ABSTRACT
In this paper, we recount efforts in developing cybersecurity workshops for K-12 teachers, intended to learn skills to better educate the cybersecurity workers of tomorrow. In 2021, we provided two one-day virtual workshops and in 2022 we provided one two-day in-person workshop to high school teachers to increase cybersecurity awareness in three areas: general cybersecurity issues, software security, and hardware security. Both the online and in-person workshops employed Google classroom and Jupyter Notebooks, and high school teachers were provided with Raspberry Pi Zeros to use as part of the workshops. This paper describes the design and implementation of the workshops and also provides evidence demonstrating the effectiveness of the workshops, as well as commentary to provide guidance for future efforts.
- 2022. https://www.nist.gov/itl/applied-cybersecurity/nice/resources/online- learning-contentGoogle Scholar
- Swarup Bhunia and Mark Tehranipoor. 2018. Hardware security: a hands-on learning approach. Morgan Kaufmann.Google Scholar
- Cybersecurity Curricula. 2017. Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity. A Report in the Computing Curricula Series Joint Task Force on Cybersecurity Education. ACM, IEEE, AIS, IFIP, USA (2017).Google Scholar
- Thomas Kluyver, Benjamin Ragan-Kelley, Fernando Pérez, Brian E Granger, Matthias Bussonnier, Jonathan Frederic, Kyle Kelley, Jessica B Hamrick, Jason Grout, Sylvain Corlay, et al. 2016. Jupyter Notebooks-a publishing format for reproducible computational workflows. Vol. 2016.Google Scholar
- Pentester Lab. 2021. Pentester Lab: From SQL injection to Shell. https://www.vulnhub.com/entry/pentester-lab-from-sql-injection-to-shell,80/Retrieved 2021-08-11 fromGoogle Scholar
- Theo Markettos, Colin Rothwell, Brett F Gutstein, Allison Pearce, Peter G Neumann, Simon Moore, and Robert Watson. 2019. Thunderclap: Exploring vulnerabilities in operating system IOMMU protection via DMA from untrustworthy peripherals. (2019).Google Scholar
- Alfred J. Menezes, Paul C. van Oorschot, and Scott A. Vanstone. 1996. Handbook of Applied Cryptography 1st edition ed.). CRC Press, Boca Raton.Google ScholarDigital Library
- MITRE. 2021. MITRE ATT&CK®. https://attack.mitre.org/ Retrieved 2021-08-11 fromGoogle Scholar
- Onur Mutlu and Jeremie S Kim. 2019. Rowhammer: A retrospective. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, Vol. 39, 8 (2019), 1555--1571.Google ScholarDigital Library
- Pimoroni. 2021. Enviro Plus. https://learn.pimoroni.com/tutorial/sandyj/getting-started-with-enviro-plusGoogle Scholar
- Edgar Allen Poe. 1843. The Gold Bug. Dollar Newspaper (1843).Google Scholar
- Bernadette M Randles, Irene V Pasquetto, Milena S Golshan, and Christine L Borgman. 2017. Using the Jupyter notebook as a tool for open science: An empirical study. In 2017 ACM/IEEE Joint Conference on Digital Libraries (JCDL). IEEE, 1--2.Google ScholarCross Ref
- Adam Shostack. 2014. Threat Modeling: Designing for Security 1st edition ed.). Wiley, Indianapolis, IN.Google ScholarDigital Library
- William Stallings and Lawrie Brown. 2017. Computer Security: Principles and Practice 4th edition ed.). Pearson, New York, NY.Google Scholar
- Eben Upton and Gareth Halfacree. 2014. Raspberry Pi user guide. John Wiley & Sons.Google ScholarDigital Library
Index Terms
- Reflections of Cybersecurity Workshop for K-12 Teachers
Recommendations
Reflections of Cybersecurity Workshop for K-12 Teachers and High School Students
SIGCSE 2022: Proceedings of the 53rd ACM Technical Symposium on Computer Science Education V. 2In this paper, we describe efforts to promote a robust cyber security workforce through a series of online workshops for K-12 teachers and grades 7-12 students. In 2021, we provided virtual workshops to high school teachers and students to increase ...
An International Pilot Study of K-12 Teachers' Computer Science Self-Esteem
ITiCSE '20: Proceedings of the 2020 ACM Conference on Innovation and Technology in Computer Science EducationComputer Science (CS) is a new subject area for many K-12 teachers around the world, requiring new disciplinary knowledge and skills. Teacher social-behavioral factors (e.g. self-esteem) have been found to impact learning and teaching, and a key part of ...
Risk and protective factors for intuitive and rational judgment of cybersecurity risks in a large sample of K-12 students and teachers
AbstractK-12 students and teachers are a vulnerable population for cybersecurity risks. Identifying both risk factors and protective factors associated with intuitive and rational judgment of cybersecurity risks would help them develop ...
Highlights- K-12 students and teachers are particularly vulnerable to cybersecurity risks.
- ...
Comments