Unplugged cybersecurity: An approach for bringing computer science into the classroom
The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to be used with K-12 educators at professional development workshops and with students through camps, festivals and fairs, and STEM days.
According to recent data, math and computer science (CS) are the fastest growing fields among STEM careers (US Bureau of Labor Statistics, 2016). The Computer Science for All initiative (2016) urges communities to bring more computer science education into the classroom to meet the rapidly rising need for more CS graduates. As a result, the USNA STEM Center has developed a number of unplugged (without a computer) cybersecurity modules to promote engagement and increase awareness. Topic areas include encryption, networking and social media, viruses and malware, programming, hardware components, authentication and authorization, and hacking.
This article describes the methodology for developing unplugged computer science activities and adapting computer science undergraduate curriculum for K-12 educators and students as an introduction to complex computer science topics.
Bell, T., Alexander, J., Freeman, I. & Grimley, M. (2009). Computer science unplugged: School students doing real computing without computers. New Zealand Journal of Applied Computing and Information Technology, 13(1), 20-29.
Diffie, W., & Hellman, M. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22(6), 644-654.
Diffie, B. W., Hellman, M. E., & Merkle, R. C. (1980). U.S. Patent No. US 4200770 A. Washington, DC: U.S. Patent and Trademark Office.
MESA USA. (n.d.). Retrieved January 06, 2017, from http://www.mesausa.org/
Mudrinich, E. (2012). Cyber 3.0: The Department of Defense strategy for operating in cyberspace and the attribution problem. Air Force Law Review 68, 167-206.
National Science Foundation (2014). NCES Degrees Awarded by Degree Level and Field. [Data]. Retrieved from https://ncsesdata.nsf.gov/webcaspar/index.jsp?subHeader=WebCASPARHome
Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2), 120-126.
Schneier, B. (1996). Applied cryptography: Protocols, algorithms, and source code in C. New York: Wiley.
U.S. Bureau of Labor Statistics (2016, April 8). Employment projections: Employment by major occupational group. [Data]. Retrieved from https://www.bls.gov/emp/ep_table_101.htm
USNA STEM Center (2016a). Engineering design challenge: Logic gates [Activity handout created by the United States Naval Academy STEM Center for Education and Outreach]. Annapolis, MD. Copy in possession of the USNA STEM Center.
USNA STEM Center (2016b). Flip floppinâ€™ binary counter [Activity handout created by the United States Naval Academy STEM Center for Education and Outreach]. Annapolis, MD. Copy in possession of the USNA STEM Center.
USNA STEM Center (2016c). True colors solution [Activity handout created by the United States Naval Academy STEM Center for Education and Outreach]. Annapolis, MD. Copy in possession of the USNA STEM Center.
The White House (2016a). Fact sheet: President Obama announces computer science for all initiative. The Office of the Press Secretary. Retrieved from https://www.whitehouse.gov/the-press-office/2016/01/30/fact-sheet-president-obama-announces-computer-science-all-initiative-0
Yardi, S. & Bruckman, A. (2007). What is computing? Bridging the gap between teenagersâ€™ perceptions and graduate studentsâ€™ experiences. Proceedings of the third international workshop on computing education research - ICER '07. New York, NY: ACM
Zambou, S., Britton, D. T., & Harting, M. (2016). Screen printed logic gates employing milled p-silicon as an active material. Flexible and Printed Electronics, 1(3), 1-9.
Copyright (c) 2018 Rachel E Fees, Jennifer A da Rosa, Sarah S Durkin, Mark M Murray, Angela L Moran
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).