Customizing Harry Potter in Cybersecurity
Abstract
The research will outline detail oriented relation between Harry Potter and cyber security principles. The target is to make the coming generation more aware and conscious about security. The paper will clearly elaborate top cyber security principles with parallel stories in Harry Potter. In addition to that, research will also work give information about cyber security tools with relevant magic spells that will provide explanation about both attack and defense methods in security. Furthermore, it will also enforce the idea that security is more of teamwork than an individual work. This research will also design a feasible activity that will provide knowledge in security and cryptography. Approach: literature and movie review of all episodes of Harry Potter, gather and explore perception and thoughts and team input for a quality activity design, data analysis after conducting surveys, research on feasible computational algorithm on asymmetric and symmetric ciphers with activities that highlights both strength and weaknesses, continuous testing of the effectiveness of the designed activities, and gather appropriate and feasible tools for cyber defense and attack. The paper will summarize effective customization of Harry Potter with concepts of cyber security such as encapsulation, layering, data hiding, social engineering and many more. In addition to that, the paper will also represent the current knowledge and attitude of students in chosen scopes using pictorial statistics. Finally, the paper will also present designed activities for broadening the knowledge and significance in cyber security.Published
2017-05-17
Issue
Section
Computer Science