Updating search results...

Search Resources

12 Results

View
Selected filters:
  • security
Attacks on American Soil: Pearl Harbor and September 11
Unrestricted Use
CC BY
Rating
0.0 stars

This collection uses primary sources to compare American responses to Pearl Harbor and September 11. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.

Subject:
American History
History/Social Sciences
Material Type:
Primary Source
Provider:
Digital Public Library of America
Author:
Albert Robertson
Date Added:
01/20/2016
Building Passwords
Unrestricted Use
Public Domain
Rating
0.0 stars

This is an unplugged worksheet activity to walk students through the process of building strong, easy to remember, passwords.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Homework/Assignment
Author:
Jude Raffeinner
Date Added:
01/28/2022
Hidden in Plain Sight
Read the Fine Print
Educational Use
Rating
0.0 stars

Steganography is the science and art of hiding messages in plain sight so only the sender and intended recipient know the existence of a message. Steganography can be characterized as security through obscurity. Through this lesson, students experience a portion of the engineering design process as they research steganography and steganographic methods; identify problems, criteria and constraints; brainstorm possible solutions; and generate ideas. These are the critical first steps in the engineering design process, often overlooked by students who want to get to the "doing" phases—designing, building and testing. In computer science, a thorough design phase makes program implementation much easier and more effective. Students obtain practice with a portion of the design process that may be less exciting, but is just as important as the other steps in the process.

Subject:
Science
Scientific and Engineering Practices
Material Type:
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Derek Babb
Date Added:
09/18/2014
Hot Jobs: Cyber Security Analysts Fight Crime
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Cyber Security, the protection of our information via computers and the internet is one of the fastest growing industries in Virginia and around the world. According to the US Bureau of Labor Statistics Cyber Security Analysts (also known as Information Security Analysts) will grow by 37% over the next 10 years. That’s a much faster growth rate than the average for all other occupations.

Subject:
CTE
Career Connections
Cross-Curricular
Cybersecurity
STEM/STEAM
Material Type:
Lesson Plan
Visual Media
Author:
Trish Reed
Timothy Couillard
Allison Couillard
Date Added:
01/23/2020
Hot Jobs: Cyber Security Analysts Fight Crime
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Cyber Security, the protection of our information via computers and the internet is one of the fastest growing industries in Virginia and around the world. According to the US Bureau of Labor Statistics Cyber Security Analysts (also known as Information Security Analysts) will grow by 37% over the next 10 years. That’s a much faster growth rate than the average for all other occupations.

Subject:
CTE
Career Connections
Cross-Curricular
Cybersecurity
STEM/STEAM
Material Type:
Homework/Assignment
Visual Media
Author:
Sherri Pillow
Trish Reed
Timothy Couillard
Allison Couillard
Date Added:
05/19/2020
An Implementation of Steganography
Read the Fine Print
Educational Use
Rating
0.0 stars

Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated with this task, brainstorm solutions, select a solution, and implement it. Once their messages are hidden, classmates attempt to decipher them. Based on the outcome of the testing phase, students refine and improve their solutions.

Subject:
Science
Scientific and Engineering Practices
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Brian Sandall
Derek Babb
Date Added:
09/18/2014
Technology Safety
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This lesson plan is an itroduction to teach safety in using technology to second grade students.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
May Stewart
Date Added:
01/30/2023
Technology Safety
Unrestricted Use
CC BY
Rating
0.0 stars

This lesson plan is intended to guide teachers on how to direct second grade students to create strong passwords that will help protect privacy of information.   

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
May Stewart
Date Added:
01/30/2023
What Is an IR Sensor?
Read the Fine Print
Educational Use
Rating
0.0 stars

Students learn about infrared energy and how it is used to sense the surrounding environment. They review where infrared falls on the electromagnetic spectrum and learn how infrared sensors work, as well as various ways engineers and scientists create and apply infrared technology to study science and collect information for security, communications, medical, research and other purposes. Pre/post-quizzes and a take-home assignment are provided. Learning the concepts prepares students to conduct the associated activity in which they design and program Arduino-controlled robots that use IR sensors to follow a line and make designated stops, much like the automated guided vehicles used in industry and commerce.

Subject:
Science
Scientific and Engineering Practices
Material Type:
Lesson
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Mark Supal
Date Added:
05/16/2019
Young Programmer's Safety
Only Sharing Permitted
CC BY-ND
Rating
0.0 stars

This lesson plan is appropriate for k-2 levels. It is about how young programmers practice safety in using techmology.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
May Stewart
Date Added:
01/30/2023