
Cybersecurity Escape Room Challenge
Inquiry Framework
Question Framework
Driving Question
The overarching question that guides the entire project.How can we create an engaging and educational virtual escape room that effectively teaches participants about the different types of cybersecurity threats, security measures, and the importance of protecting electronic information?Essential Questions
Supporting questions that break down major concepts.- What are the different types of cybersecurity threats and how do they impact individuals and organizations?
- How can we design an effective escape room that educates participants on cybersecurity concepts?
- What physical and digital security measures are commonly used to protect electronic information?
- How can teamwork and problem-solving skills be utilized in understanding and solving cybersecurity challenges?
- In what ways does understanding cybersecurity measures contribute to protecting personal and organizational data?
Standards & Learning Goals
Learning Goals
By the end of this project, students will be able to:- Understand various types of cybersecurity threats and their impacts on individuals and organizations.
- Demonstrate knowledge of physical and digital security measures to protect electronic information.
- Apply problem-solving and teamwork skills in the context of a cybersecurity-themed escape room.
- Develop an engaging and educational virtual escape room that includes accurate cybersecurity concepts.
- Evaluate the effectiveness of security measures in protecting electronic data through the escape room challenges.
CSTA
ISTE
NGSS
Entry Events
Events that will be used to introduce the project to studentsDigital Heist Alert!
An interactive game alert pops up on student devices, showing an ongoing digital heist. Students must use cybersecurity tools to stop the heist and secure the data.Portfolio Activities
Portfolio Activities
These activities progressively build towards your learning goals, with each submission contributing to the student's final portfolio.Threat Sleuths: Identifying Cybersecurity Threats
In this activity, students will investigate different types of cybersecurity threats and compile detailed profiles on each type. This foundational knowledge will guide the design of the escape room scenarios and challenges.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA detailed digital presentation or infographic detailing various cybersecurity threats and their impacts.Alignment
How this activity aligns with the learning objectives & standardsAligns with CSTA 2-NI-05 by ensuring students understand and can explain different types of cybersecurity threats adversely affecting electronic information security.Security Measures Mastermind
Students will explore and analyze both physical and digital security measures. Through hands-on activities, they will examine how these measures protect information and brainstorm how they could incorporate them into their escape room.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA comprehensive list of security measures with descriptions and potential applications within the escape room.Alignment
How this activity aligns with the learning objectives & standardsMeets CSTA 2-NI-05 by detailing how different security measures protect electronic information and ISTE 1.3.b by evaluating the relevance and effectiveness of these measures.Cryptography Creators
In this phase, students will delve into the world of cryptography. They'll learn about, create, and test encryption methods, which will be crucial for developing secure elements in their escape room.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityEncrypted messages crafted with basic cryptography that peers can attempt to decode.Alignment
How this activity aligns with the learning objectives & standardsSupports CSTA 2-NI-06 by applying encryption methods to model secure information transmission within the escape room's context.Escape Room Design Summit
Bringing everything together, students will collaborate in teams to storyboard, design, and draft their escape room focused on cybersecurity. This includes defining escape room challenges related to cybersecurity.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA detailed escape room design plan that includes a storyboard and draft challenges, integrating cybersecurity elements.Alignment
How this activity aligns with the learning objectives & standardsAligns with NGSS MS-ETS1-1 by defining and designing a solution to the cybersecurity educational challenge with precise criteria and constraints.Test Run and Reflection
In this final activity, students will conduct a test run of their escape room designs, observe participant interactions, and reflect on the effectiveness of their cybersecurity education goals.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA reflection report and participant feedback compilation about the escape room's effectiveness in teaching cybersecurity.Alignment
How this activity aligns with the learning objectives & standardsReflects on and evaluates the educational impact, meeting ISTE 1.3.b standards by critically assessing the accuracy and effectiveness of the designed learning experiences.Rubric & Reflection
Portfolio Rubric
Grading criteria for assessing the overall project portfolioCybersecurity Escape Room Design Assessment
Understanding Cybersecurity Threats
Evaluates the depth of understanding regarding various cybersecurity threats and their implications.Threat Identification
Measures ability to identify and profile major cybersecurity threats.
Exemplary
4 PointsIdentifies and provides detailed profiles of more than three cybersecurity threats, showcasing comprehensive understanding and real-world examples impact analysis.
Proficient
3 PointsCorrectly identifies and profiles at least three cybersecurity threats with clear understanding and some impact analysis.
Developing
2 PointsIdentifies some major threats with basic profiling; understanding and impact analysis are emerging.
Beginning
1 PointsStruggles to identify threats; provides minimal or inaccurate profiles with little understanding or analysis.
Presentation of Information
Assesses clarity and effectiveness of presenting threat-related information through digital formats.
Exemplary
4 PointsPresents information in a highly clear, visually appealing, and engaging digital format that enhances understanding.
Proficient
3 PointsEffectively communicates information in a clear and structured digital format.
Developing
2 PointsCommunicates information with some clarity but lacks full engagement or visual appeal.
Beginning
1 PointsPresentation lacks clarity, structure, and engagement; difficult to understand.
Security Measures Integration
Evaluates understanding and integration of physical and digital security measures within the escape room design.Security Measures Application
Measures ability to apply appropriate security measures to escape room challenges.
Exemplary
4 PointsIntegrates a wide range of relevant security measures in innovative ways within the escape room challenges.
Proficient
3 PointsAppropriately applies a variety of security measures in escape room design.
Developing
2 PointsApplies some security measures but lacks consistency or full relevance to challenges.
Beginning
1 PointsStruggles to apply relevant security measures; minimal or incorrect application observed.
Cryptography and Problem Solving Skills
Assesses understanding of encryption methods and ability to apply them in problem-solving contexts within the escape room.Use of Encryption
Evaluates the ability to apply encryption methods effectively in creating puzzles or challenges.
Exemplary
4 PointsDemonstrates advanced use of multiple encryption methods, integrating them seamlessly into complex problem-solving tasks.
Proficient
3 PointsEffectively uses encryption methods in a variety of challenges, showing clear understanding.
Developing
2 PointsUses basic encryption methods with some success but lacks depth in application.
Beginning
1 PointsStruggles to apply encryption methods; minimal understanding observed.
Escape Room Design and Collaboration
Evaluates the conceptual design and collaborative efforts in creating the escape room.Design Innovation and Coherence
Assesses the creativity and coherence of escape room design and challenge integration.
Exemplary
4 PointsDesigns a highly innovative and coherent escape room that integrates challenges seamlessly, demonstrating deep understanding of cybersecurity concepts.
Proficient
3 PointsDesigns a coherent and engaging escape room with well-integrated challenges.
Developing
2 PointsDesigns an escape room with some creative elements, but integration and coherence need improvement.
Beginning
1 PointsDesign lacks coherence and creativity; challenges are disjointed.
Teamwork and Reflection
Measures the effectiveness of teamwork and reflective analysis in the design process, including incorporation of feedback.
Exemplary
4 PointsExhibits exceptional teamwork; effectively incorporates feedback and provides insightful reflections.
Proficient
3 PointsDemonstrates strong teamwork and reflection; uses feedback effectively to enhance design.
Developing
2 PointsShows basic teamwork and reflection, with some integration of feedback.
Beginning
1 PointsLimited collaboration and reflection; feedback is minimally used.