This lesson is presented by Code.org Lesson 8: Cybersecurity - Simple Encryption …
This lesson is presented by Code.org Lesson 8: Cybersecurity - Simple Encryption
From the website: OVERVIEW "In this lesson, students are introduced to the need for encryption and simple techniques for breaking (or cracking) secret messages. Students try their own hand at cracking a message encoded with the classic Caesar cipher and also a Random Substitution Cipher. Students should become well-acquainted with idea that in an age of powerful computational tools, techniques of encryption will need to be more sophisticated. The most important aspect of this lesson is to understand how and why encryption plays a role in all of our lives every day on the Internet, and that making good encryption is not trivial. Students will get their feet wet with understanding the considerations that must go into making strong encryption in the face of powerful computational tools that can be used to crack it. The need for secrecy when sending bits over the Internet is important for anyone using the Internet."
OBJECTIVE "Explain why encryption is an important need for everyday life on the Internet. Crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget Crack a message encrypted with random substitution using Frequency Analysis Explain the weaknesses and security flaws of substitution ciphers"
The lesson is mapped out for teachers. It is easy to follow and includes vocabulary to cover, links to the necessary materials, and a teaching guide with background information, tips, and prompts.
AGENDA Warm Up (10 min) Classic Encryption - The Caesar Cipher Activity (35 min) Part 1 - Crack a Caesar Cipher Part 2 - Crack a Random Substitution Cipher Wrap Up (15 min) Video: Encryption and Public Keys Discussion Career Discussion
Overview: This lesson is presented by Code.org Lesson 8: Cybersecurity - Simple …
Overview: This lesson is presented by Code.org Lesson 8: Cybersecurity - Simple Encryption
From the website: OVERVIEW "In this lesson, students are introduced to the need for encryption and simple techniques for breaking (or cracking) secret messages. Students try their own hand at cracking a message encoded with the classic Caesar cipher and also a Random Substitution Cipher. Students should become well-acquainted with idea that in an age of powerful computational tools, techniques of encryption will need to be more sophisticated. The most important aspect of this lesson is to understand how and why encryption plays a role in all of our lives every day on the Internet, and that making good encryption is not trivial. Students will get their feet wet with understanding the considerations that must go into making strong encryption in the face of powerful computational tools that can be used to crack it. The need for secrecy when sending bits over the Internet is important for anyone using the Internet."
OBJECTIVE "Explain why encryption is an important need for everyday life on the Internet. Crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget Crack a message encrypted with random substitution using Frequency Analysis Explain the weaknesses and security flaws of substitution ciphers"
The lesson is mapped out for teachers. It is easy to follow and includes vocabulary to cover, links to the necessary materials, and a teaching guide with background information, tips, and prompts.
AGENDA Warm Up (10 min) Classic Encryption - The Caesar Cipher
Activity (35 min) Part 1 - Crack a Caesar Cipher Part 2 - Crack a Random Substitution Cipher
Wrap Up (15 min) Video: Encryption and Public Keys Discussion Career Discussion
***This lesson can be adapted for younger students but material covered aligns best with the current 8th grade Impacts of Computing Standards.
This lesson will briefly introduce students to common computing systems they or …
This lesson will briefly introduce students to common computing systems they or their families use on a daily basis. The lesson focuses on responsible behaviors students can demonstrate to protect their information while using these computing systems. Students will learn to keep their information private, log out of shared devices, be respectful when communicating with others, and keep passwords private. All concepts are taught with the theme of becoming a technology superheros.
Students will learn about The Water Walker, Josephine Mandamin, and discuss and …
Students will learn about The Water Walker, Josephine Mandamin, and discuss and research topics related to the protection of our water sources. Students will then take their research and consider how advancements in technology over the past 50 years (specifically transportation and and business (shipping, manufacturing) have impacted the local water supplies.This lesson was created through a partnership between CodeVA and the Virginia Tribal Education Consortium (VTEC).
This is the 4th and last activity in the CS Heros Unit …
This is the 4th and last activity in the CS Heros Unit of Study.Students have watched a PBS CS video and read several articles about early computer science heros. Next, they took three short (5 to 9 questions) quiz. These math-up activites cover the computer scientists and inventors learned about (Parts 1-3) in the videos, articles, and quizzes. When all three parts and the match-ups are complete, my students type one paragraph to be shared in a collaborative presentation. We design this together in class to highlight how these CS Heros and their inventions have helped Virginia advance and grow in technology commerce as well as contribute to the global economy. Students make one slide with their paragraph and another with images of Virginia-based companys, technological discoveries, and/or computer scientists. Once slides are shared to me, I add them to the presentation and we upload the presentation to our Google Classroom. We review slides over the upcoming weeks, a few slides shared each day, until all students have presented.
Students will watch a PBS CS video and read an article about …
Students will watch a PBS CS video and read an article about early computer science heros. Next, they will take a quick 9 question quiz. This is the first part of three total lessons in the unit. There is also a fourth part, which is an interactive match-up of all the heros and their inventions compbined from all three parts. When all three parts and the match-up are complete, my students type one paragraph that is shared in a collaborative presentation we design together in class to highlight how these CS Heros and their inventions have helped Virginia advance and grow in technology commerce as well as contribute to the global economy. Students make one slide with their paragraph and another with images of Virginia-based companys, technological discoveries, and/or computer scientists. Once slides are shared to me, I add them to the presentation and we upload the presentation to our Google Classroom and review them over the upcoming weeks, a few slides shared each day, until all students have presented.
Students will watch a PBS CS video and read an article about …
Students will watch a PBS CS video and read an article about early computer science heros. Next, they will take a quick 9 question quiz. This is the second part of three total lessons in the unit. There is also a fourth part, which is an interactive match-up of all the heros and their inventions combined from all three parts. When all three parts and the match-ups are complete, my students type one paragraph that is shared in a collaborative presentation we design together in class to highlight how these CS Heros and their inventions have helped Virginia advance and grow in technology commerce as well as contribute to the global economy. Students make one slide with their paragraph and another with images of Virginia-based companys, technological discoveries, and/or computer scientists. Once slides are shared to me, I add them to the presentation and we upload the presentation to our Google Classroom and review them over the upcoming weeks, a few slides shared each day, until all students have presented.
Students will watch a PBS CS video and read an article about …
Students will watch a PBS CS video and read an article about early computer science heros. Next, they will take a quick 9 question quiz. This is the third part of three total lessons in the unit. There is also a fourth part, which is an interactive match-up of all the heros and their inventions combined from all three parts. When all three parts and the match-up are complete, my students type one paragraph that is shared in a collaborative presentation we design together in class to highlight how these CS Heros and their inventions have helped Virginia advance and grow in technology commerce as well as contribute to the global economy. Students make one slide with their paragraph and another with images of Virginia-based companys, technological discoveries, and/or computer scientists. Once slides are shared to me, I add them to the presentation and we upload the presentation to our Google Classroom and review them over the upcoming weeks, a few slides shared each day, until all students have presented.
This is a writing prompt choice board intended to be used in …
This is a writing prompt choice board intended to be used in a writing center or station. In my classroom we typically use one choice board per week. Students choose up to 4 items to complete for the week. I do 4 items to give students time to finish incomplete work on Fridays, to work on final drafts, to edit a selected item, or to share their writing with peers. You can make the rules for your classroom to best suit your teaching style and your student's needs.
The choice board includes 8 prompts and one Student Choice square based on Impacts of Computing standards for first grade.
Please feel free to make a copy of the choice board and edit it to meet your specifications.
This activity is a worksheet or quiz based on the Ted Talk …
This activity is a worksheet or quiz based on the Ted Talk YouTube video titled Gaming can make a better world. This is an older video but has some good information about how gaming can be used for problem solving.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.