Updating search results...

Search Resources

161 Results

View
Selected filters:
  • Cybersecurity
An Introduction to Cyberbiosecurity for Food Science
Unrestricted Use
CC BY
Rating
0.0 stars

As technology becomes ever integrated into our food system and everyday life, our food industry and supply become ever more vulnerable to attack. Cyber attacks continue to threaten large and small companies, government agencies, individuals, and food and agriculture. This module, ‘Securing the Food Industry,’ aims to introduce the idea of cyberbiosecurity through a lecture format along with three case studies allowing students to interact and think through the concepts and materials. This module was built for implementation into college level courses with connection or interest in the food industry, food science, and agriculture as well as and technology courses focused on real world applications.
The lecture starts by introducing the amount of technology in food science and the food industry then transitions into concerns about security. After discussing multiple subtypes of security already integrated into the food industry, cyberbiosecurity is introduced. The term and definition are discussed before the categories of cyber attacks are introduced. The lecture relates these ideas back to the food industry before sharing a few real-life examples of detrimental cyber-attacks. The lecture concludes are explain the impact a cyber attack can cause, who is responsible for preventing and recovering from these attacks, as well as suggested practices to reduce vulnerabilities. Three theoretical but realistic case studies with discussion questions follow the lecture. These studies were written to act as small group discussion starters but could be used for whole class discussion, individual writing assignments, or other applications.
A list of additional resources can be found with the course material. This list provides a small sampling of additional documents which discuss cyberbiosecurity. The resources listed at the end of the lecture are not included in the additional resources document but also provide helpful information in the exploration and understanding of cyberbiosecurity. Food science resources are also included in this document to provide additional background around the food industry portion of this course material.

Securing the Food Industry is an open educational resource (OER). Instructors reviewing, adopting, or adapting the module should indicate their interest at https://forms.gle/orFRGhYs8owBP7gD6.

Subject:
Agricultural Education
CTE
Computer Science
Cybersecurity
Professional Learning
Science
Material Type:
Case Study
Lecture Notes
Module
Author:
Andrew Ray
Susan E Duncan
Yun Yin
Rebekah J MIller
Date Added:
09/24/2022
Intro to Cybersecurity: What Makes a Good Password?
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Passwords are crucual in our world today. They give us a simple measure to protect ourselves and our information online. This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates independent, partner, and whole group learning activities to determine what is a strong password and how to create it. All activities are low prep and can be modified to your needs. 

Subject:
Cross-Curricular
Cybersecurity
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Mary Dickerson
Date Added:
12/02/2022
Maggie Walker and Safe Passwords
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Today we do lots of activities online. Students need to know the importance of having a secure password to keep their information safe when using the internet. In this lesson students will learn to make a safe password with a hands on activity.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
History/Social Sciences
STEM/STEAM
Social Sciences
Material Type:
Lesson
Author:
Wanda Plum
Date Added:
04/17/2024
Making Ancient Egypt Safe
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will be able to distinguish between weak and strong passwords and how passwords could have looked in Ancient Egypt!  Using the stamps, hieroglyphics stamps, magnetic letters, and papyrus paper, the students will be able to create passwords.  Dive into the differences in Ancient Egypt and today and learn how to keep your information safe!

Subject:
Computer Science
Cybersecurity
Social Sciences
Material Type:
Activity/Lab
Lesson Plan
Author:
Brooke Atwood
Date Added:
02/13/2024
Masked Letters
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will learn about Mask Letters and their use in the Revolutionary War, then they will make masks and messages of their own and discuss the pros and cons of this method of sending and receiving secret messages. 

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023
Middle School Elective Computer Science: Cybersecurity Vocabulary Posters
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Vocabulary posters for the Cybersecurity strand for the Middle School Elective. Words included are from the 2017 Computer Science Curriculum Framework.

Subject:
Computer Science
Cybersecurity
Material Type:
Visual Media
Author:
Kelly Odom
Date Added:
02/21/2022
My School Internet Policy
Unrestricted Use
CC BY
Rating
0.0 stars

Students use the school internet policy to answer questions about the school's rules and guidelines for internet and device use.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Christopher McElraft
Date Added:
05/02/2022
Net Etiquette
Unrestricted Use
CC BY
Rating
0.0 stars

Students will demonstrate how technology needs to be used appropriately and how to keep themselves and others safe on the internet and devices.  In this lesson, students will learn about how to use technology appropriately and focus on the rules of Netiquette. 

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Erika Coble
Date Added:
06/27/2022
PAGE ACSE -  Astronomy - Don’t make it personal!
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This activity incorporates a lesson on online safety with a whole-class review of astronomy.  Students will review what is personal vs public information and the dangers of posting private information online.  Then they will go around the room to examine astronomy posters.  They’ll be hunting for personal details that WOULD NOT be safe for an individual to include in a public forum, like posters or online.  They’ll also be looking for key ideas that they covered during their astronomy course.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Earth and Space Systems
STEM/STEAM
Science
Material Type:
Lesson
Lesson Plan
Author:
Julie Morton
Date Added:
11/18/2024
PAGE ACSE -  Be a Internet Safety Rock Star
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Think before you click. When online make sure to stay safe, always keep your personal information private and make sure that the website you are using is safe and age appropriate. If you are unsure, ask a trusted adult.

Subject:
Computer Science
Cybersecurity
History/Social Sciences
Material Type:
Activity/Lab
Lesson
Lesson Plan
Reading
Visual Media
Author:
Lisa Greber
Date Added:
03/03/2024
PAGE ACSE -  Building Passwords as strong as the Great Wall of China
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson we will discuss the story of  The Three Little Pigs and the types of houses that they built.  Which ones were stronger and why?   How do people protect themselves?  In Ancient China they used a wall. Did that wall protect them?  How?  What are other ways people protect themselves?  In today’s world we need to protect ourselves using strong passwords.  How do we make a strong password?  Today you will build a strong password.  Then you will build a great wall that is as strong as the password that you created!

Subject:
Computer Science
Cross-Curricular
Cybersecurity
History/Social Sciences
STEM/STEAM
World History
Material Type:
Activity/Lab
Lesson
Lesson Plan
Reading
Author:
Tricia Nesselrodt
Date Added:
03/13/2024
PAGE ACSE -  Building Stronger Passwords Image
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Looking for a fun way to teach both scientific method and cybersecurity? Well great job, you found it. Students will not only learn 5 characteristics to making a good password but they will also be using all of their 2.1, 3.1, and 4.1 strands to build and rebuild a structure using different materials that are probably inside your classroom right now.  Need a STEM activity for a club day? Need a “Friday and I can’t teach anymore content” lesson? This is for you. Roll up your sleeves and let the students do the work and problem solve in a simple and fun way.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
STEM/STEAM
Science
Scientific and Engineering Practices
Material Type:
Activity/Lab
Homework/Assignment
Lesson Plan
Author:
Nichole Brumfield
Date Added:
01/23/2024
PAGE ACSE -   Building strong Passwords & Pyramids
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

​​​​​​Students will be learning about the importance of building strong passwords! It's great that they will be able to see the real-world application of this concept through building pyramids like the ancient Egyptians. It's interesting to note how using different materials can determine the strength of a pyramid, just like how using different characters, symbols, and numbers can determine the strength of a password. This is a fun and engaging way for students to learn about cybersecurity.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Author:
Kelly Rickard
Date Added:
04/29/2024
PAGE ACSE -  Create a strong password pathway using motion
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Watch and explore the different ways the mouse can move (back- and- forth, circular, straight, spinning), try to remember the password pattern to guess the correct password. The stronger and more difficult the code, the harder the password pattern will be to crack. Create a strong pattern so your classmates don’t crack your code!

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Force/Motion/Energy
STEM/STEAM
Science
Material Type:
Activity/Lab
Interactive
Lesson
Author:
Amanda Dofflemyer
Date Added:
03/05/2024
PAGE ACSE-Creating a Digitally Responsible Water Cycle
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Create a Water Cycle with your students while also teaching them about Internet Safety and Digital Citizenship!

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Earth Resources
STEM/STEAM
Science
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Kathryn Pallister
Date Added:
03/21/2024
PAGE ACSE - Cyber Safety Awareness
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Let’s stay safe online!  Be a danger ranger and protect yourself from online and offline predators!

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Government and Civics
History/Social Sciences
STEM/STEAM
Material Type:
Activity/Lab
Lesson
Lesson Plan
Reading
Teaching/Learning Strategy
Visual Media
Author:
Shannon Painter
Date Added:
03/11/2024
PAGE ACSE -  CyberSecurity Equation Word Problems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

The student will complete equation word problems with them all having the theme of Cybersecruity. Then as a class discuss Cybersecruity.

Subject:
Algebra I & II
Computer Science
Cross-Curricular
Cybersecurity
Mathematics
STEM/STEAM
Material Type:
Lesson
Lesson Plan
Author:
Christian Knight
Date Added:
11/06/2024
PAGE ACSE - Cybersecurity
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This lesson will help teach students the importance of internet safety and ways that students can stay safe online.  The students will also play various games to learn this concept.  The students will play a game with magnets that teaches the concept of pushing/pulling (attract/repel) while learning internet safety.  

Subject:
Computer Science
Cross-Curricular
Cybersecurity
Force/Motion/Energy
Science
Material Type:
Activity/Lab
Interactive
Lecture
Lesson
Lesson Plan
Teaching/Learning Strategy
Author:
Michelle Garber
Date Added:
03/11/2024