6. Securing the Moss

Standard: 2‐NI‐05: Understand how electronic information can be protected using physical and digital security measures

Looking closely at the tiny moss colony, you see that it grows best in areas protected by the largest tree roots, shaded by the thickest branches, under rock outcroppings, or even in deep in caves with little light. In other areas of the grove, you see that different types of moss have grown where there is more light. You notice that intruding moss tends to compete with the fragile luminous mosses, which rely on light sources in subtle ways, such as a beam of light reflected in a pool of water. Moreover, you notice footprints around the moss itself and empty patches where moss has been removed.

Someone has been trying to collect the luminous moss, probably to add to a fancy terrarium! “You see?” says your Guide. “We need to discover a way to protect this rare species from theft and environmental degradation. Is there a way to build a barrier, perhaps with a lock that can be opened with a password, that will still let in the light but stop intruders from taking the moss?”

Working with your map, you create a porous barrier with a secure lock that can be opened only by someone with a password. The barrier creates a dome over the moss, allowing light through, but is physically impregnable to anyone without the password. In this way, you prototype for the Guide a way to better protect the patch of moss from intruders, improving its physical ...

Get Computer Science for Kids now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.