
Digital Fortress Challenge: Secure Network Design
Inquiry Framework
Question Framework
Driving Question
The overarching question that guides the entire project.How can we design a secure network model that effectively resists hacking attempts while addressing vulnerabilities, and what strategies and technologies can be leveraged to enhance its resilience? Develop a solution that incorporates encryption, firewalls, and intrusion detection systems to mitigate risks associated with software vulnerabilities and cyber threats.Essential Questions
Supporting questions that break down major concepts.- How do hackers infiltrate computer networks, and what techniques are used to prevent these intrusions?
- What are the fundamental principles of designing a secure network architecture?
- How does encryption contribute to network security, and what are its limitations?
- What role do firewalls and intrusion detection systems play in safeguarding networks against cyber threats?
- How do vulnerabilities in software lead to security breaches, and how can they be mitigated?
Standards & Learning Goals
Learning Goals
By the end of this project, students will be able to:- Understand and describe the fundamental security issues leading to compromised computer programs.
- Design a secure network model incorporating encryption, firewalls, and intrusion detection systems to enhance resilience to hacking.
- Evaluate the effectiveness of different security technologies and strategies in preventing network intrusions.
- Explore the principles of secure network architecture to protect against cyber threats.
- Analyze software vulnerabilities and propose strategies to mitigate related security breaches.
CSTA K-12 Computer Science Standards
NGSS
Computer Science Teachers Association
IT Career Cluster
Entry Events
Events that will be used to introduce the project to studentsMystery Box: The Hacker’s Toolbox
Students receive a mystery box filled with various tools and clues symbolizing hacker techniques and technologies. They explore each item to infer how it could be used for either defensive or offensive purposes, blurring the line between hacking and cybersecurity and sparking curiosity.Portfolio Activities
Portfolio Activities
These activities progressively build towards your learning goals, with each submission contributing to the student's final portfolio.Encryption Puzzle Challenge
Students will explore different encryption techniques and analyze their role and limitations in network security.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA report discussing encryption techniques and personal experiences solving related puzzles.Alignment
How this activity aligns with the learning objectives & standardsAddresses the learning goal of understanding encryption's role in network security.Firewall Defender Game
Students will learn the functionality of firewalls and intrusion detection systems (IDS) by engaging in a simulation game that challenges their ability to safeguard a network.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA reflection essay on the experience of defending a network using firewalls and IDS in simulations.Alignment
How this activity aligns with the learning objectives & standardsRelates to the use of security tools as described by IT.5.3.Vulnerability and Mitigation Workshop
Students will analyze real-world software vulnerabilities and brainstorm strategies to mitigate security breaches.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityGroup presentations proposing solutions to mitigate selected software vulnerabilities.Alignment
How this activity aligns with the learning objectives & standardsSupports 9-12.CT.cs.03 by evaluating and proposing feasible security solutions.Hacker's Detective Notebook
Students will investigate different types of security threats that might compromise computer programs, emphasizing the importance of understanding hacking techniques.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA detailed detective notebook categorizing security threats and potential mitigations.Alignment
How this activity aligns with the learning objectives & standardsCovers L2.AP.PD.06 by explaining security issues leading to compromised programs.Network Security Architect
Students will design a secure network model that incorporates key security features like encryption and firewalls to protect against hacking.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA comprehensive network model blueprint with identified security measures.Alignment
How this activity aligns with the learning objectives & standardsAligns with HS-ETS1-2 by designing a solution to a complex problem in network security.Rubric & Reflection
Portfolio Rubric
Grading criteria for assessing the overall project portfolioDigital Fortress Security Challenge Rubric
Understanding Security Principles
Assessing students' comprehension of fundamental network security issues, encryption, and security tools.Explains Security Issues
Ability to understand and articulate security issues leading to compromised computer programs.
Exemplary
4 PointsThoroughly explains various security issues, demonstrating sophisticated understanding with comprehensive examples.
Proficient
3 PointsExplains multiple security issues, demonstrating a thorough understanding with clear examples.
Developing
2 PointsExplains some security issues, showing emerging understanding with basic examples.
Beginning
1 PointsStruggles to explain security issues, demonstrating minimal understanding.
Understanding of Encryption
Knowledge and understanding of different encryption algorithms and their roles in security.
Exemplary
4 PointsExplains encryption algorithms in detail, analyzing their strengths and limitations with clarity and insight.
Proficient
3 PointsExplains encryption algorithms, analyzing their strengths and limitations effectively.
Developing
2 PointsDescribes encryption algorithms with basic analysis of strengths and limitations.
Beginning
1 PointsStruggles to explain encryption algorithms, minimal understanding shown.
Application of Security Tools
Evaluating students’ ability to apply security tools such as firewalls and intrusion detection systems in designing network models.Designing Secure Network Models
Ability to design a secure network model incorporating encryption, firewalls, and IDS.
Exemplary
4 PointsDesigns a highly secure network model with innovative use of encryption, firewalls, and IDS.
Proficient
3 PointsDesigns a secure network model using encryption, firewalls, and IDS effectively.
Developing
2 PointsDesigns a basic network model with limited use of security features.
Beginning
1 PointsStruggles to design a secure network model, limited use of security features.
Application of Firewall and IDS
Effectiveness in applying firewall and IDS tools in safeguarding networks.
Exemplary
4 PointsApplies firewall and IDS tools innovatively and effectively to safeguard networks.
Proficient
3 PointsApplies firewall and IDS tools effectively to safeguard networks.
Developing
2 PointsApplies firewall and IDS tools with limited effectiveness.
Beginning
1 PointsStruggles to apply firewall and IDS tools effectively.
Critical Analysis and Problem Solving
Assessment of students’ ability to critically evaluate and propose solutions for mitigating vulnerabilities.Evaluating and Proposing Security Solutions
Capability to analyze software vulnerabilities and propose effective mitigation strategies.
Exemplary
4 PointsCritically evaluates vulnerabilities and proposes innovative, effective mitigation strategies.
Proficient
3 PointsEvaluates vulnerabilities and proposes effective mitigation strategies.
Developing
2 PointsIdentifies vulnerabilities with basic proposal of mitigation strategies.
Beginning
1 PointsStruggles to evaluate vulnerabilities, lacks effective proposals.