Hour of Code: Learn about cyber security! Lesson Plan

Overview

This activity consists of 12 interactive problems in which students explore discover common cyber security risks and explore how to be more secure online. The problems address five key cyber security themes: password security, privacy, scams, web application security (websec), and encryption.

Download our teacher guide for information about the learning content and an explanation of the solutions to each problem.


Learning Objectives

Students will learn:

  • to use secure passwords
  • to keep personal information private
  • to be on the look out for suspicious emails and messages
  • about how encryption keeps information secure
  • to browse the web securely

Extended Activities

Cyber Security Terms

  • Authentication: Verifying the identity of a user, process or device before allowing access to resources in a system.
  • Authorisation: A security mechanism used to determine user/client privileges or access levels related to system resources, including computer programs, files, services, data and application features.
  • Cookie: A small text file that is transmitted by a website and stored in the user's web browser, to identify the user and prepare customized webpages. A cookie can be used to track a user’s activity while browsing the internet.
  • Encryption: The conversion of electronic plaintext data into unreadable ciphertext using algorithms. Encryption protects the confidentially of data. Both encryption and decryption are functions of cryptography.
  • Multi-factor authentication: A method of computer access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism – typically at least two of the following categories: knowledge (something they know: a password), possession (something they have: a code sent to a mobile phone), and inherence (something they are: a thumb print).
  • Phishing: Untargeted, mass emails sent to many people asking for sensitive information (such as bank details), encouraging them to open a malicious attachment, or visit a fake website that will ask the user to provide sensitive information or download malicious content.
  • Scam: A scam is a fraudulent scheme performed by a dishonest or deceitful individual, group, or company, in an attempt to obtain money or something else of value.
  • Social engineering: The methods used to manipulate people into carrying out specific actions, or divulging information.
  • Spam: Unsolicited electronic messages, especially containing advertising, transmitted to a large number of people.

For a full glossary of cyber security terms, refer to the Australian Cyber Security website.

Cyber Security card game: Know your risks

What information is safe to share online? This card game will help you understand the risks.

Learn about whether to share, not share or be cautious with different pieces of your information. Sort as quickly as you can.

Do you agree or disagree with our assessment? Discuss with your classmates.


Cryptography: Cipher Wheels

Learn the basics of encryption through simple activities that convert plain text into simple ciphertexts.

This unplugged activity uses “ciphers” to encode and decode “secret” messages. By following a simple sequence of steps (an algorithm) students can encode and decode different texts.

It allows students to explore concepts of collecting, managing and analysing data, investigating and defining problems and collaboration. It can also be used as a platform for discussing the role of cryptography and information communication technologies in the community.


What to do next

The Schools Cyber Security Challenges provide further opportunities for students to learn about cyber security. There are six challenges available which expand on the themes in this Hour of Code short course.

Year Groups Duration Link Topics
Information Privacy and Security 7-12 4-6 hours https://groklearning.com/course/cyber-hs-infosec/ Privacy, Passwords
Data Encryption 7-12 6-8 hours https://groklearning.com/course/cyber-78-py-crypto/ Encryption
Information Privacy and Security - Primary 5-6 2-4 hours https://groklearning.com/course/cyber-ps-infosec/ Privacy, Passwords
Web Application Security 7-12 6-8 hours https://groklearning.com/course/cyber-hs-websec/ Websec
Network Security 9-12 6-8 hours https://groklearning.com/course/cyber-910-py-networking/ Networks
Phishing and Scams 7-12 1-2 hours https://groklearning.com/course/cyber-hs-phishing/ Scams

Register as a teacher for free!

Or pick one of our other fun activities. Suitable for Grades 3-12.

Monster Maker! (Blockly)

Use drag-and-drop blocks to write your own programs, learn about sequence and ordering, and create fun monster characters!

Start coding now!

Animal Classifier (Python)

Learn about the differences between animals, and how Biologists use programming to help them do science! You'll use the programming language Python to classify animals based on their characteristics.

Start coding now!

Is Eliza Human? (Python)

Use the programming language Python to build a friendly chatbot called "Eliza". Can she fool your friends into thinking she's a human?

Start coding now!

Flags of the World (Python Turtle)

Use the programming language Python and instruct a turtle to draw flags from around the world! How many countries do you know?

Start coding now!

Cyber Live!

A Navy captain is held captive inside his ship. A major landmark has gone dark. And weapons are pointed at Sydney’s busiest sites… It’s all connected, and it’s up to you to free the captain, track down the culprit, and stop them. Students will need to trace clues, solve puzzles, and figure out how to stop a large scale simulated cyber attack before it’s too late.

Start coding now!

Image Magic with Python

Use the programming language Python to make speedy changes to images. Make fun image editing programs and make your own image filter!

Start coding now!

Frozen Fractals (Python Turtle)

Use the programming language Python and instruct a turtle to draw fantastic snowflakes with code! Brrr, is it getting cold in here?

Start coding now!

Frozen Fractals (Blockly Turtle)

Build programs using friendly blocks and instruct a turtle to draw fantastic snowflakes with code! Brrr, is it getting cold in here?

Start coding now!

Virtual Pet (Python micro:bit)

Get started with the BBC micro:bit. Use the Python programming language to make a pet that you can feed and play with! No micro:bit required.

Start coding now!

Virtual Pet (Blockly micro:bit)

Get started with the BBC micro:bit. Use friendly blocks to make a virtual pet that you can feed and play with! No micro:bit required.

Start coding now!

Hydrangea Danger (Blockly Turtle)

This activity is designed to introduce branching. Use the Blockly version of Python and its turtle module to draw and colour hydrangea flowers!

Start coding now!

Emoticon Madness (Python)

Ever wanted to create your own emoticon? Use the programming language Python to explore emoticons and text manipulation.

Start coding now!

Space (Blockly Python)

Use the visual programming language Blockly to investigate space and reach for the stars.

Start coding now!

Disease Epidemic (Python)

Use the programming language Python to model a disease outbreak. Can you solve the curious case of the glowing nose?

Start coding now!

The Dark Tunnel (Python)

Use the programming language Python to create a simple game (or MUD). Can you find your way through the dark tunnel?

Start coding now!