The lessons provided are presented by Scholastic and sponsored by Norton Lifelock. …
The lessons provided are presented by Scholastic and sponsored by Norton Lifelock. All rights reserved by Scholastic. Below is an overview of the three lessons provided. The lessons do not coincide with one another. The teacher can choose to use all three or select the best option for the classroom needs.
The PDF Links includes: Lesson 1: Understanding Online Safety (45 minutes) - Students will analyze text, citing evidence and summarizing central ideas. They will make inferences to create their own cybersecurity protection plan. - Students will use the provided copy of #Cybersmarts student magazine to create their personalized online protection plan.
Lesson 2: Identifying Preventive Technologies (45 minutes + presentation time) - Students will conduct research on preventive technologies built and used by professionals in the cybersecurity field (e.g., firewalls, ad blocker apps, antivirus software, voice recognition software, virtual private network (VPN), etc.). - Students will then prepare a presentation - the given choices are a skit or interview. Presentation options can be easily adapted to best fit your classroom needs. - Research planning/ gathering page is provided.
Lesson 3: Making Online Profiles More Secure (2 part lesson - 90 minutes total) - Students will use analytical and reasoning skills to identify areas of vulnerability in an online profile and come up with strategies for how to make them more secure by applying information from a text. - First, students will analyze their own personal profiles (if applicable). Then, they will analyze a provided “profile” to identify security holes. Last, discuss the answers and reasonings as a class. *This lesson can be shortened to fit into one class period. *(Optional) An extension idea is provided. It includes information from all lessons. Students will use what they have learned to create their own cybersecurity device.
This activity aims to engage middle-school students with cyberbiosecurity topics through a …
This activity aims to engage middle-school students with cyberbiosecurity topics through a murder mystery-style puzzle. As the narrator, you will set the cybercrime scene and provide breadcrumbs along the way. Your students will serve as investigators, drawing connections between agricultural and computer science topics while they solve the crime. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurityThis work is supported by the USDA National Institute of Food and Agriculture, Women and Minorities in Science, Technology, Engineering, and Mathematics Fields (WAMS) Grants Program, award #2020-38503-31950.
This activity aims to engage middle-school students with cyberbiosecurity topics through a …
This activity aims to engage middle-school students with cyberbiosecurity topics through a murder mystery-style puzzle. As the narrator, you will set the cybercrime scene and provide breadcrumbs along the way. Your students will serve as investigators, drawing connections between agricultural and computer science topics while they solve the crime. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurityThis work is supported by the USDA National Institute of Food and Agriculture, Women and Minorities in Science, Technology, Engineering, and Mathematics Fields (WAMS) Grants Program, award #2020-38503-31950.
In this lesson, students will learn about why their personal information is …
In this lesson, students will learn about why their personal information is important and how they can keep it safe. They will also learn to pull out other people’s personal information and how that character/person can keep it safe.
Cybersecurity is a very important portion of computer science today. This activity …
Cybersecurity is a very important portion of computer science today. This activity has students complete a web search to find the ten things they feel you should know about some aspect of cybersecurity. This activity can be completed by a group of students or by an individual student.
In this lesson, students will review the development of the Constitution. To …
In this lesson, students will review the development of the Constitution. To experience what this might be like, students will work together to create a set of rules, procedures, rights, and responsibilities needed to safely use computing devices and networks in our school. When they have finished they will compare their list to the school’s Acceptable Use Policy.
This activity introduces cybersecurity concerns with technologies commonly used in the livestock …
This activity introduces cybersecurity concerns with technologies commonly used in the livestock industry in the context of a "clue" style activity in which students act as private investigators looking for a lost racehorse. It can be facilitated in 90 minutes, either in a single session or 4-5 shorter sessions. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity
Students will use their knowledge of famous Americans to create a “strong …
Students will use their knowledge of famous Americans to create a “strong password.” They will then write a password for their given person using invisible ink.
This is an introductory lesson on encryption and decryption. It includes a …
This is an introductory lesson on encryption and decryption. It includes a discussion about the importance of protecting data when communicating across a network. The data is protected through a process of encryption and decryption.Students are asked to decrypt a message (in this case, a scientific fact to reinforce knowledge ) using the encrypted message and a decryption key.
This is an introductory lesson on encryption and decryption. It includes a …
This is an introductory lesson on encryption and decryption. It includes a discussion about the importance of protecting data when communicating across a network. The data is protected through a process of encryption and decryption.Students are asked to decrypt a message (in this case, a scientific fact to reinforce knowledge ) using the encrypted message and a decryption key.
The student will use the present mode in slides to play a …
The student will use the present mode in slides to play a game about digital citizenship and good social media choices individually or in small groups (or with partners).
On this episode we travel to Henrico County to visit with Yvette …
On this episode we travel to Henrico County to visit with Yvette Lee of J.R. Tucker High School. Mrs. Lee is a finalist for the 2023 Presidential Award for Math and Science Teaching sponsored by the White House and the National Science Foundation. She talked about the challenges of learning how to teach American students after leaving South Korea. We also caught up with Louisa County Technology Coach Nikki Wagoner at the 2023 VSTE Conference in Roanoke.
Empower yourself this election season: learn to navigate the sea of information …
Empower yourself this election season: learn to navigate the sea of information and distinguish fact from fiction in both traditional and social media!
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.