Skip to content
Computer Science · 12th Grade

Active learning ideas

Emerging Threats and Future of Cybersecurity

Active learning works for this topic because emerging threats demand students move from abstract awareness to concrete analysis. Simulating futures and debating real-world scenarios helps 12th graders grasp how quantum computing and AI reshape threats beyond traditional textbook cases.

Common Core State StandardsCSTA: 3B-NI-04CSTA: 3B-IC-27
40–50 minPairs → Whole Class3 activities

Activity 01

World Café45 min · Small Groups

Futures Wheel: Quantum Computing and Encryption

Start with the central prompt: 'Quantum computers can break RSA encryption.' In concentric rings, student groups map first-order consequences (encrypted government data is vulnerable), second-order consequences (secure communications collapse), and third-order consequences (financial systems destabilized). Groups share their wheels and the class identifies which consequences are most certain, most speculative, and most urgent to address now.

Predict how quantum computing could impact current cryptographic standards.

Facilitation TipDuring the Futures Wheel, remind students to link each consequence directly to a real cryptographic concept or standard to avoid speculative leaps.

What to look forPose the following to students: 'Imagine you are a cybersecurity advisor for a national government. Given the threat of quantum computing, what are the top three immediate actions you would recommend to protect critical infrastructure and sensitive data, and why?'

UnderstandApplyAnalyzeSocial AwarenessRelationship Skills
Generate Complete Lesson

Activity 02

Formal Debate50 min · Whole Class

Formal Debate: AI in Cyber -- Offense vs. Defense

Divide the class into offense and defense teams. Offense teams research how AI is being used to automate phishing, generate malware, and probe for vulnerabilities. Defense teams research AI-based intrusion detection, log analysis, and automated patching. Both teams present, then the class votes on whether AI is currently a net benefit or net harm to cybersecurity, with justification.

Analyze the challenges of defending against AI-powered cyberattacks.

Facilitation TipFor the AI offense-defense debate, require each team to cite documented incidents (e.g., AI phishing tools) as evidence to ground claims in reality.

What to look forPresent students with two hypothetical cybersecurity scenarios: one involving a phishing attack enhanced by AI, and another involving a data breach exploiting a vulnerability to quantum decryption. Ask students to identify the primary threat in each scenario and briefly explain the underlying technology.

AnalyzeEvaluateCreateSelf-ManagementDecision-Making
Generate Complete Lesson

Activity 03

World Café40 min · Pairs

Research Presentation: Post-Quantum Cryptography Standards

Assign pairs one of the NIST post-quantum finalists (CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+). Each pair researches the basic principle their algorithm uses, why it resists quantum attacks, and what the migration challenge would look like for a major website. Pairs present a three-minute summary, and the class discusses the timeline and coordination required for a global cryptographic transition.

Hypothesize future trends in cybersecurity and propose proactive defense strategies.

Facilitation TipWhen reviewing post-quantum cryptography presentations, pause after each algorithm to ask students which current systems would break without it.

What to look forAsk students to write one sentence explaining the 'harvest now, decrypt later' threat and one sentence describing how AI can be used by attackers. Collect these to gauge understanding of core emerging threats.

UnderstandApplyAnalyzeSocial AwarenessRelationship Skills
Generate Complete Lesson

A few notes on teaching this unit

Teach this topic by anchoring abstract threats in students’ existing cryptography knowledge—start with RSA and AES, then map threats to each. Avoid overwhelming students with deep physics or AI math; focus on the implications of known algorithms and documented attacks. Research suggests that scenario-based and game-like activities increase retention for complex, evolving threats.

Successful learning looks like students distinguishing between immediate risks and long-term threats, citing specific algorithms and case studies, and proposing actionable mitigation strategies. They should articulate why 'harvest now, decrypt later' matters today and how AI lowers attack barriers.


Watch Out for These Misconceptions

  • During Futures Wheel: Quantum Computing and Encryption, watch for students assuming all encryption fails at once.

    Use the activity’s consequence map to ask students to label each branch as symmetric-key, public-key, or hash-based, reinforcing that only specific algorithms are at immediate risk.

  • During Structured Debate: AI in Cyber -- Offense vs. Defense, watch for students dismissing AI’s role in attacks as unrealistic.

    Have teams cite real incidents from the debate preparation materials, such as AI-generated phishing emails used in 2023 campaigns.

  • During Research Presentation: Post-Quantum Cryptography Standards, watch for students believing migration can wait until quantum computers exist.

    Point to NIST’s 2024 standards timeline in student slides and ask teams to justify why organizations handling long-term data must begin now.


Methods used in this brief