Skip to content

Emerging Threats and Future of CybersecurityActivities & Teaching Strategies

Active learning works for this topic because emerging threats demand students move from abstract awareness to concrete analysis. Simulating futures and debating real-world scenarios helps 12th graders grasp how quantum computing and AI reshape threats beyond traditional textbook cases.

12th GradeComputer Science3 activities40 min50 min

Learning Objectives

  1. 1Critique the vulnerabilities of current public-key cryptography algorithms to quantum computing attacks.
  2. 2Analyze the ethical implications and technical challenges of using AI for both offensive and defensive cybersecurity operations.
  3. 3Synthesize research on emerging cybersecurity threats to propose proactive defense strategies for organizations.
  4. 4Compare and contrast the capabilities of classical computers versus quantum computers in relation to cryptographic breaking.
  5. 5Evaluate the effectiveness of NIST's post-quantum cryptographic standards in mitigating future threats.

Want a complete lesson plan with these objectives? Generate a Mission

45 min·Small Groups

Futures Wheel: Quantum Computing and Encryption

Start with the central prompt: 'Quantum computers can break RSA encryption.' In concentric rings, student groups map first-order consequences (encrypted government data is vulnerable), second-order consequences (secure communications collapse), and third-order consequences (financial systems destabilized). Groups share their wheels and the class identifies which consequences are most certain, most speculative, and most urgent to address now.

Prepare & details

Predict how quantum computing could impact current cryptographic standards.

Facilitation Tip: During the Futures Wheel, remind students to link each consequence directly to a real cryptographic concept or standard to avoid speculative leaps.

Setup: Small tables (4-5 seats each) spread around the room

Materials: Large paper "tablecloths" with questions, Markers (different colors per round), Table host instruction card

UnderstandApplyAnalyzeSocial AwarenessRelationship Skills
50 min·Whole Class

Formal Debate: AI in Cyber -- Offense vs. Defense

Divide the class into offense and defense teams. Offense teams research how AI is being used to automate phishing, generate malware, and probe for vulnerabilities. Defense teams research AI-based intrusion detection, log analysis, and automated patching. Both teams present, then the class votes on whether AI is currently a net benefit or net harm to cybersecurity, with justification.

Prepare & details

Analyze the challenges of defending against AI-powered cyberattacks.

Facilitation Tip: For the AI offense-defense debate, require each team to cite documented incidents (e.g., AI phishing tools) as evidence to ground claims in reality.

Setup: Two teams facing each other, audience seating for the rest

Materials: Debate proposition card, Research brief for each side, Judging rubric for audience, Timer

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
40 min·Pairs

Research Presentation: Post-Quantum Cryptography Standards

Assign pairs one of the NIST post-quantum finalists (CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+). Each pair researches the basic principle their algorithm uses, why it resists quantum attacks, and what the migration challenge would look like for a major website. Pairs present a three-minute summary, and the class discusses the timeline and coordination required for a global cryptographic transition.

Prepare & details

Hypothesize future trends in cybersecurity and propose proactive defense strategies.

Facilitation Tip: When reviewing post-quantum cryptography presentations, pause after each algorithm to ask students which current systems would break without it.

Setup: Small tables (4-5 seats each) spread around the room

Materials: Large paper "tablecloths" with questions, Markers (different colors per round), Table host instruction card

UnderstandApplyAnalyzeSocial AwarenessRelationship Skills

Teaching This Topic

Teach this topic by anchoring abstract threats in students’ existing cryptography knowledge—start with RSA and AES, then map threats to each. Avoid overwhelming students with deep physics or AI math; focus on the implications of known algorithms and documented attacks. Research suggests that scenario-based and game-like activities increase retention for complex, evolving threats.

What to Expect

Successful learning looks like students distinguishing between immediate risks and long-term threats, citing specific algorithms and case studies, and proposing actionable mitigation strategies. They should articulate why 'harvest now, decrypt later' matters today and how AI lowers attack barriers.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Futures Wheel: Quantum Computing and Encryption, watch for students assuming all encryption fails at once.

What to Teach Instead

Use the activity’s consequence map to ask students to label each branch as symmetric-key, public-key, or hash-based, reinforcing that only specific algorithms are at immediate risk.

Common MisconceptionDuring Structured Debate: AI in Cyber -- Offense vs. Defense, watch for students dismissing AI’s role in attacks as unrealistic.

What to Teach Instead

Have teams cite real incidents from the debate preparation materials, such as AI-generated phishing emails used in 2023 campaigns.

Common MisconceptionDuring Research Presentation: Post-Quantum Cryptography Standards, watch for students believing migration can wait until quantum computers exist.

What to Teach Instead

Point to NIST’s 2024 standards timeline in student slides and ask teams to justify why organizations handling long-term data must begin now.

Assessment Ideas

Discussion Prompt

After Futures Wheel: Quantum Computing and Encryption, ask students to write a paragraph identifying the top three immediate actions they would recommend as cybersecurity advisors for critical infrastructure, using their futures map as evidence.

Quick Check

During Structured Debate: AI in Cyber -- Offense vs. Defense, present a quick scenario mid-debate where students must identify the primary threat (AI-enhanced phishing vs. quantum decryption) and explain the underlying technology in one sentence each.

Exit Ticket

After Research Presentation: Post-Quantum Cryptography Standards, collect exit tickets with one sentence explaining the 'harvest now, decrypt later' threat and one sentence describing how AI can be used by attackers.

Extensions & Scaffolding

  • Challenge: Ask students to draft a one-page policy memo recommending migration timelines for an organization storing 10+ year data.
  • Scaffolding: Provide a side-by-side comparison table of RSA vs. lattice-based encryption with key sizes and threat timelines filled in partially.
  • Deeper: Invite a guest speaker from a post-quantum project team to discuss real-world migration challenges.

Key Vocabulary

Quantum ComputingA type of computation that harnesses quantum-mechanical phenomena, such as superposition and entanglement, to perform calculations. It poses a significant threat to current encryption methods.
Shor's AlgorithmA quantum algorithm that can efficiently factor large numbers, which is the mathematical basis for the security of many widely used public-key cryptosystems like RSA.
Harvest Now, Decrypt LaterA cybersecurity threat where encrypted data is stolen today, with the expectation that it can be decrypted in the future once sufficiently powerful quantum computers are available.
AI-Powered MalwareMalicious software that uses artificial intelligence techniques to adapt, evade detection, and carry out sophisticated attacks, often with increased personalization and efficiency.
Post-Quantum Cryptography (PQC)Cryptographic algorithms designed to be resistant to attacks from both classical and quantum computers, developed to replace current vulnerable cryptographic standards.

Ready to teach Emerging Threats and Future of Cybersecurity?

Generate a full mission with everything you need

Generate a Mission