities to canvas. You can also discuss the initial activator and see if now that they have knowledge of the topics if it changes their outlook on the situation.
  • Summative/end of lesson assessmentSubmit activity files to canvas for review.
  • References / Resources / Teacher Preparationhttps://haveibeenpwned.com/
    https://howsecureismypassword.net/
    https://www.sli.do/

Lesson #4 | Personal Security- Passwords

  • Lesson Plan 4 TopicPersonal Security- Passwords
  • Lesson Plan 4 ObjectivesDetermine different methods used to crack passwords.
    Test different penetration testing methods
  • Anticipatory set or lesson opening (to activate students` prior learning or draw student interest or involvement)Open up with Breach alarm video talking about passwords. Have students test email to see if it has been breached.
    https://breachalarm.com/

    Look into the live cyber-attack workshops prior to the lesson. This is a great tool to use mid-lesson or as an activator.
    (https://www.varonis.com/cyber-workshop/)
  • Direct InstructionInstructor will:
    1. Watch the presentation video attached to the class.
    2. Stop and discuss as needed. This goes through the different types of password attacks.
    https://youtu.be/bedozUALP1w
  • Guided Practice1. Have students navigate to virtualbox website and download/ setup Virtualbox on their system. (https://www.virtualbox.org/)
    2. Walk through with students installing Kali Linux as a virtual machine (https://www.kali.org/downloads/)
    3. Once installed have students navigate to "John the Ripper"
  • Independent Practice/Differentiated Activities1. Google search "kali John the Ripper" give them 5-10 minutes to do this and see what they find.
    2. Have an open discussion on findings----what kind of tool is this? When would it be used?----What are ethical considerations behind using this tool? (can also be put in discussion board as summative assessment)
  • Reflection on Employability SkillsStudents will reflect on technology use in relation to ethics. This unit focuses on students holding a high ethical standard while using the provided tools.
  • Lesson ClosureYou will close out the lesson by navigating to the site attached. Have students work with a partner in navigating through the john the ripper software, commands, and wordlist.
    https://www.varonis.com/blog/john-the-ripper/
  • Summative/end of lesson assessmentStudents will be considered "complete" once they successfully install and boot to kali Linux, have a created word list to pull passwords from on their virtual machine and provide feedback to what the "john the ripper" tool is in the canvas forum.
  • References / Resources / Teacher Preparationhttps://www.youtube.com/watch?time_continue=42&v=fNw8KeHAo9s&feature=emb_logo
    Messer Studios: Password Attacks - CompTIA Security+ SY0-401: 3.2


Lesson #5 | Personal Security- Protecting Oneself and Others

  • Lesson Plan 5 TopicPersonal Security- Protecting Oneself and Others
  • Lesson Plan 5 ObjectivesIdentify security threats
    Outline methods to educate others on security
  • Anticipatory set or lesson opening (to activate students` prior learning or draw student interest or involvement)Start with a slido with a poll of " what are some threats we are aware of (as IT Professionals) but others may not be??" This should activate prior learning of the unit.
  • Direct InstructionInstructor will:
    Lead discussion on different breaches students have seen with friends and family.----Lead into project discussion.
  • Guided PracticeInstructor will walk around and facilitate questions.
  • Independent Practice/Differentiated ActivitiesTeach the Teacher Project
  •  

    View/Download File: Teach the Teacher Project

    View/Download File: Teach the Teacher Rubric and Feedback

  • Reflection on Employability SkillsDemonstrating techniques in breaking down material in educating others.
  • Lesson ClosureThe lesson will close with sharing collaboration tools with students.
  • Summative/end of lesson assessmentStudents will present security artifact to staff, or other class to demonstrate understanding of the material.
  • References / Resources / Teacher PreparationCollaboration Tools:
    https://trello.com/en-US
    https://slack.com/
    https://www.canva.com/

Recommended Strategies / Instructional Techniques

  • Reading StrategiesOnline curriculum based on canvas. Students have access to transcript of video files as well as recorded zoom sessions.
  • Multimedia/Visual Strategy (f.e. slides)Powerpoint Presentation of slides. Video references for review of the material.
  • Graphic organizers or handoutsSupported content posted to Canvas course for online/ digital access.
  • Writing StrategiesN/A
  • Speaking and Listening StrategiesTeacher lecture, student discussion boards.
  • Family: Any opportunities to involve parent/guardians and other family members in this project?Students can use information learned to educate family members on the importance of personal security.
  • Virtual/Remote Teaching StrategyContent all accessible on canvas course. Discussion posts, Slido polls, and zoom screencast sessions demonstrating application.

Subject = Technology, CVTE | Grade Level = HS | Time Period = School Year | Program/Funding = | Externships-2020 |
Direct website link to this project: http://ContextualLearningPortal.org/contextual.asp?projectnumber=745.465