Updating search results...

Search Resources

162 Results

View
Selected filters:
  • Cybersecurity
Password Planet Puzzle
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Review planets and teach students about safe/secure password usage with this Planet's Password Puzzle! Students will have to use clues to identify each planet and once they are in the right order students will be left with a top secret password to stop the evil hackers at the International Space Station! 

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Savannah McKee
Date Added:
03/11/2024
Password Probability
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Passwords are essential to protecting our private information from others. Use this lesson to explore some basic probabilty behind password options and how easily they can be guessed! This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates low prep activities you can modifiy to fit your needs.

Subject:
Cross-Curricular
Cybersecurity
Mathematics
Probability and Statistics
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Mary Dickerson
Date Added:
12/26/2022
Password Safety for First Grade
Unrestricted Use
CC BY
Rating
0.0 stars

This lesson supports first graders in their understanding of password safety and its importance. The lesson incorporates a short 3 minute video, discussion questions, whole class model of making a safe password, and an activity for students to practice making a strong password on their own.
The lesson is approximately 30 -45 minutes in length. It can be split into small portions or completed all at one time.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Author:
Trend Micro
Anna Nester
Date Added:
01/13/2022
Paul Revere's Code
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will use a letter Paul Revere wrote to learn how he worked to keep meetings secret and warn the colonists that the British army was on their way.  

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Thea Clark
Date Added:
11/30/2023
Pigpen Cipher
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

During the American Revolution, the Patriots relied on sending coded messages to prevent the British from understanding the actions of the Continental Army. George Washington’s army used this cipher– though it is not a very secure system in its original form. The Patriots adapted it by using a randomized arrangement of the alphabet. This cipher was also used to some extent during the US Civil War.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023
Pre-K Internet Safety
Unrestricted Use
CC BY
Rating
0.0 stars

How to incorporate internet safety into our morning meeting circle time with 3 and 4 year olds. 

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Jennifer Sheppard
Date Added:
08/14/2020
Pringles Can Enigma Machine
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This activity is from the Cyber.org website and covers the topic of the German Enigma Encryption machine that was used during World War II. Students will learn about how the Enigma machine worked and the process it used to encrypt messages. Students will be able to create their own Enigma machine using a normal size Pringles can and the activity sheet in PDF format. This is a great way to teach the concepts of encryption and a low cost way to give students a hands on approach to encrypting and decrypting messages.Ideas on how to use this activity would be to give the students a message to encrypt using their Pringles can Enigma machine or having students send an encrypted message to a classmate with the encryption key and have that student decrypt the message. To show the power of this type of encryption you can have other students try to decrypt the message without the key so they can see how difficult it would have been to crack the code during World War II.Link to the Cyber.org website for this activity

Subject:
Algorithms and Programming
Computer Science
Cybersecurity
Data and Analysis
Material Type:
Activity/Lab
Assessment
Homework/Assignment
Author:
Ronald Sparks
Date Added:
05/23/2022
Protecting Personal Information Online
Unrestricted Use
CC BY
Rating
0.0 stars

Essential Skill(s):Students should explain why they should not share personal information.Essential Question:What information can I share with others?

Subject:
Computer Science
Cybersecurity
Material Type:
Lesson
Author:
Keisha Tennessee
Date Added:
09/23/2021
Public & Private Keys notes
Unrestricted Use
CC BY
Rating
0.0 stars

A student notesheet with answer key from a short youtube video on public and private keys and how they work.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Kimberly Emory
Date Added:
06/13/2022
Public and Private Networks 7.6
Unrestricted Use
CC BY
Rating
0.0 stars

Strand: Cybersecurity7.6 The student will describe how physical and digital security measures protect electronic information.A network is a collection of computers, phones, servers, network or other devices connected to allow data sharing among users. An example of a network is the internet, which connects tens of millions of people all over the world.There are two types of networks. Private networks are the kind you use at home. Private networks have security measures in place to prevent unwanted or unauthorized connections. Public networks are networks that are often used at schools or hospitals. Public networks are far less secure than home or private networks.

Subject:
Computer Science
Cybersecurity
Material Type:
Lecture Notes
Reading
Teaching/Learning Strategy
Author:
Robert Underwood
Date Added:
05/03/2022
Putting a Stop to Online Meanness
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

From Common Sense Education: “The Internet is filled with all kinds of interesting people, but sometimes, some of them can be mean to each other. With this role play, students understand why it’s often easier to be mean online than in person, and how to deal with online meanness when they see it.”

Subject:
Computer Science
Cross-Curricular
Cybersecurity
History/Social Sciences
Material Type:
Lesson Plan
Author:
Commonsense.org
Kenneth Vaiden
Date Added:
12/03/2021
Responsible Technology Behaviors
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Setting and maintaining expectations is an essential indicator of future student success at all grade levels. At the start of each school year, classes review citizenship skills to get reacclimated to the school and the classroom environment. Help students set a strong foundation for their digital lives by teaching digital citizenship and face-to-face skills. In doing so, students will be equipped with tips for safety and success no matter their setting.  

Subject:
Computer Science
Cybersecurity
History/Social Sciences
Impacts of Computing
Material Type:
Lesson
Author:
Kim Keith
Date Added:
12/30/2022
Simple Encryption
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson is presented by Code.org
Lesson 8: Cybersecurity - Simple Encryption

From the website:
OVERVIEW
"In this lesson, students are introduced to the need for encryption and simple techniques for breaking (or cracking) secret messages. Students try their own hand at cracking a message encoded with the classic Caesar cipher and also a Random Substitution Cipher. Students should become well-acquainted with idea that in an age of powerful computational tools, techniques of encryption will need to be more sophisticated. The most important aspect of this lesson is to understand how and why encryption plays a role in all of our lives every day on the Internet, and that making good encryption is not trivial. Students will get their feet wet with understanding the considerations that must go into making strong encryption in the face of powerful computational tools that can be used to crack it. The need for secrecy when sending bits over the Internet is important for anyone using the Internet."

OBJECTIVE
"Explain why encryption is an important need for everyday life on the Internet.
Crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget
Crack a message encrypted with random substitution using Frequency Analysis
Explain the weaknesses and security flaws of substitution ciphers"

The lesson is mapped out for teachers. It is easy to follow and includes vocabulary to cover, links to the necessary materials, and a teaching guide with background information, tips, and prompts.

AGENDA
Warm Up (10 min)
Classic Encryption - The Caesar Cipher
Activity (35 min)
Part 1 - Crack a Caesar Cipher
Part 2 - Crack a Random Substitution Cipher
Wrap Up (15 min)
Video: Encryption and Public Keys
Discussion
Career Discussion

Subject:
Computer Science
Cybersecurity
Impacts of Computing
Material Type:
Activity/Lab
Author:
code.org
Date Added:
01/13/2022
Simple Encryption (Code.org)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Overview: This lesson is presented by Code.org
Lesson 8: Cybersecurity - Simple Encryption

From the website:
OVERVIEW
"In this lesson, students are introduced to the need for encryption and simple techniques for breaking (or cracking) secret messages. Students try their own hand at cracking a message encoded with the classic Caesar cipher and also a Random Substitution Cipher. Students should become well-acquainted with idea that in an age of powerful computational tools, techniques of encryption will need to be more sophisticated. The most important aspect of this lesson is to understand how and why encryption plays a role in all of our lives every day on the Internet, and that making good encryption is not trivial. Students will get their feet wet with understanding the considerations that must go into making strong encryption in the face of powerful computational tools that can be used to crack it. The need for secrecy when sending bits over the Internet is important for anyone using the Internet."

OBJECTIVE
"Explain why encryption is an important need for everyday life on the Internet.
Crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget
Crack a message encrypted with random substitution using Frequency Analysis
Explain the weaknesses and security flaws of substitution ciphers"

The lesson is mapped out for teachers. It is easy to follow and includes vocabulary to cover, links to the necessary materials, and a teaching guide with background information, tips, and prompts.

AGENDA
Warm Up (10 min)
Classic Encryption - The Caesar Cipher

Activity (35 min)
Part 1 - Crack a Caesar Cipher
Part 2 - Crack a Random Substitution Cipher

Wrap Up (15 min)
Video: Encryption and Public Keys
Discussion
Career Discussion

***This lesson can be adapted for younger students but material covered aligns best with the current 8th grade Impacts of Computing Standards.

Subject:
Computer Science
Cybersecurity
Impacts of Computing
Material Type:
Activity/Lab
Interactive
Lesson Plan
Author:
code.org
Date Added:
02/02/2022
Spanish CS Integrated Lesson Plan:  Cybersecurity Part I
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Big Idea: Students will learn about and discuss the importance of private versus public information in Spanish.Concept: Students will address ideas of personal cybersecurity online.Summary: Students will learn cybersecurity vocabulary, discuss the importance of cybersecurity in Spanish using the present subjunctive and commands, and create a cybersecurity dos and don'ts poster in Spanish.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Dual Immersion (Languages)
Spanish
Material Type:
Activity/Lab
Interactive
Lesson
Lesson Plan
Reading
Author:
Ada Chrisman
Date Added:
12/28/2022
Spanish CS Integrated Lesson Plan:  Cybersecurity Part II
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

The Big Idea: Students will learn about and discuss the importance of private versus public information in Spanish.Concept: Students will address ideas of personal cybersecurity online.Summary: Students will learn cybersecurity vocabulary, explore cybersecurity concepts through authentic materials, discuss the importance of cybersecurity in Spanish using the present subjunctive and commands, and create a cybersecurity dos and don'ts poster in Spanish.

Subject:
Computer Science
Cybersecurity
Dual Immersion (Languages)
Spanish
World Languages
Material Type:
Activity/Lab
Author:
Ada Chrisman
Date Added:
12/28/2022