Updating search results...

Search Resources

13 Results

View
Selected filters:
  • VA.3.CS.CYB.3 - The student will define and explain cybersecurity.
  • VA.3.CS.CYB.3 - The student will define and explain cybersecurity.
ASCE Region III - Perfect Password
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This performance task is designed for third grade and up to teach the importance of using strong passwords.  This would be helpful to use at the beginning of the year to review password safety with upper elementary school students to refresh their memory.  This includes an instructional slide show and a student handout.

Subject:
Computer Science
Cybersecurity
Government and Civics
Material Type:
Lesson
Author:
Yvonne Richard
Acse Grant
Lindsay Sutton
Jessica Sheidy
Date Added:
02/12/2022
Building Passwords
Unrestricted Use
Public Domain
Rating
0.0 stars

This is an unplugged worksheet activity to walk students through the process of building strong, easy to remember, passwords.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Homework/Assignment
Author:
Jude Raffeinner
Date Added:
01/28/2022
Building a Better Password
Unrestricted Use
Public Domain
Rating
0.0 stars

This slideshow will help students to identify and use strong passwords, and explain why strong passwords should be used (e.g., protect name, address, and telephone number). It walks students through a process that can be used to create strong, easy to remember, passwords.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Homework/Assignment
Author:
Jude Raffeinner
Date Added:
01/29/2022
CS Unplugged: Security Avatars
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Every day our privacy is at risk with data being collected about us as we share and live more of our lives online. For this activity, you will explore how you do and do not protect your privacy online and then create a security avatar to help you battle for your privacy.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Kim Wilkens
Date Added:
03/02/2020
Net Etiquette
Unrestricted Use
CC BY
Rating
0.0 stars

Students will demonstrate how technology needs to be used appropriately and how to keep themselves and others safe on the internet and devices.  In this lesson, students will learn about how to use technology appropriately and focus on the rules of Netiquette. 

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Erika Coble
Date Added:
06/27/2022
Password Guessing Game 3.11, 4.11
Unrestricted Use
CC BY
Rating
0.0 stars

Strand: Cybersecurity3.11 The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.4.11 The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.Private information such as your phone number, address, favorite foods, or where you like to vacation should be carefully guarded. Passwords are a way to protect devices and information from unauthorized access. There are many ways a password can be guessed or stolen from a user.This activity allows students to take turns guessing simple passwords.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Robert Underwood
Date Added:
05/02/2022
Safe Websites and Research
Unrestricted Use
CC BY
Rating
0.0 stars

A lesson plan complete with video and research activity to explore the characteristics of safe websites. 

Subject:
Cross-Curricular
Material Type:
Activity/Lab
Author:
Barbara Matney
Date Added:
04/18/2022
Strong Passwords Game on Gamilab
Unrestricted Use
CC BY
Rating
0.0 stars

Strong Passwords is a "King of the Mountain" style game created using Gamilab. Students will answer ten true or false questions about passwords in order to help the climber get to the top of the mountain. It is based on SOL 3.11: The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.

Subject:
Computer Science
Cybersecurity
Material Type:
Game
Author:
Dana Smith
Date Added:
08/04/2021