Outreach Information Security

This is a series of three presentations with a target audience of grades 7-10. It is probably best to do these once a week or every other week for three or six weeks rather than all at once. 

The series does not include anything about 鈥渢he Internet is a scary place.鈥  By middle school, student have already heard that.  Students who engage with this material will come away with a grounding in the basics of computer and information security, a fundamental understanding of encryption and its importance, and a recognition that not all threats are equally likely or equally severe.  They will come away with an understanding of why they must do some things and must not do others.

Prerequisite: Working familiarity with computing equipment, such as desktop computers, tablets, or smart phones. 

  • Lecture, with slides, covering the following (15 minutes)
    • Properties of a secure system (confidentiality, integrity, availability) 
    • Aims of attackers (disclosure, alteration, denial) 
    • Goals of information security (prevention, detection, response)
  • Class discussion: who are these attackers? (5 minutes +/-) 
  • Class discussion with scenarios, e.g. Alice changes the amount of a gift card. Is that disclosure, alternation, or denial?  How related to confidentiality, integrity, availability? (10 minutes)
  • Lecture about information assets (hardware, software, data) (5 minutes)
  • Class discussion: what are a middle school student鈥檚 information assets; each student to make a list (to end of period)

Students who complete this session successfully will be able to:

  • List the three properties of a secure system and briefly describe each
  • List the aims of attackers and match each one with the corresponding property of a secure system 
  • Identify some actors (attackers) who threaten computer security 
  • List the goals of information security 
  • Given a relatively simple computer system, identify the assets to be protected. 
  • Lecture, with slides, covering the following (15 minutes)
    • Why encryption is important
    • Fundamentals of encryption: the Caesar Cipher
    • A more advanced algorithm: the Vigen猫re Cipher
  • Class exercise: encrypt a secret message using the Vigen猫re cipher (10 minutes)
  • Class discussion: length of encryption keys; keys should be both long and random; same for passwords. (5 minutes)
  • Lecture: the key exchange problem and public key crypto. (15 minutes)
  • Take-home exercise: generate your own public key (5 minutes of class time, and a handout. Not graded)

Students who complete this session successfully will be able to:

  • State the purpose of encrypting data and relate that purpose to the properties of a secure system
  • With guidance, encrypt messages using a simple cipher algorithm
  • Describe the fundamental operation of public key cryptography
  • Explain the key exchange problem and tell how it is solved by public key cryptography.

Students who are particularly engaged will have generated their own public keys. 

  • Lecture, with slides, covering the following (15 minutes)
    • Information assets, states, and controls (the McCumber Model)
    • Reminder: Confidentiality, integrity, and availability
    • Reminder: your information assets (from the first session)
  • Class discussion (15 minutes)
    • What are the bad things that can happen to your information assets
    • Which of them is the worst, and what does "worst" mean, anyway?  Which is next?
    • What measures can be used to counter the worst threats.
  • In-class exercise: list the protections you should apply to your own information assets (10-15 minutes)

Students who complete this session successfully will be able to:

  • Identify threats to the assets listed in session one
  • Arrange threats in order of most likely and most severe
  • List measures that can be used to protect against threats. 

Download as a pdf


Copyright 漏 2018 by Bob Brown. Some rights reserved.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Last updated: 2018-03-29 19:27