This unit is meant to be used after the “How Computers Work” unit. It assumes that students are already familiar with binary and hexadecimal. One of the most exciting aspects of the new Advanced Placement Computer Science Principles course is the introduction of the Internet, networks and security as part of an introductory computer science class. Obviously, the Internet has changed everything in computer science and networking, privacy and security are now some of the most important computer science topics. Teaching the Internet in an accessible way using hands on lab activities is a challenge. We think code.org’s APCS Principles curriculum does a great job in this. You will want to create a teacher account at code.org. Code.org will create a URL that you can share with your students so they can join your code.org classroom. In addition to the code.org materials you will find additional and activities
What is the internet? Short answer: a distributed packet-switched network. This is the introduction video to the series, \"How the Internet Works\". Vint Cerf, one of the \"fathers of the internet\" explains the history of how the net and how no one person or organization is really in charge of it.
Script Exploitation involves inserting special codes or scripts into data. In this particular example, we will solve another puzzle in the Toaster Wars hacking competition by inserting a special SQL code into a text field to retrieve a list of usernames and passwords.
Diffie-Hellman key exchange was one of the earliest practical implementations of key exchange within the field of cryptography. It relies on the discrete logarithm problem. This test clip will be part of the final chapter of Gambling with Secrets!
by Art of the Problem Feb 24, 2012
Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This educational video explains 256 bit encryption, public and private keys, SSL & TLS and HTTPS.
In this lab, we’ll solve one of the puzzles from the 2013 Toaster Wars high school hacking competition. The background story is that a robot has crashed in your backyard, and you need to hack into it to discover why it’s there. For this problem, we’ve discovered that the robot is communicating wirelessly with a space ship and we’ve captured the packets that were sent back and forth. The captured packets are in the file first_contact.pcap. Your goal is to find the location of the ship by inspecting the network traffic.
In this lab you will use a web browser and with a protocol analyzer program called wireshark to learn how hackers can gain access to passwords and other sensitive information if it is not encrypted. This is sometimes called \"replay.\"
Wireshark is a type of program called a network protocol analyzer. It lets you read the individual packets that are sent on your network and identify the protocols they use. In this lab you will use Wireshark to look at a minimum of 6 packets using the DNS, HTTP and ICMP (ping) protocols.
google.com/ipv6 -- Vint Cerf, Chief Internet Evangelist at Google, and a founding father of the Internet, discusses the next version of the Internet, IPv6, and why we need it. When the Internet launched operationally in 1983, no one ever dreamed that there might be billions of devices and users trying to get online. But like a telephone network that is running out of phone numbers, the current Internet is running out of IP addresses, and if we don\'t roll out Internet Protocol v6 (IPv6), we won\'t have the room we need to grow and the Internet would become tangled, unsafe and unsustainable.
In this lab, you will explore Windows Networking System Tools: ipconfig, ping, and nslookup
To complete this lab, you will need access to a command prompt. One way to start the command prompt is to select Start Menu | All Programs | Accessories | command prompt.
NSA Day of Cyber is an interactive, self-guided, and fully-automated cybersecurity career experience and is free for all registrants for a year.
The NSA Day of Cyber is a web-based, self-paced, interactive experience that enables students to test drive their future in Cybersecurity by experiencing a day in the life of six NSA cybersecurity leaders.