Learning Objectives
Define cybersecurity principles: integrity and authenticity
Define and explain an adversary model
Describe potential security threats from non-validated input
Explain the purpose of ensuring the integrity and authenticity of data
Apply the process of ensuring data integrity and authenticity
Activity
For the activity, a fictional bank is considered. The Bank’s records consist of information like name, account number, username, password, etc. A signed hash of the records is also stored in the Bank’s files. A scenario is considered where the Bank’s records are hacked every day. Since the records are hashed, it is possible to determine whether they have been tampered with. If an administrator identifies a record that has been tampered, he/she could update the password and save the accounts. Click activity content to access the slides and activities associated with level 1.
Surveys
A pre-test was conducted before the sessions were organized. Both the pre and post-tests were structured to capture the students’ demographic information, their perception of the learning objectives, the extent to which they consider the course to be useful and interesting. Besides, their grasp of the concepts was tested with some content questions relevant to the module. Ultimately, an analysis of the test results helped us evaluate the effectiveness of cybersecurity project. Click Pre Survey and Post Survey to download the pdf documents of the survey.
Results
A total of 385 students from CS and 370 from CPE took the tests
A significant difference in terms of paired t-test values from pre to post tests indicate that students benifited from the course
Refer to SIGCSE paper to know more about the curriculum development process and results