This summer project, spanning approximately three months, aimed to develop threat modeling scenarios that are relatable to high school students to personalize their learning of Identity and Access Management (IAM) technologies. The project design included group brainstorming to identify threat scenarios most suitable for classroom instruction that appeal to students’ everyday contexts. Specifically, we aimed to identify threat and attack scenarios that students may regularly face (or are familiar with) related to IAM, like password attacks through shoulder surfing from a classmate or use of biometrics on smartphones. Our hypothesis was that by personalizing learning in this way, student engagement and learning will be positively impacted, as opposed to relying on existing teaching strategies that do not produce consistently positive learning outcomes.
This study was approved by USF's Institutional Review Board as Study #005606, and was funded by NSF's Secure and Trustworthy Cyberspace Program, Grant #2039373.
Threat modeling is a process that allows us to identify and understand security threats [12]. By modeling threats, we gain a better sense of how to attack or defend a given system. In terms of teaching cybersecurity, threat modeling provides a way for teachers to give students a real-life scenario to engage with.
With the rise of technology, as well as the ethical considerations that come along with it, teachers are having to explain cybersecurity and other related topics to their students [4]. Unfortunately, there is strong evidence to suggest that teachers are having a hard time implementing this curriculum into their classes [2, 3, 4]. Teachers in the Killhoffer study were noted to be worried about a perceived gap in knowledge when faced with the tech-savvy nature of their students, regardless of if this divide was real or not. The Childers study revealed that teachers didn’t feel comfortable in their abilities to create an engaging lesson about cybersecurity, even after they had undergone the professional development course.
The consensus, among teachers and parents, is that it’s important to educate students on these topics [3], but there are differing views over how it should actually be done. Whether it should be game based [6, 7, 10], a hands-on simulation activity (like a lab or project) [5, 8, 9, 11], or just some sort of engaging learning experience [2, 4]. Furthermore, most of these studies take place as a summer program, rather than being implemented within the school system itself [5, 6, 8, 10], or are just tested in the classroom for a short period of time [7]. Even though student enjoyment was had a statistically significant increase with these programs, without knowing how their learning is impacted in the long-term it’s difficult to accurately evaluate the activity’s worth.
This project takes into consideration the student aspect of the cybersecurity learning scenario. We consider the preconceived notions that high-school students might have about cybersecurity and Internet safety, and how we can better adapt the lessons to be more engaging and relatable. We also have them generate their own ideas for activities, which allows them to come up with ideas that other students might be eager to participate in.
Principal Investigator Assistant Professor Computer Science and Engineering University of South Florida
Study Facilitator Computer Science Teacher Winthrop College Prep Academy
Study Facilitator Undergraduate Researcher, Computer Science University of South Florida
Ten undergraduate students were recruited for this study through various channels, including:
Additionally, study flyers were shared with our established collaborators for dissemination to potential participants and were made available in the university student center. Eight participants reported enrollment in the Computer Science and Engineering program, with two individuals also enrolled in Medical Engineering, all of whom are affiliated with the University of South Florida's College of Engineering.
Each participant completed a Cybersecurity Knowledge Quiz prior to participating in the study to assess their overall cybersecurity awareness. This was important to ensure each participant could effectively participate in discussion during the study.
Each participant received:
Age | Gender | Ethnicity | Program Year | Cybersecurity Quiz Score | Relevant Cybersecurity Courses |
20 | Man | Asian or Asian American | Sophomore | 90% | Programming Concepts, Python, Program Design |
19 | Woman | White or Caucasian | Sophomore | 90% | AP Comp Sci, Intro to Oriented Programming, Intro to Databases, Programming Fundamentals, Foundations of Cybersecurity |
19 | Woman | Asian or Asian American | Sophomore | 90% | Programming Concepts |
21 | Man | Asian or Asian American | Junior | 100% | Intro to Python |
20 | Man | Arab/Middle Eastern or Arab American, Asian or Asian American | Freshman | 90% | Intro to Python, Google Cybersecurity Certificate, Programming Concepts, Intro to Web Development |
21 | Man | Asian or Asian American | Senior | 100% | Program Design, Data Structures, Database Design |
20 | Man | White or Caucasian, Hispanic, Latino, or Spanish | Sophomore | 70% | Programming Concepts, Program Design, Computer Logic Design, Python, C\#, C++ |
20 | Man | Asian or Asian American | Junior | 60% | Computer Programming |
20 | Woman | Asian or Asian American | Junior | 80% | Programming Concepts, Program Design, Computer Organization |
22 | Man | White or Caucasian | Senior | 100% | Intro to Programming, Programming Fundamentals, IT Object Oriented Programming, IT Concepts, Foundations of Cybersecurity |
Participant and Engagement Summary: Prior to engaging in the study, each participant completed a Cybersecurity Knowledge Quiz to gauge their overall awareness in the field, ensuring their active involvement in subsequent discussions. The demographic profile of participants reveals a diverse group with varying levels of cybersecurity exposure and expertise. Notably, participants demonstrated strong proficiency in foundational programming concepts, with several individuals having completed relevant cybersecurity courses. The distribution of quiz scores indicates a spectrum of cybersecurity knowledge among participants, suggesting differing starting points for engagement with the study's objectives. These demographics serve as a foundational understanding for interpreting the insights and contributions gathered throughout the study sessions, reflecting a broad spectrum of perspectives and experiences within the cohort.
Each brainstorming session consisted of:
Lunch was served at the start of the session. Participants were welcomed to continue eating during the study overview, during which the study facilitators presented a slide deck which detailed the study goals, provided an ice breaker, defined fundamental concepts, and established a schedule for the day.
During brainstorming time, participants broke into two groups, during which they were instructed to generate ideas with the following in mind:
Participants were provided with a wide array of stationary during all sessions, including markers, mini whiteboards and dry erase markers, pens, paper pads, sticky notes, index cards, and stickers. During discussion, each group would present their ideas and the whole team would reflect and discuss commonalities and the research team would ask questions to gain clarity.
We organized the sessions to scaffold the participants’ thought processes by first asking them to assess the feasibility of personalized lessons to teach cybersecurity in high school, having participants generate specific lesson plan ideas according to their previously established assessment of feasibility, and then voting on the most promising ideas. We video and audio recorded each session, using two video cameras to focus on each group. Each session, we also photographed design artifacts and collected notes.
The objective of the first brainstorming session was to pinpoint threat modeling scenarios tailored specifically to high school students, aiming to facilitate effective cybersecurity education. The session underscored the importance of making content relatable to teenagers, hypothesizing that crafting narratives and scenarios would enhance engagement and comprehension. We emphasized the potential value of using real-world threats to enhance memorability and relevance. Central to this endeavor was the identification of scenarios pertinent to Identity and Access Management (IAM) and user authentication, vital concepts in cybersecurity education. The session's refined goal was to assess the usefulness of personalized threat scenarios for teaching IAM, with questions probing the benefits of personalization, its impact on learning, and student responses. The ultimate aim was to investigate the efficacy of this approach in the session and strategize its implementation for scenario identification in subsequent sessions.
Overall, Group B highlighted the various benefits of personalizing threat scenarios, emphasizing its importance in cybersecurity education. They felt that by informing students about the potential threats to their personal information and raising awareness of cybersecurity issues, personalized scenarios could significantly increase engagement and promote a deeper understanding of the subject. Moreover, Group B felt that personalized scenarios could inspire students to consider cybersecurity as a career path and encourage them to develop solutions to mitigate risks, such as creating cybersecurity software. Additionally, they argued that personalized scenarios could foster social awareness, enhance training, and empower students to take proactive measures against cyber threats, ultimately contributing to a safer online environment. Notable individual comments from Group B included the following:
Overall outcomes from Brainstorming Session 1 showed general support for the use of personalized threat scenarios for high school students to teach cybersecurity concepts. Real-world threats were highlighted as essential for enhancing memorability and relevance. However, to conclude Session 1, we held a 15-minute open discussion, which yielded further insights from both groups. Group A raised questions about the feasibility of true personalization, emphasizing the need for engaging activities over personalized ones. They highlighted the discrepancy between current personalized approaches and real-world scenarios, suggesting that effective personalization requires a deep understanding of the individual. As a result, their goal for the next session evolved to develop a set of engaging and relevant activities that promote positive and ethical behaviors among students. Group B's final comments in Session 1 centered on the potential negative consequences of personalized content, including the risk of fostering "bad hacking mentalities" and influencing unethical behavior. As an alternative, they proposed introducing concepts like Blue Teams and Bug Bounty Programs to mitigate these risks while making students more aware of cybersecurity issues like phishing emails. Thus, their objective for the next session also evolved to create a set of large problem-solving projects that address cybersecurity challenges on a broader scale.
Why would personalizing threat scenarios be useful? | ||
---|---|---|
Group A | Group B | |
Highest Rated | Makes the information simpler, making it easier for non-experts to understand | Easily available |
It would make the concept or threat scenarios easier t understand. | Not sharing information across platforms | |
Audiences can better understand the risks and severity as they see how it applies in their own lives | Increased engagement rate | |
Useful because it can allow ourselves to be relatable to the audience | It would inform students about the threat to their personal information | |
It forces the individual to be in the scenario, think about how to do better next time | So they know the severity of cyberattacks | |
Personalizing threat scenarios would be useful to make audiences feel more connected with the message | So students are aware it could happen to them | |
Easier to spread information if people care about what they are listening to | Social awareness | |
Facing for the first time is tough. If they experience it before it would be better to face the situation. | Involve more students cybersecurity | |
Teaches them to be more careful | To encourage students to be aware and afraid | |
People would relate to their own experiences | Know about potential threat cyberattacks can pose to them | |
Lowest Rated | Open public servers, risk assessment, or even data breaches leading to information | Know about different types of cyberattacks |