Cybersecurity Education and Research
Computer Science Department
Dept. 3315, 1000 E. University ave
Laramie, WY 82071
Email: mike.borowczak@uwyo.edu
The CEDAR Center has been responsible for hosting the Wyoming edition of the NSA GenCyber camp during 2018 and 2019. During this camp, students can progress through increasingly complex stages of puzzles in order to earn awards. In order to accomplish this, a wearable badge, controlled by a micro:bit, was developed to provide students with daily puzzles and progress points. Click here to access the files for this project.
In conjunction with our ICS research, the CEDAR Center has devised a micro:bit activity to simulate a solar panel control system. In this activity, students 3D print then assemble a solar panel frame, and then attach a micro:bit, moto:bit, and servo motor to the frame. Then students must develop a program to remotely control the tilt of the solar panel and read the amount of light that is being absorbed by the LED matrix embedded in the micro:bit. As a final challenge activity, students must develop a program so that the solar panel must autonomously decides which angle provides the optimal amount of light absorption through the LED matrix. Click here to access the 3D model and other project files.
In this activity, students are presented with a "locked box" and are told the lock is controlled by a micro:bit. Given some vague hints, students must progress through three increasingly difficult challenges using various micro:bit functionality in order to break into the locked box. This activity challenges students to think like an adversary and figure out how to bypass the lock box's locking protocols. Click here to access the project files.
It's a classic game of hide and seek! Except in this activity, students must program micro:bits that are able to hone in on the radio signals emitted by other micro:bits that the instructors have hidden throughout the building. This activity challenges students to understand how radio signals work and how they may be used for triangulation of location. Click here to access the project files.
Many kids dream of owning that giant remote-controlled monster truck they see at the store so they can crush all their HotWheels and terrorize the cat. Well, these RC robots aren’t that big but in this activity, students learn how to program a two-wheeled robot as well as the remote control for the robot. However, the students never expect the instructors to program their own remote control to take over their robots! Click here to access the project files, including the attacker code.
TODO
Cybersecurity Education and Research
Computer Science Department
Dept. 3315, 1000 E. University ave
Laramie, WY 82071
Email: mike.borowczak@uwyo.edu