The George Washington University GenCyber Camp is a free, virtual day camp for middle schoolers in historically underrepresented groups in STEM, funded by the National Security agency and the National Science Foundation. It plays a very important role in the K-12 Cybersecurity ecosystem, including the development of cyber-aware citizens and the pipeline to professional development. The camp uses a combination of small, collaborative groupings and single camper activities to ensure that campers at various levels of computing expertise are supported (i.e. in teams) and challenged (i.e. solo activities).
Camp Director |
Dr. Kinga Dobolyi joined GWU in the fall of 2021, having previously taught computer science at George Mason University for eight years. Her interests in computer science education focus on how to retain and increase the number of students in such courses, especially under-represented groups, via techniques such as self-pacing, active learning, test-driven development, automated feedback, student-led discussions, and focusing on non-traditional computer science applications. She has also worked in industry as a data scientist at a startup, and as an applied deep learning researcher at the non-profit IQT Labs, specializing in biomedical applications of computer vision and NLP. Her current research interests include automated testing for deep learning models and characterizing uncertainty in research on emerging infectious diseases.
|
Curriculum Designer |
Dr. Portia Pusey loves technology. For work, she leads projects that help people use technology to teach and learn better. Cybersecurity is important to Portia because she wants to help our nation’s citizens to learn how to make the places where we all work, learn, and play safer. Employers and our government need people trained to do cybersecurity jobs; Portia enjoys providing opportunities to learners of every age to experience the work of the many different types of cybersecurity workers. |
Camp Teachers |
Stephanie Allen |
Camp Teachers |
Lisa Wenzel |
MondayTheme of the day: Keep it simple |
|
Career: | Information Security (Confidentiality) |
8:45-9:00: | Early Arrival/Chat with new friends |
9:00-12:10: | Introductions; What is cybersecurity, ethics, and networks; group and team work |
12:10-1:10: | Lunch |
1:10-1:40: | Career Speaker |
1:40-3:40: | Using Microbit; What’s it all about |
3:50-4:20: | Wrap up |
TuesdayTheme of the day: Cryptography (Availability) |
|
Career: | Cryptographer |
8:45-9:00: | Early Arrival/Chat with new friends |
9:00-12:10: | Cryptography; group and team work; Virtual visit to Cryptological museum |
12:10-1:10: | Lunch |
1:10-1:40: | Career Speaker |
1:40-3:40: | Using Microbit to generate secret codes |
3:50-4:20: | Wrap up |
WednesdayTheme of the day: Networks |
|
Career: | Network Administrator |
8:45-9:00: | Early Arrival/Chat with new friends |
9:00-12:10: | Networks; group and team work |
12:10-1:10: | Lunch |
1:10-1:40: | Career Speaker |
1:40-3:40: | Using Microbit to form a network |
3:50-4:20: | Wrap up |
ThursdayTheme of the day: Integrity |
|
Career: | Ethical Hacker |
8:45-9:00: | Early Arrival/Chat with new friends |
9:00-12:10: | Deep fakes; phishing |
12:10-1:10: | Lunch |
1:10-1:40: | Career Speaker |
1:40-3:40: | Using Microbit: ‘hacking our speaker’ to play music |
3:50-4:20: | Wrap up |
FridayTheme of the day: Think Like an Adversary (Defense in Depth) |
|
Career: | General Cybersecurity, Social Responsibility |
8:45-9:00: | Early Arrival/Chat with new friends |
9:00-12:10: | Social responsibility; complete all projects |
12:10-1:10: | Lunch |
1:10-1:40: | Career Speaker |
1:40-3:40: | Using Microbit |
3:50-4:20: | Wrap up, celebration, campers and their parents visit the platform showcasing campers' work |
Day 1: Layering |
Learn about the cybersecurity principle layering and about how to secure your passwords |
Day 2: Information Hiding |
Learn about the cybersecurity principle information hiding and about making sure your firewalls are up and active |
Day 3: Encapsulation and extra Morris Worm |
Learn about the cybersecurity principle encapsulation and solve some fun cryptographic puzzles and challenges Extra Morris Worm: In this activity you will have a chance to read about a cyber-crime that took place in the early days of the internet. The story is in 4 chapters. Each chapter, except the first one, has a code word protecting it. When you finish reading the first chapter, you will notice there is a code word at the bottom. You will have to decode the cipher and use the word you figure out to open the next section. Each chapter, (Chapter 2, 3 and 4), requires a code word to open it. I will give you one clue – each code word is related to one of the 10 principles of cybersecurity. Morris Worm Chapter 1 Morris Worm Chapter 2 Morris Worm Chapter 3 Morris Worm Chapter 4 |
Day 4: Modularity |
Learn about the cybersecurity principle modularity and security updates for your mobile devices and computers |
Day 5: Domain Separation |
Learn about the cybersecurity principle domain separation and check to see if you have an account that has been breached |
Day 6: Process Isolation |
Learn about the cybersecurity principle process isolation and check the security settings on your browser |
Day 7: Least Privilege |
Learn about the cybersecurity principle least privilege and check to be sure your app settings on your mobile devices are not giving away too much information about you |
Day 8: Abstraction |
Learn about the cybersecurity principles abstraction and simplicity of design and review the simple steps to protect your identity and data |