During WWII the Marines enlisted Navajo code talkers to send messages. The …
During WWII the Marines enlisted Navajo code talkers to send messages. The Navajo language is not written down and is very difficult for non-native speakers to speak and understand. The Marines started with 29 Navajo men for this project. Their code became unbreakable and fast. They could decode 3 lines of English in 20 seconds versus the normal 30 minutes.In this lesson students will hear audio of spoken Navajo language. They will make predictions on what language they think is being spoken. After learning the language they will research the Navajo code breakers. Students will then use the Navajo dictionary to practice creating and deciphering messages. Students will then be able to make connections to cybersecurity.
NetSafe Utah provides online videos and resources for kids, teens, parents and …
NetSafe Utah provides online videos and resources for kids, teens, parents and educators, including Internet Safety information that Utah schools need to meet the Children's Internet Protection Act (CIPA) requirements.
Students will be able to define sextortion, explain common tactics and threats …
Students will be able to define sextortion, explain common tactics and threats used by extorters, learn how to avoid being sextorted online, and outline options available to victims of sextortion.
High School students are online all the time developing appropriate and inappropriate …
High School students are online all the time developing appropriate and inappropriate relationships. Because of their online experiences, they may feel well-equipped to recognize a bad situation and know how to get out of it. However, many times teenagers are drawn into a seemingly harmless conversation that will lead them to a dangerous offline encounter that they cannot escape.This lesson will provide strategies to teens to help them identify relationships that are inappropriate, how to avoid them, and how to get out of those relationships as soon as possible.
This is a pilot – a test – with Ruff Ruffman videos …
This is a pilot – a test – with Ruff Ruffman videos looking at the red-hot topic of how kids can and should use media and technology. Our first videos focus on texting, sharing photographs, using search, and finding an appropriate balance of technology use.
In this first part of a three part series, students will explore …
In this first part of a three part series, students will explore the ideas around Brute Force algorithm/programs to further understand the importance of password development, use, safety, and safekeeping while completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each). These activites can be completed seperately with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired. Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes. Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged). These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.
In this second part of a three part series, students will explore …
In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each). These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired. Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes. Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged). These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.
Passwords are essential to protecting our private information from others. Use this …
Passwords are essential to protecting our private information from others. Use this lesson to explore some basic probabilty behind password options and how easily they can be guessed! This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates low prep activities you can modifiy to fit your needs.
This lesson supports first graders in their understanding of password safety and …
This lesson supports first graders in their understanding of password safety and its importance. The lesson incorporates a short 3 minute video, discussion questions, whole class model of making a safe password, and an activity for students to practice making a strong password on their own. The lesson is approximately 30 -45 minutes in length. It can be split into small portions or completed all at one time.
Students will use a letter Paul Revere wrote to learn how he …
Students will use a letter Paul Revere wrote to learn how he worked to keep meetings secret and warn the colonists that the British army was on their way.
“Into the Cloud” is an animated digital safety web series intended for …
“Into the Cloud” is an animated digital safety web series intended for children ages 10 and under. Season 1 focuses on issues including cyberbullying, online privacy, online distractions, misleading information, and inappropriate online behavior. Season 2 tackles livestreaming and gaming and dives deeper into the issue of inappropriate online behavior and the potential consequences and dangers lurking online. The following activities are meant to be led by mature middle and high school students acting in a mentorship role with a younger student. They are best practiced in a 1:1 or small group setting. This format fosters closer relationship building between the students and their mentors and encourages more honest and open conversations. Facilitating these activities with younger children may count towards community or school service hours, check with your program coordinator for more information. Each activity may take between 30 minutes and 1 hour. NOTE: Activities marked with Ages 8+ are best conducted with children who are at least 8 years old. All videos are available on YouTube or on the kid-safe site NetSmartzKids.org/videos.
During the American Revolution, the Patriots relied on sending coded messages to …
During the American Revolution, the Patriots relied on sending coded messages to prevent the British from understanding the actions of the Continental Army. George Washington’s army used this cipher– though it is not a very secure system in its original form. The Patriots adapted it by using a randomized arrangement of the alphabet. This cipher was also used to some extent during the US Civil War.
This activity is from the Cyber.org website and covers the topic of …
This activity is from the Cyber.org website and covers the topic of the German Enigma Encryption machine that was used during World War II. Students will learn about how the Enigma machine worked and the process it used to encrypt messages. Students will be able to create their own Enigma machine using a normal size Pringles can and the activity sheet in PDF format. This is a great way to teach the concepts of encryption and a low cost way to give students a hands on approach to encrypting and decrypting messages.Ideas on how to use this activity would be to give the students a message to encrypt using their Pringles can Enigma machine or having students send an encrypted message to a classmate with the encryption key and have that student decrypt the message. To show the power of this type of encryption you can have other students try to decrypt the message without the key so they can see how difficult it would have been to crack the code during World War II.Link to the Cyber.org website for this activity
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.