Education Technology

Computer science resources

Cybersecurity

Download hands-on, interactive cybersecurity activities for students that promote teamwork and critical thinking skills.

Get your classroom ready for cybersecurity activities

All the cybersecurity activities are designed for students to do in groups and require BBC micro:bits and your TI-84 Plus CE Python or TI-Nspire™ CX II graphing calculators.

1. Update your technology

Download the latest firmware for your micro:bits and install the required Python module on your TI graphing calculators.

Updates for the TI-84 Plus series Updates for the TI-Nspire™ series

2. Transfer the activity files

After downloading all the activities, transfer the files to your TI graphing calculators using your software or the web-based app.

Transfer files for TI-84 Plus series Transfer files for TI-Nspire™ series

3. Start the activity

Provide every member of a group (typically three students per group) a micro:bit and a graphing calculator.

Select one of the cybersecurity activities from the calculator’s menu options and follow the step-by-step instructions.

What is the BBC micro:bit?

The micro:bit is a multifunctional microcontroller board that creates a fun, interactive learning environment for students to learn the basics of physical computing.

Download all cybersecurity activities

These free cybersecurity activities are ordered in a series of learning sequences, so students can gradually build on their understanding concept by concept.

Download all the activities:

TI-Nspire™ CX II version TI-84 Plus CE Python version 

Cybersecurity Activity 1:
All Clear

Activity 1 introduces students to “cleartext” messaging. Students will send messages between two micro:bit radios on one of 83 radio channels using plaintext characters, referred to as cleartext. The “student hacker” will attempt to eavesdrop on the conversation by listening in on the same channel.

Cybersecurity Activity 2:
Channel Surfing

Inspired by Hedy Lamarr’s revolutionary work, this activity builds on the concepts learned in Activity 1 and introduces students to frequency hopping. Students will learn the method of hiding radio messages by transmitting bits and pieces over several radio channels until an entire message has been sent, making it very difficult for an eavesdropper to intercept them.

Cybersecurity Activity 3:
Hail, Caesar!

Building on the concepts learned in Activity 2, this activity introduces students to Caesar ciphers. Students will experiment with encoding messages by using a Caesar shift, which is used to switch up the order of letters in the alphabet to transform plaintext into a ciphertext.

Cybersecurity Activity 4:
#WhatsYourPassword

Building on the concepts learned in Activity 3, students will learn about obfuscating passwords through a method known as “hashing.” This security function shows students how a plaintext password can be scrambled and encrypted by a hashing function, such as SHA-256, in such a way that makes it unreadable to hackers.

Cybersecurity Activity 5:
Turn the (Rainbow) Tables

Building on the concepts learned in Activity 4, it’s up to the student hacker to turn the tables by working out the method for hacking SHA-256 password encryption.
The student hacker must search a rainbow table, which is comprised of precomputed hashes from known and frequently used passwords, to decrypt the hashed password they’ve stolen.

Cybersecurity Activity 6:
Brute Force

Building on the concepts learned in Activity 5, the student hacker will now attempt a brute force attack to decrypt the hashed password. The students will observe the key differences between this and the rainbow table method.

Cybersecurity Activity 7 (Bonus):
Pick the Lock

This bonus activity challenges students to put all the concepts they’ve learned together in order to successfully pick a micro:bit lock. Will your students be able to discover what’s locked away inside the old treasure chest?

There's more to explore

Take an adventure into cryptography

Challenge students to strengthen their problem-solving skills by identifying patterns, solving puzzling problems and unraveling clues to triangulate the rich point on a treasure map.


Back      Next