Digital Fortress Challenge: Secure Network Design
Created byAlicia Pipkins
19 views0 downloads

Digital Fortress Challenge: Secure Network Design

Grade 9Computer Science5 days
5.0 (1 rating)
The 'Digital Fortress Challenge: Secure Network Design' guides ninth-grade students through the process of creating robust network models that resist cyber threats. Students explore how hackers attack networks and learn to implement securities like encryption, firewalls, and intrusion detection systems to defend against these threats. Projects such as the 'Encryption Puzzle Challenge' and 'Firewall Defender Game' deepen understanding and practical skills in network security, culminating in students designing a detailed and secure network architecture. This project enhances problem-solving skills, critical analysis, and understanding of cybersecurity strategies in complex real-world scenarios.
Network SecurityEncryptionFirewallsCyber ThreatsIntrusion DetectionHacking PreventionSecure Architecture
Want to create your own PBL Recipe?Use our AI-powered tools to design engaging project-based learning experiences for your students.
📝

Inquiry Framework

Question Framework

Driving Question

The overarching question that guides the entire project.How can we design a secure network model that effectively resists hacking attempts while addressing vulnerabilities, and what strategies and technologies can be leveraged to enhance its resilience? Develop a solution that incorporates encryption, firewalls, and intrusion detection systems to mitigate risks associated with software vulnerabilities and cyber threats.

Essential Questions

Supporting questions that break down major concepts.
  • How do hackers infiltrate computer networks, and what techniques are used to prevent these intrusions?
  • What are the fundamental principles of designing a secure network architecture?
  • How does encryption contribute to network security, and what are its limitations?
  • What role do firewalls and intrusion detection systems play in safeguarding networks against cyber threats?
  • How do vulnerabilities in software lead to security breaches, and how can they be mitigated?

Standards & Learning Goals

Learning Goals

By the end of this project, students will be able to:
  • Understand and describe the fundamental security issues leading to compromised computer programs.
  • Design a secure network model incorporating encryption, firewalls, and intrusion detection systems to enhance resilience to hacking.
  • Evaluate the effectiveness of different security technologies and strategies in preventing network intrusions.
  • Explore the principles of secure network architecture to protect against cyber threats.
  • Analyze software vulnerabilities and propose strategies to mitigate related security breaches.

CSTA K-12 Computer Science Standards

L2.AP.PD.06
Primary
Explain security issues that might lead to compromised computer programs.Reason: The project requires students to identify and explain various security issues, particularly those leading to compromised programs which align with the task of designing a resilient network.

NGSS

HS-ETS1-2
Primary
Design a solution to a complex real-world problem by breaking it down into smaller, more manageable problems that can be solved through engineering.Reason: The project involves designing a network model that resists hacking, which requires engineering solutions to complex problems, aligning well with the standard.

Computer Science Teachers Association

9-12.CT.cs.03
Secondary
Evaluate solutions to a complex real-world problem in terms of feasibility, trade-offs, and constraints.Reason: Aligns with the need to assess the feasibility of network security measures while considering trade-offs, an essential part of the project.

IT Career Cluster

IT.5.3
Supporting
Use appropriate tools and techniques to diagnose IT problems or find assistance from IT professionals.Reason: Relates to employing various security tools and techniques, such as encryption and firewalls, a central theme of the project.

Entry Events

Events that will be used to introduce the project to students

Mystery Box: The Hacker’s Toolbox

Students receive a mystery box filled with various tools and clues symbolizing hacker techniques and technologies. They explore each item to infer how it could be used for either defensive or offensive purposes, blurring the line between hacking and cybersecurity and sparking curiosity.
📚

Portfolio Activities

Portfolio Activities

These activities progressively build towards your learning goals, with each submission contributing to the student's final portfolio.
Activity 1

Encryption Puzzle Challenge

Students will explore different encryption techniques and analyze their role and limitations in network security.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Research various encryption algorithms like AES, RSA, and DES.
2. Solve encryption-based puzzles to understand the functioning of these algorithms.
3. Discuss the strengths and weaknesses of each encryption technique with classmates.

Final Product

What students will submit as the final product of the activityA report discussing encryption techniques and personal experiences solving related puzzles.

Alignment

How this activity aligns with the learning objectives & standardsAddresses the learning goal of understanding encryption's role in network security.
Activity 2

Firewall Defender Game

Students will learn the functionality of firewalls and intrusion detection systems (IDS) by engaging in a simulation game that challenges their ability to safeguard a network.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Study the principles behind firewalls and IDS, including how they detect and prevent unauthorized access.
2. Participate in a simulated game where students act as 'defenders' setting up firewall rules and monitoring IDS alerts.
3. Reflect on how these tools contribute to a comprehensive security strategy.

Final Product

What students will submit as the final product of the activityA reflection essay on the experience of defending a network using firewalls and IDS in simulations.

Alignment

How this activity aligns with the learning objectives & standardsRelates to the use of security tools as described by IT.5.3.
Activity 3

Vulnerability and Mitigation Workshop

Students will analyze real-world software vulnerabilities and brainstorm strategies to mitigate security breaches.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Research recent high-profile software vulnerabilities and their impact on security.
2. Collaborate in groups to design mitigation strategies for these vulnerabilities.
3. Present findings and solutions in a workshop format to peers.

Final Product

What students will submit as the final product of the activityGroup presentations proposing solutions to mitigate selected software vulnerabilities.

Alignment

How this activity aligns with the learning objectives & standardsSupports 9-12.CT.cs.03 by evaluating and proposing feasible security solutions.
Activity 4

Hacker's Detective Notebook

Students will investigate different types of security threats that might compromise computer programs, emphasizing the importance of understanding hacking techniques.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Research and list common computer security issues and hacking techniques.
2. Identify how these techniques can lead to compromised computer programs.
3. Record findings in a detective notebook, categorizing information under 'Offensive' and 'Defensive' strategies.

Final Product

What students will submit as the final product of the activityA detailed detective notebook categorizing security threats and potential mitigations.

Alignment

How this activity aligns with the learning objectives & standardsCovers L2.AP.PD.06 by explaining security issues leading to compromised programs.
Activity 5

Network Security Architect

Students will design a secure network model that incorporates key security features like encryption and firewalls to protect against hacking.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Draft a concept map of a network, identifying possible entry points for intrusion.
2. Research and decide on encryption methods and firewall configurations to include in the design.
3. Create a detailed blueprint of a secure network model that includes all chosen security features.

Final Product

What students will submit as the final product of the activityA comprehensive network model blueprint with identified security measures.

Alignment

How this activity aligns with the learning objectives & standardsAligns with HS-ETS1-2 by designing a solution to a complex problem in network security.
🏆

Rubric & Reflection

Portfolio Rubric

Grading criteria for assessing the overall project portfolio

Digital Fortress Security Challenge Rubric

Category 1

Understanding Security Principles

Assessing students' comprehension of fundamental network security issues, encryption, and security tools.
Criterion 1

Explains Security Issues

Ability to understand and articulate security issues leading to compromised computer programs.

Exemplary
4 Points

Thoroughly explains various security issues, demonstrating sophisticated understanding with comprehensive examples.

Proficient
3 Points

Explains multiple security issues, demonstrating a thorough understanding with clear examples.

Developing
2 Points

Explains some security issues, showing emerging understanding with basic examples.

Beginning
1 Points

Struggles to explain security issues, demonstrating minimal understanding.

Criterion 2

Understanding of Encryption

Knowledge and understanding of different encryption algorithms and their roles in security.

Exemplary
4 Points

Explains encryption algorithms in detail, analyzing their strengths and limitations with clarity and insight.

Proficient
3 Points

Explains encryption algorithms, analyzing their strengths and limitations effectively.

Developing
2 Points

Describes encryption algorithms with basic analysis of strengths and limitations.

Beginning
1 Points

Struggles to explain encryption algorithms, minimal understanding shown.

Category 2

Application of Security Tools

Evaluating students’ ability to apply security tools such as firewalls and intrusion detection systems in designing network models.
Criterion 1

Designing Secure Network Models

Ability to design a secure network model incorporating encryption, firewalls, and IDS.

Exemplary
4 Points

Designs a highly secure network model with innovative use of encryption, firewalls, and IDS.

Proficient
3 Points

Designs a secure network model using encryption, firewalls, and IDS effectively.

Developing
2 Points

Designs a basic network model with limited use of security features.

Beginning
1 Points

Struggles to design a secure network model, limited use of security features.

Criterion 2

Application of Firewall and IDS

Effectiveness in applying firewall and IDS tools in safeguarding networks.

Exemplary
4 Points

Applies firewall and IDS tools innovatively and effectively to safeguard networks.

Proficient
3 Points

Applies firewall and IDS tools effectively to safeguard networks.

Developing
2 Points

Applies firewall and IDS tools with limited effectiveness.

Beginning
1 Points

Struggles to apply firewall and IDS tools effectively.

Category 3

Critical Analysis and Problem Solving

Assessment of students’ ability to critically evaluate and propose solutions for mitigating vulnerabilities.
Criterion 1

Evaluating and Proposing Security Solutions

Capability to analyze software vulnerabilities and propose effective mitigation strategies.

Exemplary
4 Points

Critically evaluates vulnerabilities and proposes innovative, effective mitigation strategies.

Proficient
3 Points

Evaluates vulnerabilities and proposes effective mitigation strategies.

Developing
2 Points

Identifies vulnerabilities with basic proposal of mitigation strategies.

Beginning
1 Points

Struggles to evaluate vulnerabilities, lacks effective proposals.

Reflection Prompts

End-of-project reflection questions to get students to think about their learning
Question 1

How did your understanding of encryption techniques evolve through the 'Encryption Puzzle Challenge', and what limitations in encryption did you discover?

Text
Required
Question 2

Rate your confidence in using firewalls and intrusion detection systems as effective security measures after participating in the 'Firewall Defender Game'.

Scale
Required
Question 3

What new insights have you gained about mitigating software vulnerabilities after the 'Vulnerability and Mitigation Workshop' and how could these influence your future approach to cybersecurity?

Multiple choice
Required
Options
I learned new technical skills and strategies
I developed stronger problem-solving approaches
I gained a better understanding of cybersecurity impacts
Question 4

How has developing a 'Hacker's Detective Notebook' influenced your perception of offensive and defensive cybersecurity strategies?

Text
Required
Question 5

Evaluate the comprehensiveness of your network model designed in the 'Network Security Architect' project. What challenges did you face in integrating security measures, and how did you overcome them?

Text
Required