Learning Resource Type

Classroom Resource

NOVA Cybersecurity Lab Game

Subject Area

Digital Literacy and Computer Science

Grade(s)

7, 8, 9, 10, 11, 12

Overview

Learn how to keep your digital life safe, spot cyber scams, understand the basics of coding, and defend against cyberattacks with the NOVA Cybersecurity Lab. Players assume the role of chief technology officer of a start-up social network company that is the target of increasingly sophisticated cyber attacks. In the game, players must complete challenges to strengthen their defenses and thwart attackers. The lab also features stories of real-world cyber attacks, a glossary of cyber terms, and short animated videos that explain the need for cybersecurity; privacy versus security; cryptography (cyber codes); and what exactly hackers are. This game can be played during a lesson on cybersecurity.

    Digital Literacy and Computer Science (2018) Grade(s): 7

    DLCS18.7.25

    List common methods of system cybersecurity.

    Unpacked Content

    UP:DLCS18.7.25

    Vocabulary

    • cybersecurity

    Knowledge

    Students know:
    • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.

    Skills

    Students are able to:
    • list common methods of protecting digital data online.

    Understanding

    Students understand that:
    • business and personal data is sought out by hackers.
    • business and personal data must be protected using cybersecurity measures.
    Digital Literacy and Computer Science (2018) Grade(s): 8

    DLCS18.8.24

    Compare and contrast common methods of cybersecurity.

    Unpacked Content

    UP:DLCS18.8.24

    Vocabulary

    • cybersecurity

    Knowledge

    Students know:
    • that cybersecurity is used to protect data online; one method of securing data may be better than another for a given situation.

    Skills

    Students are able to:
    • identify similarities and differences in types of cybersecurity.

    Understanding

    Students understand that:
    • many methods exist to protect data.
    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.11

    Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

    Unpacked Content

    UP:DLCS18.HS.11

    Vocabulary

    • ethics
    • digital world
    a.
      cookies
    • virus
    • malware
    • packet sniffing
    • spyware
    • phishing
    b.
    • browser history
    c.
    • personal data
    d.
      data mining
    • digital marketing
    • online wallets
    • personal information
    • data accessibility
    • passwords.
    e.
    • cyberbullying
    • harassment
    • sexual communication
    f.
    • online safety

    Knowledge

    Students know:
    • safe, legal, and ethical behaviors for online behavior.
    a.
    • tracking methods are often used to improve digital tools and advertising.
    • hazards exist when unknown entities have access to a user's digital habits.
    b.
    • methods to counteract the use of tracking.
    c.
    • that often, end-user licensing agreements (EULA) are often written to protect the entity that created the digital tool, rather than the user of the digital tool.
    • that EULAs and terms of service agreements can grant access to the user's personal data.
    • that personal data can include images, posts, personal information (phone number, address, birth date, access to friends), and browsing data.
    d.
    • often there exists an inverse relationship between online privacy/personal security and convenience.
    e.
    • that inappropriate digital behavior can have physical, legal, and ethical consequences.
    f.
    • that negative digital behaviors can have lasting consequences.
    • that some behaviors are illegal.
    • strategies to lessen the impact of negative digital behaviors and assess when to apply them.

    Skills

    Students are able to:
    • interact digitally while exercising safe, legal, and ethical behaviors.
    a.
    • identify tracking methods used to gather data.
    • identify hazards that exist when tracking methods are used.
    b.
    • list techniques to avoid tracking.
    • apply techniques to avoid tracking.
    c.
    • interpret the terms of EULAs and terms of service agreements.
    • make an educated decision to agree to EULAs and terms of service agreements.
    d.
    • weigh the risks of using a digital tool to one's personal security.
    • identify potential risks to using various digital tools.
    • evaluate a digital tool's security.
    e.
    • identify inappropriate digital behaviors.
    • identify consequences of inappropriate digital behaviors.
    f.
    • identify negative digital behaviors.
    • share strategies to to lessen the impact of negative digital behaviors.

    Understanding

    Students understand that:
    • because the Internet can be such a persisting environment, it is vital to interact with safe, legal, and ethical behaviors.
    a.
    • entities use tracking methods to make products more appealing to their users.
    • hazards exists when tracking data can be tied to individual users.
    b.
    • privacy can be violated when tracking is used.
    • techniques exist to mitigate the effects of tracking methods.
    c.
    • nothing is free—you often give up data to use digital resources for no charge.
    • it is important to educate yourself on EULAs and terms of service agreements.
    d.
    • free digital tools can compromise one's privacy and security.
    • it is important to be aware of what one is trading for use of a service.
    e.
    • inappropriate digital behavior can have physical, legal, and ethical consequences.
    • consequences of inappropriate digital behaviors can have life-altering consequences.
    f.
    • digital identity is tied to online digital behavior.
    • negative digital behaviors can have lasting consequences.
    • some digital activity is illegal.
    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.13

    Compare various security measures of a computer system.

    Unpacked Content

    UP:DLCS18.HS.13

    Vocabulary

    Cyber security, computer systems

    Knowledge

    Students know:
    • how to identify security measures of a computing system.
    • how to evaluate usability, security, portability, or scalability of the security measures of a computing system.

    Skills

    Students are able to:
    • identify security measures of a computing system.
    • evaluate usability, security, portability, or scalability of the security measures of a computing system.

    Understanding

    Students understand that:
    • Usability, security, portability, or scalability are important features of computer security measures.
    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.36

    Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

    Unpacked Content

    UP:DLCS18.HS.36

    Vocabulary

    • cybersecurity
    • two-factor authentication (TFA)
    • geolocation
    • privacy
    • cryptography

    Knowledge

    Students know:
    • how to evaluate the tradeoffs of cybersecurity recommendations.
    • how to articulate the pros and cons of TFA.
    • the importance of password requirements.
    • how to articulate the pros and cons of geolocation.

    Skills

    Students are able to:
    • explain pros and cons of cybersecurity recommendations.
    • describe the use of two-factor authentication.
    • explain the importance of password requirements.
    • describe the use of geolocation.

    Understanding

    Students understand that:
    • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.
    Link to Resource

    CR Resource Type

    Interactive/Game

    Resource Provider

    PBS
    Accessibility
    License

    License Type

    Custom
    ALSDE LOGO