Upon completion of the Caesar Cipher lesson, students will:
1) Investigate how Caesar Ciphers work to achieve the goal of confidentiality of information, their historical context, and strengths and weaknesses,
2) Encrypt and decrypt text using Caesar Ciphers,
3) Implement a Caesar Cipher in a programming language, and
4) Ascertain the correctness of their program as a functional program to protect information assets and computing resources.
All materials in this Cybersecurity Concept Lesson is based upon work supported by the NCyTE Center and the National Science Foundation under Grant No. 1548315, Catalyzing Computing and Cybersecurity in Community Colleges (C5). C5 is a grant-funded project based at Whatcom Community College in Bellingham, WA. One of its goals is to develop and disseminate instructional materials to enhance computer science and cybersecurity courses.