Cyber City Game (Tech) – Teacher Brief

Cyber City is a virtual city network and environment that simulates various cyber threats and challenges organisations face. It provides a platform for cybersecurity professionals, enthusiasts, and students to learn and practice real-world cybersecurity skills and techniques in a safe and controlled environment. The Cyber City platform includes various scenarios, simulations, and challenges designed to test and enhance participants’ skills in network security, cryptography, penetration testing, and incident response. It is an effective tool for preparing individuals and organisations to face and mitigate cyber threats in the real world.

The Tech

The CyberCity network environment is simulated using MicroPython, an easy-to-learn interpreted language, and Micro:Bit V2 microcontrollers. Microcontrollers are small computers that can be programmed through the browser. They offer audio-visual capabilities with pins for digital output and input and wireless communication. Each simulation may require additional components related to input and output, such as servo motors and various sensors.

The Suggested Learning Sequence

Here is a breakdown of the Cyber City game learning sequence that can be used by teachers in the classroom:

  1. Introduce the Initial Problem: Start by presenting the initial problem of the game. Explain to the students that they are part of a team that needs to maintain the pitch of a satellite in orbit to prevent catastrophic failure, which could result in a complete shutdown of the organisation’s service.
  2. Teach Network Communication and Information Exchange: Teach students the importance of network communication and information exchange. Explain to them that they need to utilise the network hosted by CyberCity to query the current pitch and provide adjustment commands to maintain a nominal orbit.
  3. Introduce Cybersecurity and Malicious Motivations: Teach students about cybersecurity and malicious motivations. Explain to them that various cyber criminals and rings are drawn to the possibility of financially gaining or revealing their presence from the satellite’s destruction.
  4. Teach Prevention of Tampering: Teach students how organisations protect their networks and communication channels. For example, explain to them that the organisation employs a cipher to encrypt the information being transmitted to prevent the criminals from understanding the data being transmitted.
  5. Immersing the User: Divide students into two teams – Team A and Team B. Team A will be employed by the organisation to maintain the satellite’s pitch, while Team B will be the criminal ring attempting to destroy the satellite.
  6. Teach MicroPython and Micro:Bit: Teach students about MicroPython and Micro:Bit, which are used for programming microcontrollers.
  7. Assign the Simulation/Narrative: Assign the simulation/narrative to the students, providing them with additional components related to input and output, such as servo motors and other various sensors.
  8. Monitor Progress and Facilitate Discussions: Monitor the student’s progress and facilitate discussions to ensure that they are on the right track. Encourage them to share their insights and ask questions.
  9. Conduct a Debriefing Session: Conduct a debriefing session to discuss the lessons learned and the challenges encountered during the game. Encourage the students to share their experiences and insights.

By following this learning sequence, teachers can successfully deploy the Cyber City game in the classroom and help students develop their problem-solving, critical thinking, and collaboration skills.

Download the complete teacher briefing and delivery resource here:  Cyber City Game (Tech) – Teacher Briefing

Videos
Teachers Guide – Cyber City Tech: Introduction
Week 1

Cyber Security Fundamentals.

Outcomes: ST5-4, ST5-5, ST5-10


Topic Links

Value of Data

Ethics

Privacy


Week 1 Downloads

Student Work Booklet (Word)

Student Work Booklet (Interactive PDF)

Week 3

Protecting Data 
Outcomes: ST5-4, ST5-5, ST5-10


Authentication

Threats

Vulnerabilities & Risks


Download

Student Work Booklet (word)

Week 4

Networks 
Outcomes: ST5-4, ST5-5, ST5-10


Targets and Hackers

Networks

Tools


Download

Student Work Booklet (word)