Updating search results...

Search Resources

4 Results

View
Selected filters:
  • VA.8.CS.IC.1 - The student will assess the social impacts and ethical considerations ...
  • VA.8.CS.IC.1 - The student will assess the social impacts and ethical considerations ...
ACSE Region III - Cybersecurity
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will weigh the advantages of cybersecurity in protecting individuals and systems against potential disadvantages of the over-restriction of content and delivery.Students will communicate, verbally and in writing, the advantages or disadvantages of cybersecurity.

Subject:
Cybersecurity
English
Family and Consumer Sciences
Material Type:
Lesson Plan
Author:
Leigh-Ann Crim
Acse Grant
Date Added:
02/12/2022
Cybersecurity Web Search
Unrestricted Use
CC BY
Rating
0.0 stars

Cybersecurity is a very important portion of computer science today.  This activity has students complete a web search to find the ten things they feel you should know about some aspect of cybersecurity.  This activity can be completed by a group of students or by an individual student.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Mary GREER
Date Added:
05/31/2022
Simple Encryption (Code.org)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Overview: This lesson is presented by Code.org
Lesson 8: Cybersecurity - Simple Encryption

From the website:
OVERVIEW
"In this lesson, students are introduced to the need for encryption and simple techniques for breaking (or cracking) secret messages. Students try their own hand at cracking a message encoded with the classic Caesar cipher and also a Random Substitution Cipher. Students should become well-acquainted with idea that in an age of powerful computational tools, techniques of encryption will need to be more sophisticated. The most important aspect of this lesson is to understand how and why encryption plays a role in all of our lives every day on the Internet, and that making good encryption is not trivial. Students will get their feet wet with understanding the considerations that must go into making strong encryption in the face of powerful computational tools that can be used to crack it. The need for secrecy when sending bits over the Internet is important for anyone using the Internet."

OBJECTIVE
"Explain why encryption is an important need for everyday life on the Internet.
Crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget
Crack a message encrypted with random substitution using Frequency Analysis
Explain the weaknesses and security flaws of substitution ciphers"

The lesson is mapped out for teachers. It is easy to follow and includes vocabulary to cover, links to the necessary materials, and a teaching guide with background information, tips, and prompts.

AGENDA
Warm Up (10 min)
Classic Encryption - The Caesar Cipher

Activity (35 min)
Part 1 - Crack a Caesar Cipher
Part 2 - Crack a Random Substitution Cipher

Wrap Up (15 min)
Video: Encryption and Public Keys
Discussion
Career Discussion

***This lesson can be adapted for younger students but material covered aligns best with the current 8th grade Impacts of Computing Standards.

Subject:
Computer Science
Cybersecurity
Impacts of Computing
Material Type:
Activity/Lab
Interactive
Lesson Plan
Author:
code.org
Date Added:
02/02/2022