
Cybersecurity - Pathway 2 - High School Summer Adventures - STEP #5
Considering Cybersecurity Summer Activities
Victoria and Christopher are making plans for their High School Summer Vacation. With a mutual concern about information security and cyber-terrorism, they are seeking to find summer activities that will help them understand the intricate, yet exciting world of cybersecurity. As their exploration begins, Victoria finds she is more drawn toward governmental agencies and national infrastructure, like the power grid and air traffic control. Christopher feels he would rather pursue a career in commerce, such as banking or retail. Both look into summer activities of interest that will provide them each a uniquely valuable experience.
What direction will you take on this pathway?
CYBER CAMPS
For this step on your pathway, Chris and Victoria would like you to investigate the details for the following cyber-related camps:
-
Overnight Cyber Camps National Student Leadership Conference, American University, Washington, D.C. A 9-day summer program.
-
iD Tech Virtual Cyber Camps (Online)
-
iD Tech On-Campus Camps (Tech Camps held at 150+ Universities)
-
Local camp at Suffolk County Community College Youth Entrepreneurial Summer Camp Program
-
Research any other virtual camps
-
Research any other local or regional camps
-
After investigating these resources and programs, explain which one you would find the most exciting and be most interested in.
Record your evaluations and feedback in your Quantum Leap Voyages Log.



Cybersecurity - Pathway 2 - High School Summer Adventures- STEP #6
Cybersecurity Summer Reading
As Christopher and Victoria become more involved in the world of Cybersecurity, they discover it has a language of its own. After a recent workshop, they heard about the following reference books that define hundreds of primary cybersecurity terms used in the industry.
In this step, complete the following:
-
At a small investment, obtain a copy of The Cybersecurity to English Dictionary by Raef Meeuwisse.
-
Or, at Live-Library, you can borrow another great reference book by the same author, Cybersecurity for Beginners.
-
Read through and evaluate either reference book. Describe if it is valuable in helping you become more fluent in understanding common cyber security terms. Would recommend them to Victoria and Chris and why?
Record your evaluations in your Quantum Leap Voyages Log.



Good Time to Learn
Cybersecurity Jargon
cloud

domain
software
VPN
IP address
exploit
breach
malware
randsomware
virus
botnet
trojanhorse
worm
bot
spyware
phishing
rootkit
DDos
encryption
BYOD
social engineering
clickjacking
deepfake
white hat
black hat
firewall
pen testing
Listen
Cybersecurity - Pathway 2 - High School Summer Adventures - STEP 7
Events and Conferences
While Christopher and Victoria are at a summer camp, they would like you to do a little extra research to find one or two really good events or conferences they could attend. In this step:
-
Watch Top 10 Cybersecurity Events video.
-
Search the Internet for current cybersecurity conferences, meetings, and/or videos.
-
Check for upcoming national, regional, and local events.
-
Select two or three events you would like to attend in person or online.
-
Evaluate and list why you chose the events in your search.
-
What recommendations do you have for Christopher and Victoria?
Record your impressions and notes in your Quantum Leap Voyages Log.



Cybersecurity - Pathway 2 - High School Summer Adventures - STEP 8
Getting Real About Cybersecurity
As Victoria and Chris learn more and more about cybersecurity, they decided to get together to explore close-to-home, real-life cybersecurity situations. First, they made a list of some local businesses, agencies and institutions to investigate how they are prepared for cyber-attacks. Enthused, they consider some of the following agencies to explore:
-
Local Police Precinct
-
Town Fire Department
-
School District
-
Community Ambulance Services
-
Local Hospitals
-
Town Government
-
Water, Electric, Phone Services
-
Banks
-
Target Stores
-
Home Depot
In this step:
-
Pick two or three on the list in your community.
-
Make a list of a few questions to ask about how they prepare for a cyberattack.
-
Set up an interview with the professional(s) responsible for their cybersecurity.
Record the information you learned and your impressions in your QLV Log.




