Exploring Cyber Challenges in the Classroom
Within the Optus Cyber Security Experience there are a range of cyber challenges found in the “Field Trips” tab of the dashboard that are ready for use in the classroom. The challenges can be completed individually or in pairs, in the classroom or for homework.
- Requirements: Device with internet connection, individual student registration with the Optus Cyber Security program – REGISTER HERE
- Age: Suitable for Years 8-12
- Time: 40 mins for all challenges (can be completed as individual tasks)
- Answers: Hints are available in the program or a Teacher’s Answers Guide is available on the Optus Cyber Security teacher dashboard.
Name | Understanding malware |
Context | The Optus Cyber Response team are always on the lookout for new and evolving types of malware that could infect their or their customers computer systems. |
Activity | Identifying and match different malware with their definitions. |
Skills | Digital literacy, matching terms |
Difficulty | 2/5 |
Time | 5 minutes |
Name | Cracking passwords |
Context | The Optus Cyber Response team have obtained password dumps storing hacker passwords. After obtaining a few plaintext passwords, it appears that they are all encoded using different number bases. |
Activity | Learn how to decode passwords by recognising their number bases |
Skills | Extension Maths |
Difficulty | 5/5 |
Time | 10 minutes |
Name | ASOC network operator |
Context | The Network Operator in the Optus Cyber Response team ensures the network is secure so that all Optus operations can be performed with confidence. |
Activity | Read and follow a list of commands to answer questions. |
Skills | Reading, digital literacy, following commands |
Difficulty | 3/5 |
Time | 5 minutes |
Name | Email headers |
Context | The Optus Cyber Response team found a strange raw email message on their computer systems. Optus’ VP of Security Research thinks it could provide valuable insight into the identity of the people perpetrating the cyber attack. |
Activity | Read and decipher computer code to answer questions about information in the email header file. |
Skills | Reading, comprehension |
Difficulty | 3/5 |
Time | 5 minutes |
Name | Log analysis |
Context | A log file showing suspicious activity was collected by the Optus Cyber Response team performing forensics at the customer site. The ASOC Director believes the file can provide valuable insight on the attack being made at the company. |
Activity | Analyze the code in a log file to determine the answer to security questions. |
Skills | Data analysis , Reading, comprehension |
Difficulty | 4/5 |
Time | 10 minutes |
Name | Cyber risk assessment |
Context | The job of the Cyber Risk Consultant is to gather technical needs and determine the security risk profile of the client. Her team regularly performs security configuration reviews, penetration testing, risk assessment and personnel training on the cyber security issues at-hand. |
Activity | Identifying and match terms with their definitions. |
Skills | Word matching exercise |
Difficulty | 2/5 |
Time | 5 minutes |
Leave a Comment