As technology becomes ever integrated into our food system and everyday life, …
As technology becomes ever integrated into our food system and everyday life, our food industry and supply become ever more vulnerable to attack. Cyber attacks continue to threaten large and small companies, government agencies, individuals, and food and agriculture. This module, ‘Securing the Food Industry,’ aims to introduce the idea of cyberbiosecurity through a lecture format along with three case studies allowing students to interact and think through the concepts and materials. This module was built for implementation into college level courses with connection or interest in the food industry, food science, and agriculture as well as and technology courses focused on real world applications. The lecture starts by introducing the amount of technology in food science and the food industry then transitions into concerns about security. After discussing multiple subtypes of security already integrated into the food industry, cyberbiosecurity is introduced. The term and definition are discussed before the categories of cyber attacks are introduced. The lecture relates these ideas back to the food industry before sharing a few real-life examples of detrimental cyber-attacks. The lecture concludes are explain the impact a cyber attack can cause, who is responsible for preventing and recovering from these attacks, as well as suggested practices to reduce vulnerabilities. Three theoretical but realistic case studies with discussion questions follow the lecture. These studies were written to act as small group discussion starters but could be used for whole class discussion, individual writing assignments, or other applications. A list of additional resources can be found with the course material. This list provides a small sampling of additional documents which discuss cyberbiosecurity. The resources listed at the end of the lecture are not included in the additional resources document but also provide helpful information in the exploration and understanding of cyberbiosecurity. Food science resources are also included in this document to provide additional background around the food industry portion of this course material.
Securing the Food Industry is an open educational resource (OER). Instructors reviewing, adopting, or adapting the module should indicate their interest at https://forms.gle/orFRGhYs8owBP7gD6.
Passwords are crucual in our world today. They give us a simple …
Passwords are crucual in our world today. They give us a simple measure to protect ourselves and our information online. This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates independent, partner, and whole group learning activities to determine what is a strong password and how to create it. All activities are low prep and can be modified to your needs.
Students will learn about cybersecurity and the importance of passwords to create …
Students will learn about cybersecurity and the importance of passwords to create a poster and commercial to show their NetSmartz, over a two-day lesson.
Today we do lots of activities online. Students need to know the …
Today we do lots of activities online. Students need to know the importance of having a secure password to keep their information safe when using the internet. In this lesson students will learn to make a safe password with a hands on activity.
Students will be able to distinguish between weak and strong passwords and …
Students will be able to distinguish between weak and strong passwords and how passwords could have looked in Ancient Egypt! Using the stamps, hieroglyphics stamps, magnetic letters, and papyrus paper, the students will be able to create passwords. Dive into the differences in Ancient Egypt and today and learn how to keep your information safe!
This is an unplugged version of how a man in the middle …
This is an unplugged version of how a man in the middle attack can happen and how data can be altered using rope, binder clips, envelopes and index cards.
Students will learn about Mask Letters and their use in the Revolutionary …
Students will learn about Mask Letters and their use in the Revolutionary War, then they will make masks and messages of their own and discuss the pros and cons of this method of sending and receiving secret messages.
Vocabulary posters for the Cybersecurity strand for the Middle School Elective. Words included …
Vocabulary posters for the Cybersecurity strand for the Middle School Elective. Words included are from the 2017 Computer Science Curriculum Framework.
Students will demonstrate how technology needs to be used appropriately and how …
Students will demonstrate how technology needs to be used appropriately and how to keep themselves and others safe on the internet and devices. In this lesson, students will learn about how to use technology appropriately and focus on the rules of Netiquette.
This activity incorporates a lesson on online safety with a whole-class review …
This activity incorporates a lesson on online safety with a whole-class review of astronomy. Students will review what is personal vs public information and the dangers of posting private information online. Then they will go around the room to examine astronomy posters. They’ll be hunting for personal details that WOULD NOT be safe for an individual to include in a public forum, like posters or online. They’ll also be looking for key ideas that they covered during their astronomy course.
Think before you click. When online make sure to stay safe, always …
Think before you click. When online make sure to stay safe, always keep your personal information private and make sure that the website you are using is safe and age appropriate. If you are unsure, ask a trusted adult.
In this lesson we will discuss the story of The Three Little …
In this lesson we will discuss the story of The Three Little Pigs and the types of houses that they built. Which ones were stronger and why? How do people protect themselves? In Ancient China they used a wall. Did that wall protect them? How? What are other ways people protect themselves? In today’s world we need to protect ourselves using strong passwords. How do we make a strong password? Today you will build a strong password. Then you will build a great wall that is as strong as the password that you created!
Looking for a fun way to teach both scientific method and cybersecurity? …
Looking for a fun way to teach both scientific method and cybersecurity? Well great job, you found it. Students will not only learn 5 characteristics to making a good password but they will also be using all of their 2.1, 3.1, and 4.1 strands to build and rebuild a structure using different materials that are probably inside your classroom right now. Need a STEM activity for a club day? Need a “Friday and I can’t teach anymore content” lesson? This is for you. Roll up your sleeves and let the students do the work and problem solve in a simple and fun way.
Students will be learning about the importance of building strong passwords! It's …
Students will be learning about the importance of building strong passwords! It's great that they will be able to see the real-world application of this concept through building pyramids like the ancient Egyptians. It's interesting to note how using different materials can determine the strength of a pyramid, just like how using different characters, symbols, and numbers can determine the strength of a password. This is a fun and engaging way for students to learn about cybersecurity.
Watch and explore the different ways the mouse can move (back- and- …
Watch and explore the different ways the mouse can move (back- and- forth, circular, straight, spinning), try to remember the password pattern to guess the correct password. The stronger and more difficult the code, the harder the password pattern will be to crack. Create a strong pattern so your classmates don’t crack your code!
This lesson will help teach students the importance of internet safety and …
This lesson will help teach students the importance of internet safety and ways that students can stay safe online. The students will also play various games to learn this concept. The students will play a game with magnets that teaches the concept of pushing/pulling (attract/repel) while learning internet safety.
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.