Musings in STEM Education
  • Home
  • Research Spring 2017
    • Research Paperwork and Resources
    • Reading
  • Foundations Spring 2017
    • Nested Loop Challenge
    • Random Challenges
    • String and List Challenges
    • Mock Create PT Challenges
  • Research Fall 16
  • Foundations 2016
  • Algebra II Spr 16
  • Research Spr 16
  • Found of Engineering and Tech
  • Differentiation Strategies
    • Artifacts
    • Class Standards
    • Reflections
  • Research Fall 2015
  • VTB ICM
  • FOET Student Blogs
    • Marcos P.
    • Vinny P.
    • Rebecca S.
    • Jerome S.
    • Andrew S.
    • Zach Y.
    • Daniel Z.
    • Shayan B.
    • Mariah B.
    • Eddie C.
    • Eli H.
    • Ben Ha.
    • Ben Ho.
    • Nick H.
    • Raymond J.
    • Andrew K.
    • Andrew M.
    • Sejal P.
    • Abhi P.
    • Adam P.
    • Erica R.
    • Avni S.
    • Ethan S.
    • Stephen S.
    • Alex T.
    • Hanna W.
  • STEM Workshop Research Notebook Blogs
    • Research Notebook User 1
    • Research Notebook User 2
    • Research Notebook User 3
    • Research Notebook User 4
    • Research Notebook User 5
    • Research Notebook User 6
    • Research Notebook User 7
    • Research Notebook User 8
    • Research Notebook User 9
    • Research Notebook User 10
    • Research Notebook User 11
    • Research Notebook User 12
    • Research Notebooks User 13
    • Research Notebook User 14
    • Research Notebook User 15
    • Research Notebook User 16
    • Research Notebook User 17
    • Research Notebook User 18
    • Research Notebook User 19
    • Research Notebook User 20
  • WHS Girls' Lax
  • FOET Spr15
  • Research Spr15
  • IDD Spr15
  • Research
  • Intro to Drafting and Design
  • Architectural Drawing and Design I
  • Student Blogs
    • Kevin
    • Forrest
    • Sarfarez
    • Thomas
    • Rachel
    • Parth
    • Dani
    • Derek
    • Virinchi
    • Anusha
    • Alex
    • Melam
    • Jeet
    • Pranav
    • Tarun
    • Jeffery
    • Assata
    • Justin
    • Kristin
    • Mary
    • Udo
    • Praveen
    • Carter
    • Clay
    • Adie
    • Christian
    • Luke
    • Colin
  • About
  • Untitled

foundations 2016

crypotography

8/29/2016

0 Comments

 
Day 1: Tuesday, August 30
What is it, and why do we need it?
Explore cryptography.
Enigma Machine    What was it's flaw?
The Moral Dilemma
Assignment:  Find an article from WWII to today about military cryptography issues, methods, concerns and/or programs.  Make sure you find a reputable source - peer-reviewed or via CARS.  Use the Impact Research Summary sheet to document and summarize your reading.  In the citation space, provide an APA Citation, along with a notation of reputability.  Due Thursday at the beginning of class.

Tuesday TOTD: Using a Ceasar's Cypher, encrypt a message to any key of your choice on an index card.  On a second card, write it's solution and key.  Make sure your name is on both index cards.
Day 2: Wednesday, Aug 31
How fast can you decode?
Modern Techniques: Alice and Bob and PKE
Explore Modern Cryptography
In your Abstraction Notebook, date and title the next available page as "Research Notes, Cybersecurity."
Using the resources above and below:
  1. Draw a diagram of Alice, Bob and Eve -- label each as to their analogy to enryption
  2. Explain what is mean by the "key" of an encryption algorithm
  3. Explain what a "back door" is and how/when used or exploited.
  4. Explain biometrics and provide two examples of use.
  5. Explain components of strong passwords; provide samples of weak, medium and strong passwords.
  6. Define the word "credentials" as related to computer security.
  7. Define and diagram HTTPS, public key, private key from the slide on the Carnegie Mellon video.
  8. Create a Venn Diagram comparing Worms/Virus & Trojan Horse.
More resources:
code.org videos
Cyber Safety Resources
Day 3: Thursday Sept 1
With your partner, complete the following for your assigned topic:
  1. Locate, analyze and record the definition and examples of each of the types of attack.
  2. Locate an example of the specific type of attack.
  3. Catalog as possible the impact of the attack on the business, economy, culture and/or society.
  4. Determine measures recommended to combat such attacks and where within the hierarchy of the network or internet such protection is recommended to be executed.
  5. Provide a clear, complete source for all resources used during the project.  
  6. Prepare a presentation of your findings.  You may create a video, powerpoint, prezi or TED Talk.  
Day 4: Friday, Sept 2
Finish up your work with your partner to present next Tuesday.  In addition, make sure your HTML Project 1 is complete and submitted in Google Classroom.  Finally, make sure your working website is ready to be submitted and linked on Tuesday.

In the Cybersecurity section of your webpage, add an overall summary and content from your notes and activities. Include links to articles and videos that you found informative.  Post your article summary and your partner-research presentation.
0 Comments



Leave a Reply.

    AP Exam Registration
    python_quick_reference_sheet.pdf
    File Size: 146 kb
    File Type: pdf
    Download File

    GT Inventure
    AP Exam Practice
    creatept_2016_overview__1_.pdf
    File Size: 154 kb
    File Type: pdf
    Download File

    create-sample-tasks-rubric.pdf
    File Size: 71 kb
    File Type: pdf
    Download File

    create-student-performance_faq.pdf
    File Size: 53 kb
    File Type: pdf
    Download File

    ap-computer-science-principles-course-and-exam-description.pdf
    File Size: 2433 kb
    File Type: pdf
    Download File

    AP Exam Info Link
    AP Exam Pseudo Code Reference:
    examreferencesheet_july2015-25cxxlh.pdf
    File Size: 262 kb
    File Type: pdf
    Download File

    author

    Dr. Kate Maloney has had a long career in research and teaching, including research as a National Science Foundation Post-doc Fellowship, teaching at Georgia Tech, writing the manual for a 40G optical transport system, co-founding a small engineering business, and teaching at Wheeler High School.    #WildcatNation

    Archives

    December 2016
    November 2016
    October 2016
    September 2016
    August 2016
    July 2016

    Categories

    All

    RSS Feed

Proudly powered by Weebly