Updating search results...

Search Resources

151 Results

View
Selected filters:
  • internet-safety
Navajo Code Talkers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

During WWII the Marines enlisted Navajo code talkers to send messages. The Navajo language is not written down and is very difficult for non-native speakers to speak and understand. The Marines started with 29 Navajo men for this project. Their code became unbreakable and fast. They could decode 3 lines of English in 20 seconds versus the normal 30 minutes.In this lesson students will hear audio of spoken Navajo language. They will make predictions on what language they think is being spoken. After learning the language they will research the Navajo code breakers. Students will then use the Navajo dictionary to practice creating and deciphering messages. Students will then be able to make connections to cybersecurity. 

Subject:
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Author:
CodeVA Curriculum
THEA CLARK
Date Added:
03/17/2023
NetSafeUtah
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

NetSafe Utah provides online videos and resources for kids, teens, parents and educators, including Internet Safety information that Utah schools need to meet the Children's Internet Protection Act (CIPA) requirements.

Subject:
Cross-Curricular
Material Type:
Activity/Lab
Lesson Plan
Provider:
Virginia Internet Safety Advisory Council
Provider Set:
2024
Date Added:
03/15/2024
Online Enticement
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

Students will be able to define sextortion, explain
common tactics and threats used by extorters,
learn how to avoid being sextorted online, and
outline options available to victims of sextortion.

Subject:
Cross-Curricular
Material Type:
Lesson
Visual Media
Provider:
Virginia Internet Safety Advisory Council
Provider Set:
2024
Date Added:
03/15/2024
Online Relationships
Unrestricted Use
CC BY
Rating
0.0 stars

Lesson taken from material at commonsense.org to help students undertand the risks involved in online relationships. 

Subject:
Impacts of Computing
Material Type:
Activity/Lab
Author:
Janice Sowder
Date Added:
08/05/2020
Online Relationships: BEWARE!
Unrestricted Use
CC BY
Rating
0.0 stars

 High School students are online all the time developing appropriate and inappropriate relationships. Because of their online experiences, they may feel well-equipped to recognize a bad situation and know how to get out of it. However, many times teenagers are drawn into a seemingly harmless conversation that will lead them to a dangerous offline encounter that they cannot escape.This lesson will provide strategies to teens to help them identify relationships that are inappropriate, how to avoid them, and how to get out of those relationships as soon as possible. 

Subject:
Communication Skills
Community Living
Networking and the Internet
Technology Education
Material Type:
Activity/Lab
Assessment
Author:
Nina Adkins
Date Added:
08/13/2020
PBS Ruff Ruffman Humble Media Genius: Living Online
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This is a pilot – a test – with Ruff Ruffman videos looking at the red-hot topic of how kids can and should use media and technology. Our first videos focus on texting, sharing photographs, using search, and finding an appropriate balance of technology use.

Subject:
Cross-Curricular
Material Type:
Lesson Plan
Visual Media
Provider:
Virginia Internet Safety Advisory Council
Provider Set:
2024
Date Added:
03/15/2024
Part 1 Password Safety: Brute Force
Unrestricted Use
CC BY
Rating
0.0 stars

In this first part of a three part series, students will explore the ideas around Brute Force algorithm/programs to further understand the importance of password development, use, safety, and safekeeping while completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few adjustments as well.  Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Game
Homework/Assignment
Author:
Emily Ball
Date Added:
03/20/2022
Part 2 Password Safety:  Decrease (Divide) and Conquer
Unrestricted Use
CC BY
Rating
0.0 stars

In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Measurement and Geometry
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022
Password Probability
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Passwords are essential to protecting our private information from others. Use this lesson to explore some basic probabilty behind password options and how easily they can be guessed! This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates low prep activities you can modifiy to fit your needs.

Subject:
Cross-Curricular
Cybersecurity
Mathematics
Probability and Statistics
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Mary Dickerson
Date Added:
12/26/2022
Password Safety for First Grade
Unrestricted Use
CC BY
Rating
0.0 stars

This lesson supports first graders in their understanding of password safety and its importance. The lesson incorporates a short 3 minute video, discussion questions, whole class model of making a safe password, and an activity for students to practice making a strong password on their own.
The lesson is approximately 30 -45 minutes in length. It can be split into small portions or completed all at one time.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Author:
Trend Micro
Anna Nester
Date Added:
01/13/2022
Paul Revere's Code
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will use a letter Paul Revere wrote to learn how he worked to keep meetings secret and warn the colonists that the British army was on their way.  

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Thea Clark
Date Added:
11/30/2023
Peer Education Kit
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

“Into the Cloud” is an animated digital safety web series intended for children ages
10 and under. Season 1 focuses on issues including cyberbullying, online privacy,
online distractions, misleading information, and inappropriate online behavior.
Season 2 tackles livestreaming and gaming and dives deeper into the issue of inappropriate
online behavior and the potential consequences and dangers lurking online.
The following activities are meant to be led by mature middle and high school students acting in a
mentorship role with a younger student. They are best practiced in a 1:1 or small group setting. This format
fosters closer relationship building between the students and their mentors and encourages more honest and
open conversations.
Facilitating these activities with younger children may count towards community or school service hours,
check with your program coordinator for more information. Each activity may take between 30 minutes and
1 hour.
NOTE: Activities marked with Ages 8+ are best conducted with children who are at least 8 years old.
All videos are available on YouTube or on the kid-safe site NetSmartzKids.org/videos.

Subject:
Cross-Curricular
Material Type:
Activity/Lab
Interactive
Lesson
Lesson Plan
Student Guide
Visual Media
Provider:
Virginia Internet Safety Advisory Council
Provider Set:
2024
Date Added:
03/15/2024
Pigpen Cipher
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

During the American Revolution, the Patriots relied on sending coded messages to prevent the British from understanding the actions of the Continental Army. George Washington’s army used this cipher– though it is not a very secure system in its original form. The Patriots adapted it by using a randomized arrangement of the alphabet. This cipher was also used to some extent during the US Civil War.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023
Pre-K Internet Safety
Unrestricted Use
CC BY
Rating
0.0 stars

How to incorporate internet safety into our morning meeting circle time with 3 and 4 year olds. 

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Jennifer Sheppard
Date Added:
08/14/2020
Pringles Can Enigma Machine
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This activity is from the Cyber.org website and covers the topic of the German Enigma Encryption machine that was used during World War II. Students will learn about how the Enigma machine worked and the process it used to encrypt messages. Students will be able to create their own Enigma machine using a normal size Pringles can and the activity sheet in PDF format. This is a great way to teach the concepts of encryption and a low cost way to give students a hands on approach to encrypting and decrypting messages.Ideas on how to use this activity would be to give the students a message to encrypt using their Pringles can Enigma machine or having students send an encrypted message to a classmate with the encryption key and have that student decrypt the message. To show the power of this type of encryption you can have other students try to decrypt the message without the key so they can see how difficult it would have been to crack the code during World War II.Link to the Cyber.org website for this activity

Subject:
Algorithms and Programming
Computer Science
Cybersecurity
Data and Analysis
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
05/23/2022
Protecting Personal Information Online
Unrestricted Use
CC BY
Rating
0.0 stars

Essential Skill(s):Students should explain why they should not share personal information.Essential Question:What information can I share with others?

Subject:
Computer Science
Cybersecurity
Material Type:
Lesson
Author:
Keisha Tennessee
Date Added:
09/23/2021