Students will create a strong password to access a computer and/or website. …
Students will create a strong password to access a computer and/or website. The password must meet specific criteria. Once the students master the criteria, they will reveal their secret password with their teacher, using a highlighter and a blacklight.
This is an unplugged version of how a man in the middle …
This is an unplugged version of how a man in the middle attack can happen and how data can be altered using rope, binder clips, envelopes and index cards.
Students will demonstrate how technology needs to be used appropriately and how …
Students will demonstrate how technology needs to be used appropriately and how to keep themselves and others safe on the internet and devices. In this lesson, students will learn about how to use technology appropriately and focus on the rules of Netiquette.
This activity introduces the idea of cyberbiosecurity in the context of a …
This activity introduces the idea of cyberbiosecurity in the context of a "clue" style activity focused on vulnerabilities in the U.S. food system. It can be facilitated in 60 minutes, either in a single session or 3-4 shorter sessions. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity
No restrictions on your remixing, redistributing, or making derivative works. Give credit to the author, as required.
Your remixing, redistributing, or making derivatives works comes with some restrictions, including how it is shared.
Your redistributing comes with some restrictions. Do not remix or make derivative works.
Most restrictive license type. Prohibits most uses, sharing, and any changes.
Copyrighted materials, available under Fair Use and the TEACH Act for US-based educators, or other custom arrangements. Go to the resource provider to see their individual restrictions.