This lesson is designed to assist & help students recognize & handle Cyberbullying. https://goopenva.org/
- Subject:
- Cybersecurity
- Material Type:
- Activity/Lab
- Author:
- Melissa Wilcox
- Date Added:
- 06/14/2021
This lesson is designed to assist & help students recognize & handle Cyberbullying. https://goopenva.org/
PDF resource of different Cyber Careers from NICERC. The document details 15 different cyber related careers which can be used to aid students in choosing a career path in Cybersecurity. Good way to discuss with students the opportunities available in the growing field. The document details the job profile, education requirements, median salary, job growth percent, and common job duties.
Students will learn about cyber security and keeping their information safe. They will then create a presentation for younger students to teach them about cyber security.
Students will identify and work to solve various cyber security concerns by answering a rEnglishted prompt and working through the problem.
The lessons provided are presented by Scholastic and sponsored by Norton Lifelock.
All rights reserved by Scholastic.
Below is an overview of the three lessons provided.
The lessons do not coincide with one another.
The teacher can choose to use all three or select the best option for the classroom needs.
The PDF Links includes:
Lesson 1: Understanding Online Safety (45 minutes)
- Students will analyze text, citing evidence and summarizing central ideas. They will make inferences to create their own cybersecurity protection plan.
- Students will use the provided copy of #Cybersmarts student magazine to create their personalized online protection plan.
Lesson 2: Identifying Preventive Technologies (45 minutes + presentation time)
- Students will conduct research on preventive technologies built and used by professionals in the cybersecurity field (e.g., firewalls, ad blocker apps, antivirus software, voice recognition software, virtual private network (VPN), etc.).
- Students will then prepare a presentation - the given choices are a skit or interview. Presentation options can be easily adapted to best fit your classroom needs.
- Research planning/ gathering page is provided.
Lesson 3: Making Online Profiles More Secure (2 part lesson - 90 minutes total)
- Students will use analytical and reasoning skills to identify areas of vulnerability in an online profile and come up with strategies for how to make them more secure by applying information from a text.
- First, students will analyze their own personal profiles (if applicable). Then, they will analyze a provided “profile” to identify security holes. Last, discuss the answers and reasonings as a class.
*This lesson can be shortened to fit into one class period.
*(Optional) An extension idea is provided. It includes information from all lessons. Students will use what they have learned to create their own cybersecurity device.
Making a report of child exploitation is secure and easy. The form can be completed in just a few minutes, and you decide if you want to share your contact information. In fact, many of the fields are optional so what information you provide, is up to you.
This activity aims to engage middle-school students with cyberbiosecurity topics through a murder mystery-style puzzle. As the narrator, you will set the cybercrime scene and provide breadcrumbs along the way. Your students will serve as investigators, drawing connections between agricultural and computer science topics while they solve the crime. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurityThis work is supported by the USDA National Institute of Food and Agriculture, Women and Minorities in Science, Technology, Engineering, and Mathematics Fields (WAMS) Grants Program, award #2020-38503-31950.
This activity aims to engage middle-school students with cyberbiosecurity topics through a murder mystery-style puzzle. As the narrator, you will set the cybercrime scene and provide breadcrumbs along the way. Your students will serve as investigators, drawing connections between agricultural and computer science topics while they solve the crime. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurityThis work is supported by the USDA National Institute of Food and Agriculture, Women and Minorities in Science, Technology, Engineering, and Mathematics Fields (WAMS) Grants Program, award #2020-38503-31950.
This is a resource that describes the 5 Ws of Cyberbullying for students in grades K-8.
Students describe the dynamics of online cruelty and how it affects all the people involved. Students explain the difference between being a passive bystander versus a brave upstander in cyberbullying situations.
This website serves as a clearinghouse of information concerning the ways adolescents use and misuse technology. It is intended to be a resource for parents, educators, mental health professionals, law enforcement officers, counselors, and others who work with youth (as well as for youth themselves!). Here you will find facts, figures, and detailed stories from those who have been directly impacted by online aggression. In addition, the site includes numerous resources to help you prevent and respond to cyberbullying incidents. All of the information on this site is informed by over fifteen years of research.
In this lesson, students will learn about why their personal information is important and how they can keep it safe. They will also learn to pull out other people’s personal information and how that character/person can keep it safe.
TSW research different careers within cybersecurity to come up with an answer to the SOL Prompt “Many schools have partnerships with local companies and organizations that allow students to explore certain professions. Write a letter to the manager of a local workplace that performs the type of work that you would like to pursue. Convince the employer to allow you to visit. Include details about why you chose that workplace and the specific job.” After we have created and drafted a sample essay as a class, students will brainstorm, create a foldable/graphic organizer or outline of their ideas, and write their own response to the prompt question. As this is focused heavily on writing and modeling I recommend using this lesson in Q1 or Q2 (at the latest).
This is a simple worksheet crossword puzzle for cybersecurity. This can be used to reinforce key terms and definitations or as an assessment.
This lesson will be an introduction to cybersecurity and how to be safe online.
Warm-up activity designed to help students review physical security techniques for data.
These slides contain the vocabluary from the Virginia Department of Education.
Cybersecurity is a very important portion of computer science today. This activity has students complete a web search to find the ten things they feel you should know about some aspect of cybersecurity. This activity can be completed by a group of students or by an individual student.
In this lesson, students will review the development of the Constitution. To experience what this might be like, students will work together to create a set of rules, procedures, rights, and responsibilities needed to safely use computing devices and networks in our school. When they have finished they will compare their list to the school’s Acceptable Use Policy.
Students will use predetermined materials to create prototypes of badge covers to try to block RFID signals from being read.