Foundation of Cybersecurity: Period 1

*********
*********
*********
*********
Due Date: Friday October 21, 2022

Exam Practice

Click and practice Week 2 of Cyber terms.





*********
*********
*********
*********
Due Date: Friday October 21, 2022

Lesson 11

Overview
In this lesson, students use variables and conditionals to
create a Tug O’ War game on the micro: bit using Python.
Objectives
• Explain where for loops happen in real world situations
• Implement for and while loops into a program
• Program the micro:bit® to create 2-Player tug-o-war
game
Materials
• micro:bit and micro-USB cord
• Computer with access to the internet

Click here to check in and check out your Micro:Bit

Click here to launch the micro:bit python interpreter.

Tug o War Instructions. Click here.

Click here for the Tug o War Sheets to use.


You will be dropping off 2 files into google classroom.
Your file names will be: 
PX_lastname_TugOWar.hex
PX_lastname_TugOWar.py


*********
*********
Due Date: Friday October 21, 2022

Lesson 12

Overview
In this lesson, students use the Bluetooth radio capability
to send and receive data between micro: bits using Python.
Objectives
• Program the microbit using its Bluetooth radio capability
• Send and receive data between Microbits
• Integrate random numbers into a Microbit program
Materials
• micro:bit and micro-USB cord
• Computer with access to the internet

Click here to check in and check out your Micro:Bit

Click here to launch the micro:bit python interpreter.

Blue tooth communication Instructions. Click here.


You will be dropping off 2 files into google classroom.
Your file names will be: 
PX_lastname_BlueTooth.hex
PX_lastname_BlueTooth.py


**********************************
Due Date: Friday October 21, 2022

Lesson 13

Overview
In this lesson, students use the Bluetooth radio capability
to transmit encoded messages.
• Program the microbit using its Bluetooth radio capability
• Send and receive data between two see if other can decode it.
Resources
• micro:bit and micro-USB cord
• Computer with access to the internet
Steps
• Mr. Cusack will give you a message to send to your teammate.
• Mr. Cusack will give you a message to your teammate to send to you.
• You will need to use Caeser Cypher to encode the message.
• The other teams will listen and see if they can determine what the message is.

Get some notebook paper and put your heading on it.

Part 1
Example of a message I got:
Joe  - The meaning of life is to give life meaning
Create a Caeser Cipher for this:

Click here to find out how to do a Caeser Cipher.

Part 2 (Practice on the Board)
We will practice the Caeser Cipher again.
Click here to decrypted this message.

Tools to help you break a Ceaser Cipher. Letter occurance in text. Click here.

Part 3 (Write a program as a group)

Ideas to break the Caeser Cipher.
(All Students will work on this together)
(You may want to use Python)
Iterate through the offset options until the data makes sense (using a simple Python program). There are normally only 26 options.
Any letter will have the same encrypted value no matter where it is in the text. So simply use probability. For example: e is the most common letter in English, so find the most common encrypted letter and that’s probably e. Then you can find the offset and decrypt the entire message.
Predict original content based on the spacing and length of the words. If you find even one letter then you can get the offset and decrypt the entire message.

We use the repl.it online Python IDE (Integrated Development Environment) for 
more complex and longer python program problems.

The link to the repl.it online Python IDE (Integrated Development Environment) is on the next line.

  • Click here to use the online python compiler and IDE.