skip to main content
10.1145/3545945.3569761acmconferencesArticle/Chapter ViewAbstractPublication PagessigcseConference Proceedingsconference-collections
research-article
Public Access

Reflections of Cybersecurity Workshop for K-12 Teachers

Published:03 March 2023Publication History

ABSTRACT

In this paper, we recount efforts in developing cybersecurity workshops for K-12 teachers, intended to learn skills to better educate the cybersecurity workers of tomorrow. In 2021, we provided two one-day virtual workshops and in 2022 we provided one two-day in-person workshop to high school teachers to increase cybersecurity awareness in three areas: general cybersecurity issues, software security, and hardware security. Both the online and in-person workshops employed Google classroom and Jupyter Notebooks, and high school teachers were provided with Raspberry Pi Zeros to use as part of the workshops. This paper describes the design and implementation of the workshops and also provides evidence demonstrating the effectiveness of the workshops, as well as commentary to provide guidance for future efforts.

References

  1. 2022. https://www.nist.gov/itl/applied-cybersecurity/nice/resources/online- learning-contentGoogle ScholarGoogle Scholar
  2. Swarup Bhunia and Mark Tehranipoor. 2018. Hardware security: a hands-on learning approach. Morgan Kaufmann.Google ScholarGoogle Scholar
  3. Cybersecurity Curricula. 2017. Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. A Report in the Computing Curricula Series Joint Task Force on Cybersecurity Education. ACM, IEEE, AIS, IFIP, USA (2017).Google ScholarGoogle Scholar
  4. Thomas Kluyver, Benjamin Ragan-Kelley, Fernando Pérez, Brian E Granger, Matthias Bussonnier, Jonathan Frederic, Kyle Kelley, Jessica B Hamrick, Jason Grout, Sylvain Corlay, et al. 2016. Jupyter Notebooks-a publishing format for reproducible computational workflows. Vol. 2016.Google ScholarGoogle Scholar
  5. Pentester Lab. 2021. Pentester Lab: From SQL injection to Shell. https://www.vulnhub.com/entry/pentester-lab-from-sql-injection-to-shell,80/Retrieved 2021-08-11 fromGoogle ScholarGoogle Scholar
  6. Theo Markettos, Colin Rothwell, Brett F Gutstein, Allison Pearce, Peter G Neumann, Simon Moore, and Robert Watson. 2019. Thunderclap: Exploring vulnerabilities in operating system IOMMU protection via DMA from untrustworthy peripherals. (2019).Google ScholarGoogle Scholar
  7. Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. 1996. Handbook of Applied Cryptography 1st edition ed.). CRC Press, Boca Raton.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. MITRE. 2021. MITRE ATT&CK®. https://attack.mitre.org/ Retrieved 2021-08-11 fromGoogle ScholarGoogle Scholar
  9. Onur Mutlu and Jeremie S Kim. 2019. Rowhammer: A retrospective. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 39, 8 (2019), 1555--1571.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Pimoroni. 2021. Enviro Plus. https://learn.pimoroni.com/tutorial/sandyj/getting-started-with-enviro-plusGoogle ScholarGoogle Scholar
  11. Edgar Allen Poe. 1843. The Gold Bug. Dollar Newspaper (1843).Google ScholarGoogle Scholar
  12. Bernadette M Randles, Irene V Pasquetto, Milena S Golshan, and Christine L Borgman. 2017. Using the Jupyter notebook as a tool for open science: An empirical study. In 2017 ACM/IEEE Joint Conference on Digital Libraries (JCDL). IEEE, 1--2.Google ScholarGoogle ScholarCross RefCross Ref
  13. Adam Shostack. 2014. Threat Modeling: Designing for Security 1st edition ed.). Wiley, Indianapolis, IN.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. William Stallings and Lawrie Brown. 2017. Computer Security: Principles and Practice 4th edition ed.). Pearson, New York, NY.Google ScholarGoogle Scholar
  15. Eben Upton and Gareth Halfacree. 2014. Raspberry Pi user guide. John Wiley & Sons.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Reflections of Cybersecurity Workshop for K-12 Teachers

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          SIGCSE 2023: Proceedings of the 54th ACM Technical Symposium on Computer Science Education V. 1
          March 2023
          1481 pages
          ISBN:9781450394314
          DOI:10.1145/3545945

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 3 March 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate1,595of4,542submissions,35%

          Upcoming Conference

          SIGCSE Virtual 2024
          SIGCSE Virtual 2024: ACM Virtual Global Computing Education Conference
          November 30 - December 1, 2024
          Virtual Event , USA

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader