Cybersecurity
In this class, you will learn about cybersecurity principles and ethics. You will also create a plan to improve your security.
Preparation
First, read pages 117-138 and 147-148 from Blown to Bits. These pages are from Chapter 5: “Secret Bits: How Codes Became Unbreakable,” and describe the history of encryption.
Next, read the article “Securing your digital life, part one: The basics,” which describes easy steps you can take to protect your digital security.
Finally, read the article “Apple sues Israeli spyware group NSO,” which describes powerful hacking tools sold by NSO Group Technologies.
Prepare for our class discussion by making notes about what stood out to you, what you particularly agreed or disagreed with, things you had questions about, etc.
Optional: Consider also reading:
- The Battle for the World’s Most Powerful Cyberweapon
- Unable to unlock gunman’s iPhones, the FBI (once again) asks for Apple’s help
- Report: Bezos’ phone uploaded GBs of personal data after getting Saudi prince’s WhatsApp message
In Class
Activity 1: Cybersecurity Discussion
In class, we will start by discussing the readings.
Activity 2: Caesar Cipher Project
Working with a partner, complete pages 1 to 3 from Unit 4’s Lab 2, “Cybersecurity.” It is important to work with a partner, since you will be exchanging encrypted messages.
If you haven’t already, refactor your code into a “caesar cipher” block. Also, test that your block can shift by any amount, and that it only outputs visible ASCII characters. If your code is working properly, it should give these outputs:
Note: As described in the reading, the Caesar cipher and other shift and substitution ciphers are trivial for computers to break. So don’t use your program to hide sensitive information!
Note: When creating real-world systems, you should never try to create your own encryption algorithm or write your own cryptography code. It’s extremely difficult for even experts to write secure cryptography code. Instead, you should rely on frameworks that incorporate security by default, such as PyNaCl for public key encryption, or Django for secure web development.
Submit
Create a plan to improve your digital security. First, read about what goes into a security plan. Next, review the advice from Ars Technica:
- Securing your digital life, part one: The basics
- Securing your digital life, part two: The bigger picture—and special circumstances
Write at least 300 words total, answering the questions shown in the template below. Also, share any thoughts on how this activity could be improved in the future.
You can discuss ideas with others, but all the writing for this assignment should be your own, and your plan should be tailored to your needs. Submit your response as a PDF.
Template
- Which digital assets do I want to protect?
- Which adversaries do I want to protect these assets from?
- How severe are the consequences if I fail to protect these assets from these adversaries?
- How likely are these adversaries to compromise these assets?
- What I am willing to do to protect these assets from these adversaries?
Learning Goals
Students will:
- Consider ethical issues associated with cybersecurity
- Develop oral and written communication skills
- Develop programming skills
- Create a plan to improve their digital security