Unplugged cybersecurity: An approach for bringing computer science into the classroom

The United States Naval Academy (USNA) STEM Center for Education and Outreach addresses an urgent Navy and national need for more young people to pursue careers in STEM fields through world-wide outreach to 17,000 students and 900 teachers per year. To achieve this mission, the STEM Center has developed a hands-on and inquiry-based methodology to be used with K-12 educators at professional development workshops and with students through camps, festivals and fairs, and STEM days.According to recent data, math and computer science (CS) are the fastest growing fields among STEM careers (US Bureau of Labor Statistics, 2016). The Computer Science for All initiative (2016) urges communities to bring more computer science education into the classroom to meet the rapidly rising need for more CS graduates. As a result, the USNA STEM Center has developed a number of unplugged (without a computer) cybersecurity modules to promote engagement and increase awareness. Topic areas include encryption, networking and social media, viruses and malware, programming, hardware components, authentication and authorization, and hacking.This article describes the methodology for developing unplugged computer science activities and adapting computer science undergraduate curriculum for K-12 educators and students as an introduction to complex computer science topics.

[1]  D. Schunk Learning Theories: An Educational Perspective , 1991 .

[2]  Simon L. Peyton Jones,et al.  Bringing computer science back into schools: lessons from the UK , 2013, SIGCSE '13.

[3]  K. Yoon,et al.  What Works in Professional Development? , 2009 .

[4]  Aman Yadav,et al.  Learning to teach computer science: the need for a methods course , 2012, CACM.

[5]  Jason Alexander,et al.  Computer science unplugged: school students doing real computing without computers , 2009 .

[6]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[7]  Linda J. Sax,et al.  Women planning to major in computer science: Who are they and what makes them unique? , 2016, Comput. Sci. Educ..

[8]  Robert Kruckeberg A Deweyan Perspective on Science Education: Constructivism, Experience, and Why We Learn Science , 2006 .

[9]  D. Britton,et al.  Screen printed logic gates employing milled p-silicon as an active material , 2016 .

[10]  Lynn Lambert,et al.  Computer science outreach in an elementary school , 2009 .

[11]  Amy Bruckman,et al.  What is computing?: bridging the gap between teenagers' perceptions and graduate students' experiences , 2007, ICER '07.

[12]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[13]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[14]  Chris Stephenson Creating a national K--12 computer science community , 2005, CACM.