Updating search results...

Search Resources

56 Results

View
Selected filters:
  • cybersecurity
Culper Spy Ring
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will learn about one of the most significant and successful spy rings in American History. They will also actually conduct some of the same techniques and demonstrate them to the rest of the class.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Thea Clark
Date Added:
11/30/2023
#CyberSmarts (3 Lessons by Scholastic)
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The lessons provided are presented by Scholastic and sponsored by Norton Lifelock.
All rights reserved by Scholastic.
Below is an overview of the three lessons provided.
The lessons do not coincide with one another.
The teacher can choose to use all three or select the best option for the classroom needs.

The PDF Links includes:
Lesson 1: Understanding Online Safety (45 minutes)
- Students will analyze text, citing evidence and summarizing central ideas. They will make inferences to create their own cybersecurity protection plan.
- Students will use the provided copy of #Cybersmarts student magazine to create their personalized online protection plan.

Lesson 2: Identifying Preventive Technologies (45 minutes + presentation time)
- Students will conduct research on preventive technologies built and used by professionals in the cybersecurity field (e.g., firewalls, ad blocker apps, antivirus software, voice recognition software, virtual private network (VPN), etc.).
- Students will then prepare a presentation - the given choices are a skit or interview. Presentation options can be easily adapted to best fit your classroom needs.
- Research planning/ gathering page is provided.

Lesson 3: Making Online Profiles More Secure (2 part lesson - 90 minutes total)
- Students will use analytical and reasoning skills to identify areas of vulnerability in an online profile and come up with strategies for how to make them more secure by applying information from a text.
- First, students will analyze their own personal profiles (if applicable). Then, they will analyze a provided “profile” to identify security holes. Last, discuss the answers and reasonings as a class.
*This lesson can be shortened to fit into one class period.
*(Optional) An extension idea is provided. It includes information from all lessons. Students will use what they have learned to create their own cybersecurity device.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Lesson Plan
Reading
Author:
Norton Lifelock
Scholastic
Date Added:
02/02/2022
Cybersecurity and crime
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Google Security Princess Parisa Tabriz and Jenny Martin from Symantec introduce the most common types of cybercrime, including viruses, malware, DDOS attacks and phishing scams.

Subject:
Computer Science
Science
Material Type:
Lesson
Provider:
Khan Academy
Provider Set:
Code.org
Author:
Code.org
Khan Academy
Date Added:
07/07/2022
Cybersecurity to Solve the Mystery of the Kentucky Derby Disappearance!
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This activity introduces cybersecurity concerns with technologies commonly used in the livestock industry  in the context of a "clue" style activity in which students act as private investigators looking for a lost racehorse. It can be facilitated in 90 minutes, either in a single session or 4-5 shorter sessions. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Cybersecurity
Material Type:
Lesson Plan
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
10/30/2023
Data quality in automation of food production: A soil nutrient experiment
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this activity, participants plan and conduct a plant growth experiment while considering the role of data quality in automated systems in agriculture. The timing of the activity is highly dependent on the seed variety that you are growing and the level of familiarity that participants already have with basic plant science and scientific investigation concepts, but will likely take several weeks. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Data and Analysis
Living Systems and Processes
Scientific and Engineering Practices
Material Type:
Lesson Plan
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
10/30/2023
Interland: Be Internet Smart Interactive Game
Unrestricted Use
CC BY
Rating
0.0 stars

Students will play an interactive game while learning how to be internet smart. Students will learn the fundamentals of digital literacy: sharing, kindness, security, determining what's real and what's fake, and reporting. This game comes with a full curriculum guide: https://storage.googleapis.com/gweb-interland.appspot.com/en-us/hub/pdfs/Google_BeInternetAwesome_DigitalCitizenshipSafety_2019Curriculum.pdf

Subject:
CTE
Communication Skills
Communication and Multimodal Literacy
Computer Science
Cross-Curricular
Cybersecurity
English
Government and Civics
History/Social Sciences
Networking and the Internet
Research
Special Education
Technology Education
Material Type:
Game
Interactive
Author:
Google
The Net Safety Collaborative
iKeepSafe
Date Added:
07/24/2020
Internet Traffic Light
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

This is a lesson presented by Common Sense Education.
The lesson takes 35 minutes or there is an option for a "quick lesson" that takes 15 minutes.
In order to access the lesson, you will need to sign-up for FREE access. I used my google account to login - SIMPLE.

MATERIALS:
- All digital materials are included.
The slides mentioned below use google slides. All slides are in one presentation and can be downloaded or copied (copyright information is listed on the website).
TEACHER WILL NEED:
- Tape or long piece of string
- Green, yellow, and red pieces of construction paper

Learning Objectives:
Understand that being safe online is similar to staying safe in real life.
Learn to identify websites and apps that are "just right" and "not right" for them.
Know how to get help from an adult if they are unsure about a website.

Brief Overview:
The lesson plan covers 4 steps that can be broken up into smaller segments or done all together.
1. Explore - Go! Caution! Stop! (15 minutes) > this section includes teacher dialogue and premade slides to introduce how to choose a "just right" website

2. Read - Internet Traffic Light (5 minutes) > This is a poem to help students remember how to choose a "just right" website. The slide is premade for display and teacher directions are included.
""Internet Traffic Light" by Wren Brennan
We go online to find new things to do and see.
The internet traffic light shows where we need to be.
Green means GO! [hold up a green paper] to sites we trust.
Yellow means SLOW! [hold up a yellow paper] Being safe is a must.
Red means STOP. [hold up a red paper] Ask if it's OK.
Trust your gut to go the right way."

3. Play - Traffic Light Game (10 minutes) > Game instructions are included along with the slides to display.

4. Reflect - Pause and Think Moment (5 minutes) > Gives students a moment to draw a picture and write about what they would do if they accidentally went to a "not right" website. You can either discuss this as a whole group, make it a writing center for another day, or share thoughts with a partner.

Overall, this is a great lesson to help introduce cybersecurity and internet safety for early elementary students. It is beneficial that all materials, teacher script, and explanations are included.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Author:
Common Sense Media
Wren Brennan
Date Added:
01/05/2022
An Introduction to Cyberbiosecurity for Food Science
Unrestricted Use
CC BY
Rating
0.0 stars

As technology becomes ever integrated into our food system and everyday life, our food industry and supply become ever more vulnerable to attack. Cyber attacks continue to threaten large and small companies, government agencies, individuals, and food and agriculture. This module, ‘Securing the Food Industry,’ aims to introduce the idea of cyberbiosecurity through a lecture format along with three case studies allowing students to interact and think through the concepts and materials. This module was built for implementation into college level courses with connection or interest in the food industry, food science, and agriculture as well as and technology courses focused on real world applications.
The lecture starts by introducing the amount of technology in food science and the food industry then transitions into concerns about security. After discussing multiple subtypes of security already integrated into the food industry, cyberbiosecurity is introduced. The term and definition are discussed before the categories of cyber attacks are introduced. The lecture relates these ideas back to the food industry before sharing a few real-life examples of detrimental cyber-attacks. The lecture concludes are explain the impact a cyber attack can cause, who is responsible for preventing and recovering from these attacks, as well as suggested practices to reduce vulnerabilities. Three theoretical but realistic case studies with discussion questions follow the lecture. These studies were written to act as small group discussion starters but could be used for whole class discussion, individual writing assignments, or other applications.
A list of additional resources can be found with the course material. This list provides a small sampling of additional documents which discuss cyberbiosecurity. The resources listed at the end of the lecture are not included in the additional resources document but also provide helpful information in the exploration and understanding of cyberbiosecurity. Food science resources are also included in this document to provide additional background around the food industry portion of this course material.

Securing the Food Industry is an open educational resource (OER). Instructors reviewing, adopting, or adapting the module should indicate their interest at https://forms.gle/orFRGhYs8owBP7gD6.

Subject:
Agricultural Education
CTE
Computer Science
Cybersecurity
Professional Learning
Science
Material Type:
Case Study
Lecture Notes
Module
Author:
Andrew Ray
Susan E Duncan
Yun Yin
Rebekah J MIller
Date Added:
09/24/2022
Intro to Cybersecurity: What Makes a Good Password?
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Passwords are crucual in our world today. They give us a simple measure to protect ourselves and our information online. This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates independent, partner, and whole group learning activities to determine what is a strong password and how to create it. All activities are low prep and can be modified to your needs. 

Subject:
Cross-Curricular
Cybersecurity
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Mary Dickerson
Date Added:
12/02/2022
Masked Letters
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will learn about Mask Letters and their use in the Revolutionary War, then they will make masks and messages of their own and discuss the pros and cons of this method of sending and receiving secret messages. 

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023
Middle School Elective Computer Science: Cybersecurity Vocabulary Posters
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Vocabulary posters for the Cybersecurity strand for the Middle School Elective. Words included are from the 2017 Computer Science Curriculum Framework.

Subject:
Computer Science
Cybersecurity
Material Type:
Visual Media
Author:
Kelly Odom
Date Added:
02/21/2022
Navajo Code Talkers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

During WWII the Marines enlisted Navajo code talkers to send messages. The Navajo language is not written down and is very difficult for non-native speakers to speak and understand. The Marines started with 29 Navajo men for this project. Their code became unbreakable and fast. They could decode 3 lines of English in 20 seconds versus the normal 30 minutes.In this lesson students will hear audio of spoken Navajo language. They will make predictions on what language they think is being spoken. After learning the language they will research the Navajo code breakers. Students will then use the Navajo dictionary to practice creating and deciphering messages. Students will then be able to make connections to cybersecurity. 

Subject:
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Author:
CodeVA Curriculum
THEA CLARK
Date Added:
03/17/2023
PAGE ACSE -  Building Stronger Passwords Image
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Looking for a fun way to teach both scientific method and cybersecurity? Well great job, you found it. Students will not only learn 5 characteristics to making a good password but they will also be using all of their 2.1, 3.1, and 4.1 strands to build and rebuild a structure using different materials that are probably inside your classroom right now.  Need a STEM activity for a club day? Need a “Friday and I can’t teach anymore content” lesson? This is for you. Roll up your sleeves and let the students do the work and problem solve in a simple and fun way.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
STEM/STEAM
Science
Scientific and Engineering Practices
Material Type:
Activity/Lab
Homework/Assignment
Lesson Plan
Author:
Nichole Brumfield
Date Added:
01/23/2024
Part 1 Password Safety: Brute Force
Unrestricted Use
CC BY
Rating
0.0 stars

In this first part of a three part series, students will explore the ideas around Brute Force algorithm/programs to further understand the importance of password development, use, safety, and safekeeping while completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few adjustments as well.  Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Game
Homework/Assignment
Author:
Emily Ball
Date Added:
03/20/2022
Part 2 Password Safety:  Decrease (Divide) and Conquer
Unrestricted Use
CC BY
Rating
0.0 stars

In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Measurement and Geometry
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022
Password Probability
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Passwords are essential to protecting our private information from others. Use this lesson to explore some basic probabilty behind password options and how easily they can be guessed! This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates low prep activities you can modifiy to fit your needs.

Subject:
Cross-Curricular
Cybersecurity
Mathematics
Probability and Statistics
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Mary Dickerson
Date Added:
12/26/2022