Cybersecurity Shuffle: Using Card Magic to Introduce Cybersecurity Concepts

被引:2
|
作者
Moore, Preston [1 ]
Cappos, Justin [1 ]
机构
[1] NYU, New York, NY 10012 USA
关键词
Cybersecurity; Cybersecurity Education; Scaffolding; Card Magic;
D O I
10.1145/3478432.3499081
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
One of the main challenges in designing lessons for an introductory information security class is how to present new technical concepts in a manner comprehensible to students with widely different backgrounds. A non-traditional approach can help students engage with the material and master these unfamiliar ideas. We have devised a series of lessons that teach important information security topics, such as social engineering, side-channel attacks, and attacks on randomness using card magic. Each lesson centers around a card trick that allows the instructor to simulate the described attack in such a way that prior technical background is not required. In this work, we describe our experience using these lessons in teaching cybersecurity topics to high school students with limited computer science education. Students were assessed before and after the demonstration to gauge their mastery of the material, and their opinions on each lesson. Students indicated they enjoyed the lesson and their pre- and post-test scores improved by between 15% and 30%.
引用
收藏
页码:1090 / 1090
页数:1
相关论文
共 50 条
  • [41] Recent Progress of Using Knowledge Graph for Cybersecurity
    Liu, Kai
    Wang, Fei
    Ding, Zhaoyun
    Liang, Sheng
    Yu, Zhengfei
    Zhou, Yun
    ELECTRONICS, 2022, 11 (15)
  • [42] Accessible Cybersecurity Education Using Prompt Tree
    Nara, Pavan Subhash Chandrabose
    Mitra, Reshmi
    Roy, Indranil
    Cole, T. Robin, III
    COMPUTER APPLICATIONS IN INDUSTRY AND ENGINEERING, CAINE 2024, 2025, 2242 : 115 - 126
  • [43] Using the Cybersecurity Kill Chain for Attack and Defence
    Cooper M.
    ITNOW, 2022, 64 (02) : 38 - 41
  • [44] Using Google Analytics to Support Cybersecurity Forensics
    Qin, Han
    Riehle, Kit
    Zhao, Haozhen
    2017 IEEE INTERNATIONAL CONFERENCE ON BIG DATA (BIG DATA), 2017, : 3831 - 3834
  • [45] Exploitability Analysis using Predictive CyberSecurity Framework
    Abraham, Subil
    Nair, Suku
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBERNETICS (CYBCONF), 2015, : 317 - 323
  • [46] Constructing Cybersecurity Stocks Portfolio Using AI
    Aiche, Avishay
    Winer, Zvi
    Cohen, Gil
    FORECASTING, 2024, 6 (04): : 1065 - 1077
  • [47] A Scientometrics Analysis of Cybersecurity Using e-CSTI
    Omote, Kazumasa
    Inoue, Yoko
    Terada, Yoshihide
    Shichijo, Naohiro
    Shirai, Toshiyuki
    IEEE ACCESS, 2024, 12 : 40350 - 40367
  • [48] Using Research to Ensure Equity in a Cybersecurity Education Pathway
    Denner, Jill
    Green, Emily
    Edwards, Julie
    2020 IEEE STCBP RESEARCH ON EQUITY AND SUSTAINED PARTICIPATION IN ENGINEERING, COMPUTING, AND TECHNOLOGY (RESPECT), VOL 1, 2020, : 233 - 234
  • [49] Assessing data cybersecurity using ISO/IEC 25012
    Verdugo, Javier
    Rodriguez, Moises
    SOFTWARE QUALITY JOURNAL, 2020, 28 (03) : 965 - 985
  • [50] Cyber Workforce Development Using a Behavioral Cybersecurity Paradigm
    Caulkins, Bruce D.
    Bockelman, Patricia
    Badillo-Urquiola, Karla
    Leis, Rebecca
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBER CONFLICT (CYCON U.S.), 2016, : 34 - 39