Home > Education Directory

Education Directory

This directory is for educators who are interested in teaching a class about cyber issues. Each item or collection can be used for multiple pedagogical purposes. However, suggestions for how to incorporate service learning/activities into curriculum are included, as well as assignment ideas based on the items on the website. Cyber issues can be taught to all ages, but the suggestions are focused toward high school and higher education courses.

Cyberdeterrence and Cyberwar:

The RAND corporation published this comprehensive document assessing cyberwar. Even though it is 203 pages (including references), the author does a good job of laying out its contents. Reading the entire document or certain chapters and writing summaries would prepare advanced students for future discussions about cyberwar. For younger students, summarizing the material may be more useful. Focusing on one piece of the document might be helpful for students to get a clear idea of what cyberwar is and what issues surround it.

Glossary:

Using the glossary on this website will provide definitions to terms students may not be familiar with. It is not a comprehensive list, but a good foundation for common terms used when referring to cyberwar. Also, searching for "definitions" in the search-box will pull up more documents that define certain cyber terms.

Science of Cyber-security:

JASON was asked to develop a potential science of cyber-security for the Department of Defense. Researchers focused on computer science as a means to create a cyber science, but also drew upon methods of economics, meteorology, medicine, astrology and agriculture. For any science or computer class, this document demonstrates how science can benefit more than its own topic.

Get Involved:

Students may want to become involved by disseminating information about cyber issues or by participating in national cyber challenges.

As an educator, the various items in this section may be useful for starting a service-learning project or awareness campaign. Some of the competitions have teams, so participating in an actual cyber challenge may be a great learning experience for undergraduate computer science majors. 

Improving our nation's cybersecurity through the public-private partnership: A white paper:

This white paper focuses on having a government/private sector partnership. One of the recommendations states that more education, research and awareness be part of United States' curriculum. Having students read this document before engaging in a service learning project may provide background and motivation to take up the call of cybersecurity.

Cyberwar Gaming:

Students may be interested in how the government and military role play and simulate a cyberwar. Watching "Cyber Shockwave" and discussing the value of war games (as if whether the fictional nature reflects reality, etc.) may get students to think critically about using fiction to determine future policy.

Also, it might be interesting to conduct an actual cyberwar game in the classroom as a way for students to get "hands on" experience conducting "classified" games. There are multiple ways one could teach cyberwar gaming (to a variety of ages) and these are just some suggestions. This collection in particular may provide a more creative way to teach students about cybersecurity preparation and defense.

Alternative Viewpoints:

This collection contains particularly important information for students. Since there is a great deal of media discussion about the dangers of future cyber threats, being exposed to other viewpoints (from credible sources) is an excellent way of teaching media literacy. By hearing a variety of opinions, a space for critical thinking will be opened so that students can form their own opinions based on balanced research. Perhaps assigning a paper asking the question, "Are we in a cyberwar?" or "What is cyberwar?" might get students to think about how the term cyberwar is being used and/or abused.

Pending Law and Current Law and Treaties:

These two collections may be of particular use for political science or history educators. Students can compare current laws and pending laws that may alter and affect their own lives.

Symantec Stuxnet Report: W32.Stuxnet Dossier

This report goes into a lot of detail about the Stuxnet worm and how it works. Computer science classes may benefit from learning about the "most sophisticated" worm ever created to date.

The Man in Charge of Making the Web Safer and Planning for the Future of Cyber Attack Attribution:

The first item (The Man in Charge) is an interview with Howard Schmidt. He discusses how an Internet ID system would work in the United States and has a positive outlook on its effectiveness. The second item is Marc Rotenberg's statement to the Subcommittee on Technology and Innovation of the House Committee on Science and Technology. Rotenberg discusses mandatory Internet IDs and points to the risks and limitations (rather than the positives) that enforcing IDs may have. His topics of discussion include human rights, first amendment rights and online freedoms.

Having students compare and contrast these two opinions would not only be a good exercise in reading comprehension, but also would expose them to a future mandate that could affect their lives. Discussing privacy and internet freedom is interesting and important for all ages to engage in.

Books:

While the majority of the books provided in this collection probably exaggerate the cyber threat, having students read one or more of them as a textbook or separate assignment would provide background information on cyber issues. Perhaps choosing books that only present one side of the debate (like Richard Clarke's, Cyber War: The Next Threat to National Security and What to Do About It) might serve as a book criticism assignment.