Updating search results...

Search Resources

12 Results

View
Selected filters:
  • VA.5.CS.CYB.1 - The student will identify ways to limit unauthorized access on computi...
  • VA.5.CS.CYB.1 - The student will identify ways to limit unauthorized access on computi...
Appropriate Use of Technology 5.9
Unrestricted Use
CC BY
Rating
0.0 stars

Students will read a passage about Sarah and Thomas and underline any use of technology in the passage. They will then write “AP” for appropriate or “IN” for inappropriate above any use of technology.5.9  The student will evaluate and solve problems that relate to inappropriate use of computing devices and networks.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Author:
Robert Underwood
Date Added:
05/17/2022
CS Unplugged: Security Avatars
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Every day our privacy is at risk with data being collected about us as we share and live more of our lives online. For this activity, you will explore how you do and do not protect your privacy online and then create a security avatar to help you battle for your privacy.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Kim Wilkens
Date Added:
03/02/2020
#CyberSmarts (3 Lessons by Scholastic)
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The lessons provided are presented by Scholastic and sponsored by Norton Lifelock.
All rights reserved by Scholastic.
Below is an overview of the three lessons provided.
The lessons do not coincide with one another.
The teacher can choose to use all three or select the best option for the classroom needs.

The PDF Links includes:
Lesson 1: Understanding Online Safety (45 minutes)
- Students will analyze text, citing evidence and summarizing central ideas. They will make inferences to create their own cybersecurity protection plan.
- Students will use the provided copy of #Cybersmarts student magazine to create their personalized online protection plan.

Lesson 2: Identifying Preventive Technologies (45 minutes + presentation time)
- Students will conduct research on preventive technologies built and used by professionals in the cybersecurity field (e.g., firewalls, ad blocker apps, antivirus software, voice recognition software, virtual private network (VPN), etc.).
- Students will then prepare a presentation - the given choices are a skit or interview. Presentation options can be easily adapted to best fit your classroom needs.
- Research planning/ gathering page is provided.

Lesson 3: Making Online Profiles More Secure (2 part lesson - 90 minutes total)
- Students will use analytical and reasoning skills to identify areas of vulnerability in an online profile and come up with strategies for how to make them more secure by applying information from a text.
- First, students will analyze their own personal profiles (if applicable). Then, they will analyze a provided “profile” to identify security holes. Last, discuss the answers and reasonings as a class.
*This lesson can be shortened to fit into one class period.
*(Optional) An extension idea is provided. It includes information from all lessons. Students will use what they have learned to create their own cybersecurity device.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Lesson Plan
Reading
Author:
Norton Lifelock
Scholastic
Date Added:
02/02/2022
Deciphering Facts
Unrestricted Use
CC BY
Rating
0.0 stars

This is an introductory lesson on encryption and decryption. It includes a discussion about the importance of protecting data when communicating across a network. The data is protected through a process of encryption and decryption.Students are asked to decrypt a message (in this case, a scientific fact to reinforce knowledge ) using the encrypted message and a decryption key.

Subject:
Cybersecurity
Material Type:
Lesson Plan
Author:
Jude Raffeinner
Date Added:
11/24/2021
Intro to Cybersecurity: What Makes a Good Password?
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Passwords are crucual in our world today. They give us a simple measure to protect ourselves and our information online. This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates independent, partner, and whole group learning activities to determine what is a strong password and how to create it. All activities are low prep and can be modified to your needs. 

Subject:
Cross-Curricular
Cybersecurity
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Mary Dickerson
Date Added:
12/02/2022
Josephine Baker - Hidden Messages
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

American performer Josephine Baker used her star-status access to spy for the Allies in WWII and convey information to the Allies by using invisible ink on her sheet music. We’ll look at a few methods that can be used to hide messages “in plain sight”?

Subject:
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Author:
CodeVA Curriculum
Lola Lloyd
Date Added:
03/17/2023
My School Internet Policy
Unrestricted Use
CC BY
Rating
0.0 stars

Students use the school internet policy to answer questions about the school's rules and guidelines for internet and device use.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Christopher McElraft
Date Added:
05/02/2022
Safe Websites and Research
Unrestricted Use
CC BY
Rating
0.0 stars

A lesson plan complete with video and research activity to explore the characteristics of safe websites. 

Subject:
Cross-Curricular
Material Type:
Activity/Lab
Author:
Barbara Matney
Date Added:
04/18/2022
Strong Passwords
Unrestricted Use
CC BY
Rating
0.0 stars

This is a link for an activity on the website www.quizizz.com. The activity reviews the concepts of creating and using a strong password for online sites.

Subject:
Cybersecurity
Material Type:
Interactive
Author:
Mary GREER
Date Added:
06/28/2022