Students learn about various types of cybercrime and the cybersecurity measures that can help prevent them. Then students perform a Rapid Research project investigating a particular cybercrime event with a particular focus on the data that was lost or stolen and the concerns that arise as a result. The Rapid Research activity features vocabulary, concepts, and skills that should help prepare them for the AP Explore PT, and also serves as a capstone for the sequence of lessons on encryption and security.



Students will be able to:


This lesson serves two roles: 1. Review terminology about cybersecurity and crime that is relevant for the AP CS Principles Exam and 2. Practice research and writing skills that will help students on the Explore PT.

Following this lesson the teacher may opt to either run the research activity in the next lesson or move on to running the full Explore PT with the class. Note that the Explore PT prep unit includes additional resources that will help students prepare for the task.


Getting Started

The students are going to look at how cybercrimes are conducted, how cybersecurity measures can protect us, and what the implications are of data leaking. Then the students will research a particular cybercrime and quickly prepare a one-pager about it.

Explain to the students the essence of the following video or watch it as a class.

Some topics from the video that the students may want to research about include:


Day 1: Choose Innovation, Read and Research

Day 2: Prepare One-Pager

Wrap Up

Below is the list of cybersecurity terms that the students were introduced to throughout this lesson. Each has been annotated with brief explanations.

Implementing cybersecurity has software, hardware, and human components.

Sockets layer/transport layer security (SSL/TLS)

Cyber warfare and cyber crime have widespread and potentially devastating effects.

Distributed denial of service attacks (DDoS)

Phishing scams

Viruses / Antivirus software and firewalls


Use the rubric provided with the Activity Guide to assess the one-pagers.

The following questions refer to ideas in the Cybercrime video.

What does the s in https refer to?

When someone tries to get you to give up personal information through email or a bogus website it is called a:

When someone attempts to compromise a target by flooding it with requests from multiple systems that is called a:

The vast majority of computer security failures are due to:

Standards Alignment