• Volunteer
  • Teach
  • Programs
    • Chats with Change Makers
    • Engineers Week
    • IMAX Films
    • Introduce a Girl to Engineering
    • World Engineering Day
    • Future City
  • Engineering Activities
  • Engineering Careers
  • Support Us
  • Store
  • Search
  • Join
Donate
Join
  • Volunteer
  • Teach
  • Programs
    • Chats with Change Makers
    • Engineers Week
    • IMAX Films
    • Introduce a Girl to Engineering
    • World Engineering Day
    • Future City
  • Engineering Activities
  • Engineering Careers
  • Support Us
  • Store
  • Search
  • Join
  1. View More Activities

Stop the Cyberattacks!

This activity introduces students to the range of the most common kinds of cyberattacks and the ways cybersecurity specialists prevent or thwart them.

Time
  • 45 minutes or Less
Careers
  • Computer Science
  • Electrical
Grade
  • 6-8
  • 9-12
Topic
  • Coding & Robotics
Leader Notes
Materials
  • Types of Attacks: Stop the Cyberattack Student Handout
  • Types of Preventions: Stop the CyberAttacks Student Handout
  • Answer Key: Solutions for Cyberattacks (one for the educator-facilitator only)
  • Note-taking materials
Introduce

Cyberattacks are rapidly increasing in number, scope, and audacity. Successful assaults don’t just damage individuals and companies. They also disrupt essential services to millions of people; shut down databases for hospitals, universities, and governments; and wreak havoc with entire economies. Familiarity with the methods cybercriminals use and the solutions that stop them is becoming more and more important. Cyberattacks on computer systems come in many shapes and forms, but there are always ways to prevent them.

This activity introduces students to the range of the most common kinds of cyberattacks and the ways cybersecurity specialists prevent or thwart them.

SUCCESS CRITERIA

  • Accurately match each kind of cyberattack with the best preventive measure(s)
  • Explain your rationale for your choices
Instructions
  1. Share this challenge with students:
    You and your team are experts at cybersecurity. You’ve just been hired by Company X, which has recently recovered from a series of attacks on its systems. Your job is to review the main types of cyberattacks that are possible and put the best methods in place to prevent them from happening.
  2.  Have a conversation to get students thinking about their own experiences with cyberattacks:
    • What are some of the scams you’ve heard about that can happen via social media platforms?
    • Have you ever gotten a weird feeling about a DM on your phone? What made you wonder if it was suspicious?
    • When you join a social media platform, do you ever read the information provided about what to expect in terms of being contacted? Have you read the lists of what the DM apps will never ask by contacting you directly?
  3. Go over the success criteria. Divide the students into teams of 2–4 to examine the Handout: Stop the Cyberattacks! together.
  4. Distribute Types of Attacks: Stop the Cyberattack Student Handout and Types of Preventions: Stop the CyberAttacks Student Handout. Tell students that cybercriminals are called bad actors in the world of cybersecurity, and the students’ job is to outwit the bad actors who are attacking Company X. To begin, ask students to read the descriptions of various kinds of cyberattacks (located on the Handout: Stop the Cyberattacks!).
  5. Ask teams to talk through the list of attacks with each other to make sure they understand how each attack works. As needed, answer questions and clear up any confusion.
  6. Tell teams to read the list of preventive measures (located on the Handout: Stop the Cyberattacks!). First, they should work independently to match potential solutions with attacks. Then tell them to compare notes and discuss differences in opinion. Provide the following hints:
    • The prevention should thwart the goal of the attack.
    • Some preventions work for more than one kind of attack.
    • Some attacks require more than one prevention.
  7. Have the teams share their results, including their reasoning. Next to each attack, list the solutions the teams came up with.
  8. Acknowledge that the solutions are not necessarily obvious, but applying reasoning is a good first step in making the choice an expert would. Then make corrections or additions to the solutions the students came up with and explain why; use the answer sheet as needed.
  9. Ask students which types of cyberattacks were new to them. Which ones do they think are the most dangerous? What steps will they take to protect their own computers and data?
STEM Connections
  • Cybercriminals spend their time coming up with new ways to launch cyberattacks, so cybersecurity engineers have to stay one step ahead. They keep their minds as sharp as possible by constantly learning and by doing puzzles. There are special kinds of puzzles that are made just for cybersecurity work!
  • Ethical hacking to discover weaknesses is a vital part of computer engineering. The engineers at IBM realized its importance in 1967, when they asked some high school students to try out their new computer—and the students found their way into parts of the system that were way off limits.
  • In the 1970s, a researcher created a program called Creeper that could move across a precursor version of the internet. It left a trail that read, “I’m the creeper, catch me if you can.” It was the first computer worm because it could self-replicate. The inventor of email wrote the Reaper program, which chased and deleted Creeper. It was the first antivirus software.
  • The internet is vulnerable to attack in many ways. For one thing, many different companies own parts of the “internet backbone,” the actual cables and routers that carry internet traffic, and they focus on their own segments without necessarily coordinating security with other owners. There are also critical choke points in these cables where bad actors can block data. Criminals can cause damage in other parts of the internet’s physical structure, such as servers, routers, and personal computers. Key avenues of vulnerability are internet protocols, the rules by which information is sent. Attackers work hard to breach security protocols in particular, and once they’ve gotten in, they can steal all kinds of information.

This activity was created in partnership with Northrop Grumman Foundation.


Enjoy this activity?

Join our community and receive activities, early access to programs, and other special news, and/or leave feedback on this activity below!

Thank you! Your submission is processing.

Cancel reply

Your email address will not be published. Required fields are marked *

Submitting...

Submit a Comment Cancel reply

Your email address will not be published. Required fields are marked *

Print
Downloads
Share this activity with your network!
Enjoy this activity? Please let your friends know!
Share Activity
This activity was developed through the support of the Northrop Grumman Foundation. Northrop Grumman Foundation More Activities from Northrop Grumman Foundation
Other Resources
  • Types of Attacks: Stop the Cyberattack Student Handout
  • Types of Preventions: Stop the CyberAttacks Student Handout
  • Answer Key: Solutions for Cyberattacks
Related Activities
View All
AI Machine Learning
AI Machine Learning
  • Half Day
  • 6-12
View Activity
AI: Assessing the Risks and Rewards
AI: Assessing the Risks and Rewards
  • Half Day
  • 6-12
View Activity
Cyber Sleuth: Which DMs Can I Trust?
Cyber Sleuth: Which DMs Can I Trust?
  • 45 minutes or Less
  • 6-12
View Activity
Lidar: Mapping with Lasers
Lidar: Mapping with Lasers
American Society of Civil Engineers
  • 45 minutes or Less
  • 6-12
View Activity
My Robot Friend
My Robot Friend
Saint Louis Science Center
  • 45 minutes or Less
  • 3-8
View Activity
Robot Challenge
Robot Challenge
Saint Louis Science Center
  • 1 to 2 Hours
  • 6-12
View Activity
Operation Polar Eye
Operation Polar Eye
ThinkerSmith
  • 1 to 2 Hours
  • 6-12
View Activity
Homemade Wigglebot
Homemade Wigglebot
  • 45 minutes or Less
  • K-5
View Activity
Coding Without Computers
Coding Without Computers
ThinkerSmith
  • 1 to 2 Hours
  • 6-12
View Activity
DiscoverE helps create activities like this around Coding & Robotics for children in Middle School and High School to help prepare them for STEM careers in fields like Computer Science or Electrical.

Find our resources helpful?
Please consider donating.

Make a donation

Want to find out how you can volunteer?

Get Involved

DiscoverE works to provide every student with a STEM experience and the resources, programs, and connections to improve the understanding of engineering through a united voice and a global distribution network.

The development of this site was made possible by a grant from the United Engineering Foundation (UEF).

About Us

  • Our Story
  • Our Board & Staff
  • Our Impact
  • Donate

Get Involved

  • Messages Matter
  • Teach
  • Volunteer
  • Our Programs
  • Store

Resources

  • Learn about Engineering Careers
  • Engineering Activities
  • Our Blog
  • Logos & Graphics
  • Outreach Grants

Connect

  • Facebook
  • LinkedIn
  • Instagram
  • YouTube
  • Twitter
  • Pinterest
  • Contact Us
Website designed and developed by RedSwan5.

© 2025 DiscoverE. All rights reserved.

Privacy Policy | Terms & Conditions

Join Our Community

Stay up-to-date with all the programs and resources that Discover E has to offer!

Login or Create Account

All of the content on this site is free!

Registering for the site helps us tailor future activities, webinars, and events so that we can serve you better.

Thank you for your interest and for helping us in our mission to transform lives as we put the E in STEM!

Login Form

Log in or sign up

Forgot your password?

Don’t have an account? Sign up!

We use cookies that are necessary to make our site work. We may also use additional cookies to analyze, improve, and personalize our content and your digital experience. For more information, see our Cookie Policy.OKCookie Policy