profile-pic
GWU GenCyber Camp 2023
June 26-30, 2023 (remote)

The George Washington University GenCyber Camp is a free, virtual day camp for middle schoolers in historically underrepresented groups in STEM, funded by the National Security agency and the National Science Foundation. It plays a very important role in the K-12 Cybersecurity ecosystem, including the development of cyber-aware citizens and the pipeline to professional development. The camp uses a combination of small, collaborative groupings and single camper activities to ensure that campers at various levels of computing expertise are supported (i.e. in teams) and challenged (i.e. solo activities).

About Us


Camp Director


profile-pic

Dr. Kinga Dobolyi joined GWU in the fall of 2021, having previously taught computer science at George Mason University for eight years. Her interests in computer science education focus on how to retain and increase the number of students in such courses, especially under-represented groups, via techniques such as self-pacing, active learning, test-driven development, automated feedback, student-led discussions, and focusing on non-traditional computer science applications. She has also worked in industry as a data scientist at a startup, and as an applied deep learning researcher at the non-profit IQT Labs, specializing in biomedical applications of computer vision and NLP. Her current research interests include automated testing for deep learning models and characterizing uncertainty in research on emerging infectious diseases.

Contact: gwgencybercamp2023@gwu.edu

Curriculum Designer


profile-pic

Dr. Portia Pusey loves technology. For work, she leads projects that help people use technology to teach and learn better. Cybersecurity is important to Portia because she wants to help our nation’s citizens to learn how to make the places where we all work, learn, and play safer. Employers and our government need people trained to do cybersecurity jobs; Portia enjoys providing opportunities to learners of every age to experience the work of the many different types of cybersecurity workers.

Camp Teachers


Stephanie Allen

Camp Teachers


Lisa Wenzel

Applications


Applications will be open until June 1, 2023. Please complete this google form, along with a letter of recommendation from an educator or school staff (under five sentences).

Please email the recommendation to gwgencybercamp2023@gwu.edu after you have completed the google form.

Information for Parents
  • The application requires a short statement from your child, so please ask your child to complete the application in their own words. We understand that their comments may not be completely polished, but our experience has shown that when the applications are written by the potential campers in their own words, the campers who are selected are more dedicated to coming to camp EVERY day. This statement can be a short written essay, a poem, or a drawing.
  • The pre-camp outreach event and post-camp activities (about two hours each, remote) will take place on the following six Saturdays: June 10, August 26, September 23, October 21, November 4, December 2.
  • We will also host a (likely in-person) camp reunion on Saturday September 2.
  • We will provide materials and snacks to the selected campers.
  • Each camper will receive micro:bits for use during the camp. The micro:bit will come with a USB cable to connect to your device. If you have a device that does not have a USB port, you may need an adapter to connect the USB ‘plug’ to your device. Another option is to pair via Bluetooth, but this option is not recommended because troubleshooting is challenging in the virtual environment.

Daily Itinerary


Monday


Theme of the day: Keep it simple
Career:

Information Security (Confidentiality)

8:45-9:00:

Early Arrival/Chat with new friends

9:00-12:10:

Introductions; What is cybersecurity, ethics, and networks; group and team work

12:10-1:10:

Lunch

1:10-1:40:

Career Speaker

1:40-3:40:

Using Microbit; What’s it all about

3:50-4:20:

Wrap up



Tuesday


Theme of the day: Cryptography (Availability)
Career:

Cryptographer

8:45-9:00:

Early Arrival/Chat with new friends

9:00-12:10:

Cryptography; group and team work; Virtual visit to Cryptological museum

12:10-1:10:

Lunch

1:10-1:40:

Career Speaker

1:40-3:40:

Using Microbit to generate secret codes

3:50-4:20:

Wrap up



Wednesday


Theme of the day: Networks
Career:

Network Administrator

8:45-9:00:

Early Arrival/Chat with new friends

9:00-12:10:

Networks; group and team work

12:10-1:10:

Lunch

1:10-1:40:

Career Speaker

1:40-3:40:

Using Microbit to form a network

3:50-4:20:

Wrap up



Thursday


Theme of the day: Integrity
Career:

Ethical Hacker

8:45-9:00:

Early Arrival/Chat with new friends

9:00-12:10:

Deep fakes; phishing

12:10-1:10:

Lunch

1:10-1:40:

Career Speaker

1:40-3:40:

Using Microbit: ‘hacking our speaker’ to play music

3:50-4:20:

Wrap up



Friday


Theme of the day: Think Like an Adversary (Defense in Depth)
Career:

General Cybersecurity, Social Responsibility

8:45-9:00:

Early Arrival/Chat with new friends

9:00-12:10:

Social responsibility; complete all projects

12:10-1:10:

Lunch

1:10-1:40:

Career Speaker

1:40-3:40:

Using Microbit

3:50-4:20:

Wrap up, celebration, campers and their parents visit the platform showcasing campers' work

Additional Resources


Day 1: Layering


Learn about the cybersecurity principle layering and about how to secure your passwords

Day 2: Information Hiding


Learn about the cybersecurity principle information hiding and about making sure your firewalls are up and active

Day 3: Encapsulation and extra Morris Worm


Learn about the cybersecurity principle encapsulation and solve some fun cryptographic puzzles and challenges

Extra Morris Worm: In this activity you will have a chance to read about a cyber-crime that took place in the early days of the internet. The story is in 4 chapters. Each chapter, except the first one, has a code word protecting it. When you finish reading the first chapter, you will notice there is a code word at the bottom. You will have to decode the cipher and use the word you figure out to open the next section. Each chapter, (Chapter 2, 3 and 4), requires a code word to open it. I will give you one clue – each code word is related to one of the 10 principles of cybersecurity.

Morris Worm Chapter 1
Morris Worm Chapter 2
Morris Worm Chapter 3
Morris Worm Chapter 4

Day 4: Modularity


Learn about the cybersecurity principle modularity and security updates for your mobile devices and computers

Day 5: Domain Separation


Learn about the cybersecurity principle domain separation and check to see if you have an account that has been breached

Day 6: Process Isolation


Learn about the cybersecurity principle process isolation and check the security settings on your browser

Day 7: Least Privilege


Learn about the cybersecurity principle least privilege and check to be sure your app settings on your mobile devices are not giving away too much information about you

Day 8: Abstraction


Learn about the cybersecurity principles abstraction and simplicity of design and review the simple steps to protect your identity and data
Unless otherwise indicated, the content and opinions expressed on this web site are those of the author(s). They are not endorsed by and do not necessarily reflect the views of the George Washington University.