... | ... | @@ -9,40 +9,36 @@ |
|
|
|
|
|
<p id="top"></p>
|
|
|
|
|
|
## Features
|
|
|
### Features
|
|
|
* **Estimated Time: 1 Hour (basic; base lab) - 4 Hours (advanced; enhancements)**
|
|
|
* **Appropriate Grades: 6-12**
|
|
|
* **Topic Alignment** ( **L**imited, **M**edium, **H**igh )
|
|
|
* GenCyber Cybersecurity First Principles:
|
|
|
|
|
|
| GenCyber CFPs | Alignment |
|
|
|
| ---------------- | --------- |
|
|
|
| Data Hiding | H |
|
|
|
| Least Privilege| L |
|
|
|
| Abstraction | M |
|
|
|
| Domain Separation | L |
|
|
|
| Resource Encapsulation | M |
|
|
|
| Simplicity | L |
|
|
|
| Modularity | M |
|
|
|
| Process Isolation | H |
|
|
|
| Layering | H |
|
|
|
| Minimization | L |
|
|
|
|
|
|
* GenCyber Cybersecurity Concepts:
|
|
|
|
|
|
| GenCyber CCs | Alignment |
|
|
|
| ---------------- | --------- |
|
|
|
| Defense in Depth | H |
|
|
|
| Confidentiality | H |
|
|
|
| Integrity | L |
|
|
|
| Availability | H |
|
|
|
| Think Like an Adversary | H |
|
|
|
| Keep It Simple | L |
|
|
|
|
|
|
|
|
|
* General Description
|
|
|
You will learn about radio signals through beacon detection. We have provided the code for the beacon(s), which simply sends their ID over their specified group/channel. You will implement scanners that listen for beacons and leads you to the location of the beacon by measuring signal strength.
|
|
|
|
|
|
* **General Description:** You will learn about radio signals through beacon detection. We have provided the code for the beacon(s), which simply sends their ID over their specified group/channel. You will implement scanners that listen for beacons and leads you to the location of the beacon by measuring signal strength.
|
|
|
* **Topic Alignment:** ( **L**imited, **M**edium, **H**igh )
|
|
|
* GenCyber Cybersecurity First Principles:
|
|
|
|
|
|
| GenCyber CFPs | Alignment |
|
|
|
| ---------------- | --------- |
|
|
|
| Data Hiding | L |
|
|
|
| Least Privilege| L |
|
|
|
| Abstraction | M |
|
|
|
| Domain Separation | L |
|
|
|
| Resource Encapsulation | M |
|
|
|
| Simplicity | M |
|
|
|
| Modularity | H |
|
|
|
| Process Isolation | H |
|
|
|
| Layering | H |
|
|
|
| Minimization | L |
|
|
|
|
|
|
* GenCyber Cybersecurity Concepts:
|
|
|
|
|
|
| GenCyber CCs | Alignment |
|
|
|
| ---------------- | --------- |
|
|
|
| Defense in Depth | H |
|
|
|
| Confidentiality | M |
|
|
|
| Integrity | M |
|
|
|
| Availability | H |
|
|
|
| Think Like an Adversary | H |
|
|
|
| Keep It Simple | L |
|
|
|
|
|
|
### Step 0: The Basics
|
|
|
* Micro::Bit Coding Options
|
... | ... | |