Updating search results...

Search Resources

11 Results

View
Selected filters:
  • VA.CS.3.11 - The student will create examples of strong passwords, explain why stro...
ASCE Region III - Perfect Password
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This performance task is designed for third grade and up to teach the importance of using strong passwords.  This would be helpful to use at the beginning of the year to review password safety with upper elementary school students to refresh their memory.  This includes an instructional slide show and a student handout.

Subject:
Computer Science
Cybersecurity
Government and Civics
Material Type:
Lesson
Author:
Yvonne Richard
Acse Grant
Lindsay Sutton
Jessica Sheidy
Laura Michaels
Date Added:
02/12/2022
Building Passwords
Unrestricted Use
Public Domain
Rating
0.0 stars

This is an unplugged worksheet activity to walk students through the process of building strong, easy to remember, passwords.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Homework/Assignment
Author:
Jude Raffeinner
Date Added:
01/28/2022
Building a Better Password
Unrestricted Use
Public Domain
Rating
0.0 stars

This slideshow will help students to identify and use strong passwords, and explain why strong passwords should be used (e.g., protect name, address, and telephone number). It walks students through a process that can be used to create strong, easy to remember, passwords.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Homework/Assignment
Author:
Jude Raffeinner
Date Added:
01/29/2022
CS Unplugged: Security Avatars
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Every day our privacy is at risk with data being collected about us as we share and live more of our lives online. For this activity, you will explore how you do and do not protect your privacy online and then create a security avatar to help you battle for your privacy.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Kim Wilkens
Date Added:
03/02/2020
Making Ancient Egypt Safe
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will be able to distinguish between weak and strong passwords and how passwords could have looked in Ancient Egypt!  Using the stamps, hieroglyphics stamps, magnetic letters, and papyrus paper, the students will be able to create passwords.  Dive into the differences in Ancient Egypt and today and learn how to keep your information safe!

Subject:
Computer Science
Cybersecurity
Social Sciences
Material Type:
Activity/Lab
Lesson Plan
Author:
Brooke Atwood
Date Added:
02/13/2024
PAGE ACSE -  Building Passwords as strong as the Great Wall of China
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson we will discuss the story of  The Three Little Pigs and the types of houses that they built.  Which ones were stronger and why?   How do people protect themselves?  In Ancient China they used a wall. Did that wall protect them?  How?  What are other ways people protect themselves?  In today’s world we need to protect ourselves using strong passwords.  How do we make a strong password?  Today you will build a strong password.  Then you will build a great wall that is as strong as the password that you created!

Subject:
Computer Science
Cross-Curricular
Cybersecurity
History/Social Sciences
STEM/STEAM
World History
Material Type:
Activity/Lab
Lesson
Lesson Plan
Reading
Author:
Tricia Nesselrodt
Date Added:
03/13/2024
PAGE ACSE -  Building Stronger Passwords Image
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Looking for a fun way to teach both scientific method and cybersecurity? Well great job, you found it. Students will not only learn 5 characteristics to making a good password but they will also be using all of their 2.1, 3.1, and 4.1 strands to build and rebuild a structure using different materials that are probably inside your classroom right now.  Need a STEM activity for a club day? Need a “Friday and I can’t teach anymore content” lesson? This is for you. Roll up your sleeves and let the students do the work and problem solve in a simple and fun way.

Subject:
Computer Science
Cross-Curricular
Cybersecurity
STEM/STEAM
Science
Scientific and Engineering Practices
Material Type:
Activity/Lab
Homework/Assignment
Lesson Plan
Author:
Nichole Brumfield
Date Added:
01/23/2024
Password Guessing Game 3.11, 4.11
Unrestricted Use
CC BY
Rating
0.0 stars

Strand: Cybersecurity3.11 The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.4.11 The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.Private information such as your phone number, address, favorite foods, or where you like to vacation should be carefully guarded. Passwords are a way to protect devices and information from unauthorized access. There are many ways a password can be guessed or stolen from a user.This activity allows students to take turns guessing simple passwords.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Robert Underwood
Date Added:
05/02/2022
Strong Passwords Game on Gamilab
Unrestricted Use
CC BY
Rating
0.0 stars

Strong Passwords is a "King of the Mountain" style game created using Gamilab. Students will answer ten true or false questions about passwords in order to help the climber get to the top of the mountain. It is based on SOL 3.11: The student will create examples of strong passwords, explain why strong passwords should be used, and demonstrate proper use and protection of personal passwords.

Subject:
Computer Science
Cybersecurity
Material Type:
Game
Author:
Dana Smith
Date Added:
08/04/2021