CyberGames
Web link opens in a new tab; file link initiates download.
Students will explore cybersecurity and the vulnerabilities equity process (VEP) to learn how the government uses information acquired for cybersecurity purposes. Through a variety of activities, discussions, and reflections, students will determine how the government chooses to use information on vulnerabilities either offensively or defensively. Students will work in small collaborative groups to create a game for their final projects. Final projects will include a student-created prototype game along with a set of instructions and any necessary pieces to play the game. Using the Universal Design for Learning (UDL) approach, students will be given a project choice board to choose which type of game they want to create. Some options may include but are not limited to, an online game using code in Scratch, a traditional board game, a card game, or a role-playing game. Students may also choose to have another game approved by the teacher. Key topics will include defining vulnerability, cybersecurity, cyberattack, exploitation, social engineering, zero-day vulnerability, adversarial, botnets, malware, rules of engagement, and threat assessment. A teacher-made rubric will be provided to assist students as they design their final projects.