• HILITE NEWS HAS BEEN NAMED A NATIONAL SCHOLASTIC PRESS ASSOCIATION ONLINE PACEMAKER FINALIST
  • HILITE NEWS HAS BEEN NAMED THE HOOSIER STAR WINNER FOR NEWS SITE
  • HILITE NEWS HAS BEEN NAMED A COLUMBIA SCHOLASTIC PRESS ASSOCIATION GOLD CROWN WINNER
Your source for CHS news

HiLite

Your source for CHS news

HiLite

Your source for CHS news

HiLite

Cybersecurity Q&A

Cybersecurity+students+present+their+project+on+artifacts.+Artifacts+are+pieces+of+data+that+the+user+leaves+such+as+system+and+network+logs+and+have+been+the+focus+of+early+cybersecurity+units.+
Submitted Photo: Carey Anderson
Cybersecurity students present their project on artifacts. Artifacts are pieces of data that the user leaves such as system and network logs and have been the focus of early cybersecurity units.

Cybersecurity Teacher Carey Anderson 

What classes do you teach here at CHS?

“I have personally taught Intro to Computer Science (and) Computer Science Principles, which is an AP course. I also teach Cybersecurity, which we (call) our CS3 Capstone class. And that is under Project Lead the Way (PLTW). And then I teach web design and I’ve also taught, in the past, Digital Applications and Responsibilities.”

What concepts are taught in the new cybersecurity class?

“It’s broken down into different units. We are right now focusing on what’s called ‘personal security’… So we really just want to teach students protection. But we also have network security. And then we also teach them the history of cybersecurity.”

How does this class compare to other classes that have been previously taught under computer science?

“Computer Science AP had a small unit and continues to have a small unit in (the area of cybersecurity)… what we’re doing (now) is just really opening up that one idea of cybersecurity because it also helps those people that already have programming experience, because they’re working on virtual machines, and so, basically, toward the end of the class my students will be working on three virtual machines and they’re trying to figure out where the vulnerability (is on those machines).”

Why is the Cybersecurity course being offered now?

“Really, toward universities, there is a huge growth right now in cybersecurity. We (also) realized there’s over 3000 (cybersecurity) jobs open in Indiana right now and they can’t fill them. So there’s a huge need in this area.”

Max Chang, Cyberpatriots co-president and senior

Can you first list the computer science clubs you’re involved in as well as classes you’ve taken in computer science?

The main club that I am involved in is cyberpatriots. I am currently co-president with senior Jinhee Won. I have taken AP Computer Science Principles and am currently in PLTW Cybersecurity.”

How does PLTW Cybersecurity compare to other computer science courses this school offers?

“Cybersecurity offers a larger focus on cryptography and protection measures against malware or malicious actions. There is also a large emphasis on network security, which is different from the usual personal security. In other computer science courses there is a focus on programming but in cybersecurity there is little to no programming done. The majority of the work is enabling secure systems for personal and network devices. Cybersecurity is a lot more personal as well, since a lot of the information learned can be applied to our digital lives’

Ray Mo

What concepts are used in Cyberpatriot club and how do those competitions work?

“Cyberpatriots is a national competition sponsored by the U.S. Air Force. For the majority of the competition, we are given virtual machines by cyberpatriots. These virtual machines are basically a computer inside a computer. So within your computer, you have another system. Within that system, there are security vulnerabilities that we have to solve, and for each one that we solve, we get a certain number of points. For the competition, we have Linux and Windows systems where we have to solve the vulnerabilities. The third part of the competition is Cisco or network vulnerabilities. For Cisco, you have to solve a packet tracer which is basically a network, and fixes the network so everything is connected. The concepts that we use are mainly in the area of cryptography and operational security.”

Leave a Comment
Donate to HiLite
$20
$500
Contributed
Our Goal

Comments (0)

All HiLite Picks Reader Picks Sort: Newest

Your email address will not be published. Required fields are marked *