CYBER-ARCADE · Quad-copter style 7.1 x 7.1 inches Weight is 2.2 ounces Flight time – 7 minutes...
Transcript of CYBER-ARCADE · Quad-copter style 7.1 x 7.1 inches Weight is 2.2 ounces Flight time – 7 minutes...
CYBER-ARCADEAn Innovative Approach To Teaching Cybersecurity
Dr. Pauline Mosley, Full Professor of IT, Pace UniversityDr. Li-Chiou Chen, Chair of IT, Pace University
Copyright © 2017 Pace University. All rights reserved.No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, includingphotocopying, record, or any information storage and retrieval system, without permission in writing from Dr. Mosley and Dr. Chen.To seek permission contact [email protected].
2
AGENDA
• What is Cyber-Arcade?
• Workshop Design & Logistics
• Cyber-Arcade
• Cybersecurity Pedagogical Models
• Preliminary Results
3
CYBER-ARCADE CONCEPT MAPPING
How Do You Teach Cybersecurity To 75 High School Students In 2 Hours?
• Cybersecurity FundamentalsCyber Jeopardy
• System Architecture Raspberry Pi
Cipher Wheels
• Privacy, Cybersecurity Laws and EthicsDrones
• Security Policies and ProceduresPasswords
Encryption & Decryption
4
WORKSHOP DESIGN
Cyber-Jeopardy
Raspberry Pi
Cipher WheelsDrones
Passwords
5 Stations5 Station Masters1 Laptop per Station2 Teams per Station1 Time Keeper10 Students per Team15 minutes per Station5 minutes to change Stations
5
WORKSHOP LOGISTICS
• Chairs placed 10 in a row – aisle – 10 in a row• Each row represents a Team• Cyber-Books Distributed to all high school students• Cyber-Arcade Orientation• Explanation of the Station Masters and Timekeeper• Live Scoreboard
6
TIME SCHEDULINGTime Schedule of Stations9:50 – 10:00 Orientation – Main Seating10:00 – 10:15 Station #110:15 – 10:20 Station Change10:20 – 10:35 Station #210:35 – 10:50 Station Change10:50 – 10:55 Station #310:55 – 11:10 Station Change11:10 – 11:15 Station #411:15 – 11:20 Station Change11:20 – 11:35 Station #511:35 – 11:40 Return to Main Seating11:40 – 11:50 Wrap Up and Summary
Prizes Awarded
TEAM SCORING SHEET
Station Name Spokesperson Points Penalties
1Cyber
Jeopardy
2Raspberry
Pi
3Cipher Wheels
4 Drones
5 Passwords
TOTAL
TEAM NUMBER: ___________TEAM NAME: ______________
STATION #1: CYBER-JEOPARDY Instructions: An interactive game of jeopardy which has 6 categories on the board
ranging from 100-500 point values. Select a category and answer the question.Each team selects a spokesperson that will answer for team. The spokesperson willhave 10 seconds to answer the question. The question is discarded whether theyanswer it correctly or not.
Rules and Penalties:Any team member that calls out the answer and it is not their turn will lose their turn.
Any team member other than the one who has been selected to represent the team whispers or coaches the team representative for the team will not be awarded any points whether the answer is right or wrong.
100 100 100 100 100
200 200 200 200 200
300 300 300 300 300
400 400 400 400 400
500 500 500 500 500
Privacy Cyber Security
FirstPrinciples
IPAddressing
Encryption WorldWide Web
100
200
300
400
500
►►► F i n a l J e o p a r d y ◄◄◄
STATION #2: RASPBERRY PIInstructions: The Station Master willshow you how a Raspberry Pi works atthis station. Each team should obtain aRaspberry Pi from the Station Master asa reference for the picture. Please circlethe different components on the pictureof the Raspberry Pi in the next page andconnect them with the names (1-8).
Rules and Penalties: The team will need to correctly identify the Raspberry Pi components in 10 minutes.
The team that identifies the most components receives 500 points; the second place team receives 200 points.
1. CPU (central computing unit, the “brain” of the computer)2. MicroSD Card slot (for storing data used for computing)3. USB ports (for connecting USB peripherals)4. Ethernet port (for local area network connection)5. Audio output (for connecting speaker)6. HMDI video output (for connecting HDMI screen)7. GPIO (General Purpose Input-Output for connecting sensors, displays, or LEDs)8. On-board Bluetooth/WiFi (for wireless connection)
ANSWER
STATION #3: DRONES Instructions: Fly a mini-drone from
point A to point B successfully. Teamrepresentatives will have 3 minutes tolearn how to operate and maneuver thedrone. They will have to transport amessage from airport A to airport B.The first drone to complete the missionwins the challenge.
Rules and Penalties:The drone must take-off and land on the landing mats.
If the drone should hit any object during its flight – that team will be eliminatedfrom the competition. Each team will have only 1 chance to complete thechallenge. Coaching and cheering of team members is allowed.
PARROT MAMBO Quad-copter style 7.1 x 7.1 inches Weight is 2.2 ounces Flight time – 7 minutes Top speed – 30 km/h Bluetooth 4.0 Range with flypad is 200 feet OS – Apple iOS7 or Android 4.3
Parrot SA is a French wireless products manufacturer company based in Paris, France. It was founded in 1994 by Christine/M De Tourvel.
TAKING A PICTURE
PRESS R1 TO TAKE A PHOTO
VIEWING THE PHOTO
1. Connect the USB cable from Drone to Laptop.2. Click on Parrot Mini Drone.3. Click on Media folder to view images.
PRELIMINARY RESULTS Student Feedback
Students expressed they liked moving from station to station because it was not boring.
Students loved working with the drones and simulating cybersecurity problems and issues.
Overall positive experience working in groups and with hands-on activities at every station.
Recommendations Open space with high ceilings critical for executing drone labs. Better approach for notifying all Station Masters that their time has
ended. Have a Recorder at each station to record points onto the live score
board and ring the bell for Station Changes.
18
CYBERSECURITY PEDAGOGICAL MODELS
19
Problem-Based Learning (PBL) Students confront a problem before they receive all of the relevantinformation necessary to solve it. Students work in teams to define thenature of the problem, to identify what additional resources they need, andto find viable solutions to the problem at hand. Students must generallyapply the knowledge they have gained through their research, not only tosolve the problem, but also to communicate the results of their findings.
Cooperative Robotic Learning (CRL)Students working together in a group small enough that everyone canparticipate on a collective task that has been clearly assigned. Moreover,students are expected to carry out their task without direct and immediatesupervision of the teacher. Students help each other learn how best to utilizerobotic technologies to complete tasks, share their idea generations,resources, and plan cooperatively before working together on hands-onconstruction.
CYBERSECURITY PEDAGOGICAL MODELS
20
Active Learning Classroom (ALC)Students engage with materials, participate in the class and collaboratetogether to analyze an argument or discuss how best to apply concepts toreal-world situations. Students explore and question how and what they arelearning, thereby they begin to define their personal expertise, interests anidentity as a learner. These avenues of exploration overlap and merge inorganic ways within each student’s unique learning experience.
Learner-Center Classroom (LCC)Students work individually on assignments and cooperation isdiscouraged. However, each student’s needs will be addressed distinctlybecause pedagogical methodologies can be tailored for various studentlearning patterns, and multiple strategies can be implemented to engage allstudents, regardless of gender or race.
Cybersecurity Teaching Variations
Year Participants Sessions Model Technology Tool2015 SWAG
30 high school girls8 Saturdays from 9-3Sept. – Dec.
CRL Arduino, SeaPerch
2016 Camp CyberBot15 high school girls15 high school boys
July 24-29 from 9-3summer camp
PBL SeaPerch
2017 CIS 102Q30 elementary girls20 elementary boys
4 Wednesday from 1-3May 3 - 16
ALC Drones
2017 WiCys75 high school boysand girls
March 309:50 – 11:50
CRLPBL
Drones
2017 Pace – TODAS30 children
1 hour LCCCRL
SeaPerch, Drones
2018 WP 21st Grant250 children
12 weeksafterschool program
PBLCRLLCC
EV3, Drones, WeDo
21
GE Grant$25,000
8 Saturdays
Curriculum• Sea Perch• Arduino
Industry Partner• US Navy
CAMP CYBERBOT 2016Dr. Pauline Mosley, PI
Gencyber NSF Grant$61,000
1 week summer camp
Curriculum• Sea Perch• Cybersecurity• Underwater
cameras
Industry PartnerUS Navy
LOST TOP SECRET CODESScenario:The United States Navy has lostone of its Remotely OperatedVehicles (ROV) in Choate Pond.This vehicle is marked with TopSecret Codes to communicatebetween Navy submarines. Dueto security reasons and highlyclassified information, they mustbe located immediately.
TEAMS
THE CYBER CHALLENGE
Lo Hud News
Pace TODAS
Group A – ages 9-14Group B – ages 6-8
A total of 30 children attended TODAS – the most ever!!
Pace + Community = Service-Learning
Student Grade N=42Third 11Fourth 11Fifth 12Sixth 8
Gender N=42
Female 20
Male 22
AcknowledegmentsAcknowledgement We would like to acknowledge the support from the
GenCyber program (https://www.gen-cyber.com/) of the National Security Agency. In addition, we would like to thank our amazing Pace University Seidenberg Team who assisted with preparing and running these activities.
31
Thank youPauline Mosley, DPS Andreea Cotoranu, MSFull Professor Assistant Dean of Academic InnovationInformation Technology Seidenberg SchoolSeidenberg School Pace University, Pleasantville NYPace University, Pleasantville NY [email protected]@pace.edu(914) 773-3986
Li-Chiou Chen, Ph.D. Dawn TuckerFull Professor & Chair of SeaPerch InstructorInformation Technology STEM Education Seidenberg School [email protected] University, Pleasantville NY [email protected](914) 773-3907