Updating search results...

Search Resources

25 Results

View
Selected filters:
  • VA.CS.6.6 - The student will identify physical and digital security measures used ...
6th Grade Computer Science Instructional Resources
Unrestricted Use
CC BY
Rating
0.0 stars

Open Educational Resource (OER) LMS course to support the computer science instructional efforts at the middle schools. Teaching resources include video lessons, practice activities, and assessment that are  organized and aaligned to the 6-grade computer science standards of learning. 

Subject:
Computer Science
Material Type:
Activity/Lab
Assessment
Lesson
Author:
Keisha Tennessee
Date Added:
09/23/2021
Agricultural Cyberbiosecurity: Biomanufacturing
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Biomanufacturing is uses nature as an inspiration. Some of the processes we rely on started in nature!This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Business and Information Technology
Cybersecurity
Data and Analysis
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
09/27/2022
Agricultural Cyberbiosecurity: Biotechnology
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Scientists get some of their best ideas from biology. Whether that be using bacteria to help make food or gene editing to cure disease, biotechnology uses the tools in biology to make amazing technology. This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Business and Information Technology
Cybersecurity
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
05/01/2023
Agricultural Cyberbiosecurity: Cyberbiosecurity
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

With digitization, we see biosecurity, cybersecurity, and physical security begin to overlap. This overlap started a new discipline, cyberbiosecurity. This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Computing Systems
Cybersecurity
Data and Analysis
Health and Medical Sciences
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
05/03/2023
Agricultural Cyberbiosecurity: Data Literacy
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Data makes the world go around! As we use more technology, more data is being created, recorded, and used. The next task is understanding what it all means!This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Business and Information Technology
Cybersecurity
Data and Analysis
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
05/01/2023
Agricultural Cyberbiosecurity: Precision Agriculture
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Farming is not just a farmer driving a tractor anymore. Sometimes the tractor drives itself! Agriculture is very technological and part of that effort is precision agriculture. Learn about how farmers are using technology to optimize their farms. This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Business and Information Technology
Cybersecurity
Data and Analysis
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
05/01/2023
Agricultural Cyberbiosecurity: Sensors
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

As the world gets more digital, the world will need more sensors. A sensor is something that records the environment around it. Sensors can measure temperature, light, or sound among other things. Where can you find a sensor?  This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Business and Information Technology
Cybersecurity
Data and Analysis
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
05/01/2023
Atbash Cipher
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This cipher was invented for the Hebrew alphabet, but it can work with any alphabet.  Many people believe it was used in the Bible and is older than Hieroglyphics! It was later adopted by other cultures, such as the Greeks and Romans, and used to encode messages in their respective languages. This lesson leads students the basics of cryptography.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023
CS Unplugged: Security Avatars
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Every day our privacy is at risk with data being collected about us as we share and live more of our lives online. For this activity, you will explore how you do and do not protect your privacy online and then create a security avatar to help you battle for your privacy.

Subject:
Computer Science
Material Type:
Activity/Lab
Author:
Kim Wilkens
Date Added:
03/02/2020
Choctaw Code Talkers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will examine the history and culture of the Choctaw Native Americans, as well as the story of the Code Talkers in WW1, in order to memorialize one of the Choctaw Code Talkers. 

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023
Crytography Breakout (US History I)
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This breakout activity provides teachers and students an interactive way to demonstrate their learning about cryptography, code-breaking, and historic ciphers. Clues are provided, along with additional hints you can choose to provide to students so that students solve ciphers and learn what time their army is planning to raid the enemy camp.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Thea Clark
Date Added:
11/30/2023
Culper Spy Ring
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

In this lesson, students will learn about one of the most significant and successful spy rings in American History. They will also actually conduct some of the same techniques and demonstrate them to the rest of the class.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Thea Clark
Date Added:
11/30/2023
#CyberSmarts (3 Lessons by Scholastic)
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The lessons provided are presented by Scholastic and sponsored by Norton Lifelock.
All rights reserved by Scholastic.
Below is an overview of the three lessons provided.
The lessons do not coincide with one another.
The teacher can choose to use all three or select the best option for the classroom needs.

The PDF Links includes:
Lesson 1: Understanding Online Safety (45 minutes)
- Students will analyze text, citing evidence and summarizing central ideas. They will make inferences to create their own cybersecurity protection plan.
- Students will use the provided copy of #Cybersmarts student magazine to create their personalized online protection plan.

Lesson 2: Identifying Preventive Technologies (45 minutes + presentation time)
- Students will conduct research on preventive technologies built and used by professionals in the cybersecurity field (e.g., firewalls, ad blocker apps, antivirus software, voice recognition software, virtual private network (VPN), etc.).
- Students will then prepare a presentation - the given choices are a skit or interview. Presentation options can be easily adapted to best fit your classroom needs.
- Research planning/ gathering page is provided.

Lesson 3: Making Online Profiles More Secure (2 part lesson - 90 minutes total)
- Students will use analytical and reasoning skills to identify areas of vulnerability in an online profile and come up with strategies for how to make them more secure by applying information from a text.
- First, students will analyze their own personal profiles (if applicable). Then, they will analyze a provided “profile” to identify security holes. Last, discuss the answers and reasonings as a class.
*This lesson can be shortened to fit into one class period.
*(Optional) An extension idea is provided. It includes information from all lessons. Students will use what they have learned to create their own cybersecurity device.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Lesson Plan
Reading
Author:
Norton Lifelock
Scholastic
Date Added:
02/02/2022
Cybersecurity to Solve the Mystery of the Kentucky Derby Disappearance!
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This activity introduces cybersecurity concerns with technologies commonly used in the livestock industry  in the context of a "clue" style activity in which students act as private investigators looking for a lost racehorse. It can be facilitated in 90 minutes, either in a single session or 4-5 shorter sessions. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Cybersecurity
Material Type:
Lesson Plan
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
10/30/2023
Intro to Cybersecurity: What Makes a Good Password?
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Passwords are crucual in our world today. They give us a simple measure to protect ourselves and our information online. This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates independent, partner, and whole group learning activities to determine what is a strong password and how to create it. All activities are low prep and can be modified to your needs. 

Subject:
Cross-Curricular
Cybersecurity
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Mary Dickerson
Date Added:
12/02/2022
Josephine Baker - Hidden Messages
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

American performer Josephine Baker used her star-status access to spy for the Allies in WWII and convey information to the Allies by using invisible ink on her sheet music. We’ll look at a few methods that can be used to hide messages “in plain sight”?

Subject:
American History
Computer Science
History/Social Sciences
Material Type:
Lesson
Author:
CodeVA Curriculum
Lola Lloyd
Date Added:
03/17/2023
Paul Revere's Code
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will use a letter Paul Revere wrote to learn how he worked to keep meetings secret and warn the colonists that the British army was on their way.  

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Thea Clark
Date Added:
11/30/2023
Pigpen Cipher
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

During the American Revolution, the Patriots relied on sending coded messages to prevent the British from understanding the actions of the Continental Army. George Washington’s army used this cipher– though it is not a very secure system in its original form. The Patriots adapted it by using a randomized arrangement of the alphabet. This cipher was also used to some extent during the US Civil War.

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023