Cybersecurity Escape Room Challenge
Created byAmanda O'Mara
35 views0 downloads

Cybersecurity Escape Room Challenge

Grade 8Computer Science5 days
The Cybersecurity Escape Room Challenge is a project designed for 8th-grade students to understand and apply cybersecurity concepts in an engaging educational format. Students will research cybersecurity threats, design cryptography challenges, and integrate security measures into a virtual escape room. Through collaborative efforts, they aim to develop an escape room that effectively educates participants on the importance of protecting electronic data against various threats using teamwork and problem-solving skills. This project emphasizes the hands-on application of cybersecurity measures and enhances students' understanding of both physical and digital security in solving real-world challenges.
CybersecurityEscape RoomProblem-SolvingCollaborationEncryptionSecurity MeasuresEducational Design
Want to create your own PBL Recipe?Use our AI-powered tools to design engaging project-based learning experiences for your students.
📝

Inquiry Framework

Question Framework

Driving Question

The overarching question that guides the entire project.How can we create an engaging and educational virtual escape room that effectively teaches participants about the different types of cybersecurity threats, security measures, and the importance of protecting electronic information?

Essential Questions

Supporting questions that break down major concepts.
  • What are the different types of cybersecurity threats and how do they impact individuals and organizations?
  • How can we design an effective escape room that educates participants on cybersecurity concepts?
  • What physical and digital security measures are commonly used to protect electronic information?
  • How can teamwork and problem-solving skills be utilized in understanding and solving cybersecurity challenges?
  • In what ways does understanding cybersecurity measures contribute to protecting personal and organizational data?

Standards & Learning Goals

Learning Goals

By the end of this project, students will be able to:
  • Understand various types of cybersecurity threats and their impacts on individuals and organizations.
  • Demonstrate knowledge of physical and digital security measures to protect electronic information.
  • Apply problem-solving and teamwork skills in the context of a cybersecurity-themed escape room.
  • Develop an engaging and educational virtual escape room that includes accurate cybersecurity concepts.
  • Evaluate the effectiveness of security measures in protecting electronic data through the escape room challenges.

CSTA

CSTA 2-NI-05
Primary
Explain how physical and digital security measures protect electronic information.Reason: This standard directly ties into the project's focus on cybersecurity, specifically the explanation of security measures which is a core element of the escape room's educational goals.
CSTA 2-NI-06
Secondary
Apply multiple methods of encryption to model the secure transmission of information.Reason: To enhance the escape room experience, students can apply encryption methods, making this an important aspect of understanding digital security.

ISTE

ISTE 1.3.b
Supporting
Students evaluate the accuracy, perspective, credibility and relevance of information, media, data or other resources.Reason: This standard supports the critical thinking and evaluation skills needed to design effective cybersecurity challenges and solutions.

NGSS

NGSS MS-ETS1-1
Secondary
Define the criteria and constraints of a design problem with sufficient precision to ensure a successful solution, taking into account relevant scientific principles and potential impacts on people and the natural environment that may limit possible solutions.Reason: Designing an escape room involves defining criteria and constraints, which aligns well with engineering practices outlined in this standard.

Entry Events

Events that will be used to introduce the project to students

Digital Heist Alert!

An interactive game alert pops up on student devices, showing an ongoing digital heist. Students must use cybersecurity tools to stop the heist and secure the data.
📚

Portfolio Activities

Portfolio Activities

These activities progressively build towards your learning goals, with each submission contributing to the student's final portfolio.
Activity 1

Threat Sleuths: Identifying Cybersecurity Threats

In this activity, students will investigate different types of cybersecurity threats and compile detailed profiles on each type. This foundational knowledge will guide the design of the escape room scenarios and challenges.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Research various cybersecurity threats such as phishing, malware, and ransomware using credible sources.
2. Create a detailed profile of at least three different threats, including their characteristics, real-world examples, and potential impacts on individuals and organizations.
3. Organize your findings in a digital presentation or infographic to share with classmates.

Final Product

What students will submit as the final product of the activityA detailed digital presentation or infographic detailing various cybersecurity threats and their impacts.

Alignment

How this activity aligns with the learning objectives & standardsAligns with CSTA 2-NI-05 by ensuring students understand and can explain different types of cybersecurity threats adversely affecting electronic information security.
Activity 2

Security Measures Mastermind

Students will explore and analyze both physical and digital security measures. Through hands-on activities, they will examine how these measures protect information and brainstorm how they could incorporate them into their escape room.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Research different security measures, both physical (like alarms, locks) and digital (like firewalls, encryption).
2. Participate in a class discussion or activity where different security measures are demonstrated, such as a simulated computer hack or lock-picking session.
3. Select appropriate security measures that can be integrated into the escape room challenges.

Final Product

What students will submit as the final product of the activityA comprehensive list of security measures with descriptions and potential applications within the escape room.

Alignment

How this activity aligns with the learning objectives & standardsMeets CSTA 2-NI-05 by detailing how different security measures protect electronic information and ISTE 1.3.b by evaluating the relevance and effectiveness of these measures.
Activity 3

Cryptography Creators

In this phase, students will delve into the world of cryptography. They'll learn about, create, and test encryption methods, which will be crucial for developing secure elements in their escape room.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Study different methods of encryption and understand how each one ensures secure transmission of information.
2. Create simple encrypted messages using at least one selected encryption method.
3. Test and share the encrypted messages with classmates to decode, simulating real-world cyber challenges.

Final Product

What students will submit as the final product of the activityEncrypted messages crafted with basic cryptography that peers can attempt to decode.

Alignment

How this activity aligns with the learning objectives & standardsSupports CSTA 2-NI-06 by applying encryption methods to model secure information transmission within the escape room's context.
Activity 4

Escape Room Design Summit

Bringing everything together, students will collaborate in teams to storyboard, design, and draft their escape room focused on cybersecurity. This includes defining escape room challenges related to cybersecurity.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Form teams and brainstorm escape room themes that incorporate the cybersecurity threats and measures researched.
2. Create a storyboard that outlines the narrative, challenges, and solutions of the escape room.
3. Draft challenges that require solving cybersecurity problems, like decoding messages, recognizing threats, or applying security measures.

Final Product

What students will submit as the final product of the activityA detailed escape room design plan that includes a storyboard and draft challenges, integrating cybersecurity elements.

Alignment

How this activity aligns with the learning objectives & standardsAligns with NGSS MS-ETS1-1 by defining and designing a solution to the cybersecurity educational challenge with precise criteria and constraints.
Activity 5

Test Run and Reflection

In this final activity, students will conduct a test run of their escape room designs, observe participant interactions, and reflect on the effectiveness of their cybersecurity education goals.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Set up a prototype of the escape room and run a test with classmates or another class, acting as participants.
2. Observe the participants' interactions, focusing on how well they understand and engage with cybersecurity concepts and challenges.
3. Gather feedback from participants and analyze which elements of the escape room could be improved in terms of clarity, engagement, and educational impact.
4. Write a reflection report on the learning experience, detailing what worked, potential improvements, and the overall impact of teaching cybersecurity through an escape room.

Final Product

What students will submit as the final product of the activityA reflection report and participant feedback compilation about the escape room's effectiveness in teaching cybersecurity.

Alignment

How this activity aligns with the learning objectives & standardsReflects on and evaluates the educational impact, meeting ISTE 1.3.b standards by critically assessing the accuracy and effectiveness of the designed learning experiences.
🏆

Rubric & Reflection

Portfolio Rubric

Grading criteria for assessing the overall project portfolio

Cybersecurity Escape Room Design Assessment

Category 1

Understanding Cybersecurity Threats

Evaluates the depth of understanding regarding various cybersecurity threats and their implications.
Criterion 1

Threat Identification

Measures ability to identify and profile major cybersecurity threats.

Exemplary
4 Points

Identifies and provides detailed profiles of more than three cybersecurity threats, showcasing comprehensive understanding and real-world examples impact analysis.

Proficient
3 Points

Correctly identifies and profiles at least three cybersecurity threats with clear understanding and some impact analysis.

Developing
2 Points

Identifies some major threats with basic profiling; understanding and impact analysis are emerging.

Beginning
1 Points

Struggles to identify threats; provides minimal or inaccurate profiles with little understanding or analysis.

Criterion 2

Presentation of Information

Assesses clarity and effectiveness of presenting threat-related information through digital formats.

Exemplary
4 Points

Presents information in a highly clear, visually appealing, and engaging digital format that enhances understanding.

Proficient
3 Points

Effectively communicates information in a clear and structured digital format.

Developing
2 Points

Communicates information with some clarity but lacks full engagement or visual appeal.

Beginning
1 Points

Presentation lacks clarity, structure, and engagement; difficult to understand.

Category 2

Security Measures Integration

Evaluates understanding and integration of physical and digital security measures within the escape room design.
Criterion 1

Security Measures Application

Measures ability to apply appropriate security measures to escape room challenges.

Exemplary
4 Points

Integrates a wide range of relevant security measures in innovative ways within the escape room challenges.

Proficient
3 Points

Appropriately applies a variety of security measures in escape room design.

Developing
2 Points

Applies some security measures but lacks consistency or full relevance to challenges.

Beginning
1 Points

Struggles to apply relevant security measures; minimal or incorrect application observed.

Category 3

Cryptography and Problem Solving Skills

Assesses understanding of encryption methods and ability to apply them in problem-solving contexts within the escape room.
Criterion 1

Use of Encryption

Evaluates the ability to apply encryption methods effectively in creating puzzles or challenges.

Exemplary
4 Points

Demonstrates advanced use of multiple encryption methods, integrating them seamlessly into complex problem-solving tasks.

Proficient
3 Points

Effectively uses encryption methods in a variety of challenges, showing clear understanding.

Developing
2 Points

Uses basic encryption methods with some success but lacks depth in application.

Beginning
1 Points

Struggles to apply encryption methods; minimal understanding observed.

Category 4

Escape Room Design and Collaboration

Evaluates the conceptual design and collaborative efforts in creating the escape room.
Criterion 1

Design Innovation and Coherence

Assesses the creativity and coherence of escape room design and challenge integration.

Exemplary
4 Points

Designs a highly innovative and coherent escape room that integrates challenges seamlessly, demonstrating deep understanding of cybersecurity concepts.

Proficient
3 Points

Designs a coherent and engaging escape room with well-integrated challenges.

Developing
2 Points

Designs an escape room with some creative elements, but integration and coherence need improvement.

Beginning
1 Points

Design lacks coherence and creativity; challenges are disjointed.

Criterion 2

Teamwork and Reflection

Measures the effectiveness of teamwork and reflective analysis in the design process, including incorporation of feedback.

Exemplary
4 Points

Exhibits exceptional teamwork; effectively incorporates feedback and provides insightful reflections.

Proficient
3 Points

Demonstrates strong teamwork and reflection; uses feedback effectively to enhance design.

Developing
2 Points

Shows basic teamwork and reflection, with some integration of feedback.

Beginning
1 Points

Limited collaboration and reflection; feedback is minimally used.

Reflection Prompts

End-of-project reflection questions to get students to think about their learning
Question 1

Reflect on your biggest takeaway from participating in creating a cybersecurity-themed escape room. How have your perceptions of cybersecurity threats and protections evolved?

Text
Required
Question 2

On a scale from 1 to 5, how would you rate your teamwork and problem-solving skills during this project?

Scale
Required
Question 3

Which cybersecurity concept or challenge did you find the most engaging in this project, and why?

Multiple choice
Required
Options
Phishing and Ransomware Threats
Encryption Methods
Physical Security Measures
Digital Security Measures
Question 4

Reflect on the test run of your escape room. What did you learn about designing educational experiences? What would you improve if given another chance?

Text
Required
Question 5

Do you think the cybersecurity escape room effectively taught the importance of cybersecurity measures? Why or why not?

Text
Required