Search Resources

66 Results

View
Selected filters:
  • Cybersecurity
ACSE Region III - Cybersecurity
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating

Students will weigh the advantages of cybersecurity in protecting individuals and systems against potential disadvantages of the over-restriction of content and delivery.Students will communicate, verbally and in writing, the advantages or disadvantages of cybersecurity.

Subject:
Cybersecurity
Family and Consumer Sciences
English
Material Type:
Lesson Plan
Author:
Leigh-Ann Crim
Acse Grant
Date Added:
02/12/2022
ACSE Region III - Get a Job! Computer Science and Persuasive Messaging
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating

Get a Job! Students will use their persuasive messaging skills to research and promote various computer science fields in the unit.

Subject:
Computer Science
Cybersecurity
Communication and Multimodal Literacy
Research
Material Type:
Lesson Plan
Author:
Nathan Sekinger
E. Grimstead
Acse Grant
Date Added:
02/12/2022
ASCE Region III - Perfect Password
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating

This performance task is designed for third grade and up to teach the importance of using strong passwords.  This would be helpful to use at the beginning of the year to review password safety with upper elementary school students to refresh their memory.  This includes an instructional slide show and a student handout.

Subject:
Computer Science
Cybersecurity
Government and Civics
Material Type:
Lesson
Author:
Yvonne Richard
Laura Michaels
Jessica Sheidy
Lindsay Sutton
Acse Grant
Date Added:
02/12/2022
Appropriate Use of Technology 5.9
Unrestricted Use
CC BY
Rating

Students will read a passage about Sarah and Thomas and underline any use of technology in the passage. They will then write “AP” for appropriate or “IN” for inappropriate above any use of technology.5.9  The student will evaluate and solve problems that relate to inappropriate use of computing devices and networks.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Author:
Robert Underwood
Date Added:
05/17/2022
Building a Better Password
Unrestricted Use
Public Domain
Rating

This slideshow will help students to identify and use strong passwords, and explain why strong passwords should be used (e.g., protect name, address, and telephone number). It walks students through a process that can be used to create strong, easy to remember, passwords.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Homework/Assignment
Author:
Jude Raffeinner
Date Added:
01/29/2022
C.S. 7.6 Baamboozle Game on Digital and Physical Security
Unrestricted Use
CC BY
Rating

This is game designed on Baamboozle.com that is based on the Computer Science standard 7.6 in Cybersecurity where users must answer questions to distinguish the difference between a physical and a digital security measures.

Subject:
Computer Science
Cybersecurity
Material Type:
Game
Visual Media
Author:
Dana Smith
Date Added:
12/26/2021
C.S. SOL 2.9 PowerPoint on Computer Rules
Unrestricted Use
CC BY
Rating

This is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint based on the Computer Science standard 2.9 that reminds students of the rules of using computers appropriately at schoolThis is a PowerPoint presentation that is based on the Computer Science standard in Cybersecurity, SOL C.S. 2.9 where students will be reminded of the rules of how to use and handle their computers safely and responsibly. 

Subject:
Computer Science
Cybersecurity
Material Type:
Visual Media
Author:
Dana Smith
Date Added:
12/28/2021
Ciphers and Encryption Part 1:  Pigpen Cipher
Unrestricted Use
CC BY
Rating

The student or class will watch a video clip about spies and secret codes from the past.  Next students will be able to use a Pigpen cipher to crack a secret message of their own.  Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Ciphers and Encryption Part 2:  Vigenère Square
Unrestricted Use
CC BY
Rating

The student or class will watch a video clip about how to decode a Vigenère Square Cipher.Next students will be able to use the cipher to crack a secret message of their own (teacher provided messages in a hat (not inlcuded)).  One student chooses the word or phrase, the teacher puts the key (word) on the board, that same student will encrypt the message and send it to their partner.  The partner with use the same key word to return the text to plain text revealing the message and send their guess back to their partner. Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five (part 2) and can be used alone, or with other lessons in the series. Vigenère Square Ciphefrom the past.  Next students will be able to use a Pigpen cipher to crack a secret message of their own.  Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five. Vigenère Square Ciphe

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Ciphers and Encryption Part 3:  Morse Code
Unrestricted Use
CC BY
Rating

The student will watch a brief video about the first Morse Code ever sent and how it impacted American communications, even today.  Students will be able to decipher a short Morse Code code (SOS).  They will also learn about Kryptos, an artwork that contains four secretive messages and is placed on display outside of the CIA headquarters. 

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Creating Strong Passwords
Unrestricted Use
CC BY
Rating

This unit is geared toward students in 4th grade.  This lesson has students identify why passwords are important and how we can create and remember strong passwords that keep our information safe while online.  There are mutltiple resources with this lesson including the lesson plan, a slides presentation to guide the lesson, and interactive video guide, and finally a password practice sheet.  This lesson could be divided up over multiple days and can also be differentiated to different age students.

Subject:
Cybersecurity
Material Type:
Interactive
Lesson Plan
Student Guide
Author:
Christina Martin
Date Added:
02/09/2022
#CyberSmarts (3 Lessons by Scholastic)
Only Sharing Permitted
CC BY-NC-ND
Rating

The lessons provided are presented by Scholastic and sponsored by Norton Lifelock.
All rights reserved by Scholastic.
Below is an overview of the three lessons provided.
The lessons do not coincide with one another.
The teacher can choose to use all three or select the best option for the classroom needs.

The PDF Links includes:
Lesson 1: Understanding Online Safety (45 minutes)
- Students will analyze text, citing evidence and summarizing central ideas. They will make inferences to create their own cybersecurity protection plan.
- Students will use the provided copy of #Cybersmarts student magazine to create their personalized online protection plan.

Lesson 2: Identifying Preventive Technologies (45 minutes + presentation time)
- Students will conduct research on preventive technologies built and used by professionals in the cybersecurity field (e.g., firewalls, ad blocker apps, antivirus software, voice recognition software, virtual private network (VPN), etc.).
- Students will then prepare a presentation - the given choices are a skit or interview. Presentation options can be easily adapted to best fit your classroom needs.
- Research planning/ gathering page is provided.

Lesson 3: Making Online Profiles More Secure (2 part lesson - 90 minutes total)
- Students will use analytical and reasoning skills to identify areas of vulnerability in an online profile and come up with strategies for how to make them more secure by applying information from a text.
- First, students will analyze their own personal profiles (if applicable). Then, they will analyze a provided “profile” to identify security holes. Last, discuss the answers and reasonings as a class.
*This lesson can be shortened to fit into one class period.
*(Optional) An extension idea is provided. It includes information from all lessons. Students will use what they have learned to create their own cybersecurity device.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Lesson Plan
Reading
Author:
Norton Lifelock
Scholastic
Date Added:
02/02/2022