Updating search results...

Search Resources

16 Results

View
Selected filters:
  • VA.CS.7.7 - The student will identify existing cybersecurity concerns associated w...
  • VA.CS.7.7 - The student will identify existing cybersecurity concerns associated w...
Agricultural Cyberbiosecurity: Cyberbiosecurity
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

With digitization, we see biosecurity, cybersecurity, and physical security begin to overlap. This overlap started a new discipline, cyberbiosecurity. This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Computing Systems
Cybersecurity
Data and Analysis
Health and Medical Sciences
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
05/03/2023
Agricultural Cyberbiosecurity: Data Literacy
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Data makes the world go around! As we use more technology, more data is being created, recorded, and used. The next task is understanding what it all means!This resource is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Business and Information Technology
Cybersecurity
Data and Analysis
STEM/STEAM
Material Type:
Reading
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
05/01/2023
Choctaw Code Talkers
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

Students will examine the history and culture of the Choctaw Native Americans, as well as the story of the Code Talkers in WW1, in order to memorialize one of the Choctaw Code Talkers. 

Subject:
American History
Computer Science
Cybersecurity
Material Type:
Lesson Plan
Author:
CodeVA Curriculum
Date Added:
11/30/2023
Ciphers and Encryption Part 1:  Pigpen Cipher
Unrestricted Use
CC BY
Rating
0.0 stars

The student or class will watch a video clip about spies and secret codes from the past.  Next students will be able to use a Pigpen cipher to crack a secret message of their own.  Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five.

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Ciphers and Encryption Part 2:  Vigenère Square
Unrestricted Use
CC BY
Rating
0.0 stars

The student or class will watch a video clip about how to decode a Vigenère Square Cipher.Next students will be able to use the cipher to crack a secret message of their own (teacher provided messages in a hat (not inlcuded)).  One student chooses the word or phrase, the teacher puts the key (word) on the board, that same student will encrypt the message and send it to their partner.  The partner with use the same key word to return the text to plain text revealing the message and send their guess back to their partner. Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five (part 2) and can be used alone, or with other lessons in the series. Vigenère Square Ciphefrom the past.  Next students will be able to use a Pigpen cipher to crack a secret message of their own.  Teachers can edit the message to fit their needs and make adjustments as desired.  This is one mini lesson out of a series of five. Vigenère Square Ciphe

Subject:
Cybersecurity
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
Ciphers and Encryption Part 5: Caesar Cipher
Unrestricted Use
CC BY
Rating
0.0 stars

The student or class will watch a video clip about ciphers, specifically Caesar Ciphers.  Next students will learn more about encryption and decryption through the use of "keys".  Lastly, students will be introduced to the career path choices as a Cyber-security analyst. This is one lesson out of a series of five, and can be used alone, or with the some or all of the other four lessons.

Subject:
Impacts of Computing
Networking and the Internet
Material Type:
Activity/Lab
Author:
Emily Ball
Date Added:
01/18/2022
#CyberSmarts (3 Lessons by Scholastic)
Only Sharing Permitted
CC BY-NC-ND
Rating
0.0 stars

The lessons provided are presented by Scholastic and sponsored by Norton Lifelock.
All rights reserved by Scholastic.
Below is an overview of the three lessons provided.
The lessons do not coincide with one another.
The teacher can choose to use all three or select the best option for the classroom needs.

The PDF Links includes:
Lesson 1: Understanding Online Safety (45 minutes)
- Students will analyze text, citing evidence and summarizing central ideas. They will make inferences to create their own cybersecurity protection plan.
- Students will use the provided copy of #Cybersmarts student magazine to create their personalized online protection plan.

Lesson 2: Identifying Preventive Technologies (45 minutes + presentation time)
- Students will conduct research on preventive technologies built and used by professionals in the cybersecurity field (e.g., firewalls, ad blocker apps, antivirus software, voice recognition software, virtual private network (VPN), etc.).
- Students will then prepare a presentation - the given choices are a skit or interview. Presentation options can be easily adapted to best fit your classroom needs.
- Research planning/ gathering page is provided.

Lesson 3: Making Online Profiles More Secure (2 part lesson - 90 minutes total)
- Students will use analytical and reasoning skills to identify areas of vulnerability in an online profile and come up with strategies for how to make them more secure by applying information from a text.
- First, students will analyze their own personal profiles (if applicable). Then, they will analyze a provided “profile” to identify security holes. Last, discuss the answers and reasonings as a class.
*This lesson can be shortened to fit into one class period.
*(Optional) An extension idea is provided. It includes information from all lessons. Students will use what they have learned to create their own cybersecurity device.

Subject:
Computer Science
Cybersecurity
Material Type:
Activity/Lab
Lesson Plan
Reading
Author:
Norton Lifelock
Scholastic
Date Added:
02/02/2022
Cybersecurity to Solve the Mystery of the Kentucky Derby Disappearance!
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This activity introduces cybersecurity concerns with technologies commonly used in the livestock industry  in the context of a "clue" style activity in which students act as private investigators looking for a lost racehorse. It can be facilitated in 90 minutes, either in a single session or 4-5 shorter sessions. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Cybersecurity
Material Type:
Lesson Plan
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
10/30/2023
Part 1 Password Safety: Brute Force
Unrestricted Use
CC BY
Rating
0.0 stars

In this first part of a three part series, students will explore the ideas around Brute Force algorithm/programs to further understand the importance of password development, use, safety, and safekeeping while completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few adjustments as well.  Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Game
Homework/Assignment
Author:
Emily Ball
Date Added:
03/20/2022
Part 2 Password Safety:  Decrease (Divide) and Conquer
Unrestricted Use
CC BY
Rating
0.0 stars

In this second part of a three part series, students will explore the ideas around Decrease, or Divide, and Conquer algorithm/programs to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately (stand-alone) with a few adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Measurement and Geometry
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022
Part 3:  Password Safety: Unplugged Decryption
Unrestricted Use
CC BY
Rating
0.0 stars

In this final part of a three part series, students will practice Brute Force and Decrease (or Divide) and Conquer methods to try to crack a password puzzle to further understand the importance of password development, use, safety, and safekeeping by completing several unplugged sorting activities over the course of three class periods (approximately 30-45 minutes each).  These activites can be completed seperately with a few minor adjustments as well. Part 1 introduces Brute Force using a playing cards demonstration to sort as desired.  Part 2 introduces Decrease (or Divide) and Conquer to sort Quadrilaterals from Non-Quadrilateral shapes.  Part 3 uses the methods of both Brute Force and Divide and Conquer algorithms to decrypt (unscramble) passwords using commonly recognizable number patterns and words (completed on paper, or unplugged).  These activitess are intended for upper middle school students, but could also be adjusted for lower level highschool or simplified/adjusted for other ages as well with the editable copies provided.

Subject:
Cybersecurity
Networking and the Internet
Material Type:
Activity/Lab
Homework/Assignment
Author:
Emily Ball
Date Added:
03/21/2022
Password Probability
Conditional Remix & Share Permitted
CC BY-NC
Rating
0.0 stars

Passwords are essential to protecting our private information from others. Use this lesson to explore some basic probabilty behind password options and how easily they can be guessed! This lesson provides an intro into cybersecurity and its vocabulary, as well as incorporates low prep activities you can modifiy to fit your needs.

Subject:
Cross-Curricular
Cybersecurity
Mathematics
Probability and Statistics
Material Type:
Activity/Lab
Lesson
Lesson Plan
Author:
Mary Dickerson
Date Added:
12/26/2022
Traceability in Hydroponic Greens
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This activity introduces puts participants in the role of agricultural workers in a fresh produce operation that grows crops in a hydroponic system to sell at grocery stores. As they grow their crops over the course of several weeks, they are responsible for ensuring that the products are safe, delicious, and ready to sell to customers. This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Cybersecurity
Living Systems and Processes
Scientific and Engineering Practices
Material Type:
Lesson Plan
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
10/30/2023
Where’s the bacon?  An introduction to vulnerabilities in  agricultural systems
Conditional Remix & Share Permitted
CC BY-NC-SA
Rating
0.0 stars

This activity introduces the idea of cyberbiosecurity in the context of a "clue" style activity focused on vulnerabilities in the U.S. food system. It can be facilitated in 60 minutes, either in a single session or 3-4 shorter sessions.  This activity is part of the Agricultural Cyberbiosecurity Education Resource Collection that contains resources for formal and non-formal agricultural educators working with middle school aged youth. Published as Open Educational Resources, all resources are provided in durable (pdf) and customizable (MS Word) formats. They are hosted on  GoOpenVA in a unique resource collection, Ag Cybersecurity Virginia Tech, at https://goopenva.org/curated-collections/143 and on on Virginia Tech’s stable repository, VTechWorks at https://doi.org/10.21061/cyberbiosecurity

Subject:
Agricultural Education
Cybersecurity
STEM/STEAM
Material Type:
Lesson Plan
Author:
Ag Cybersecurity Virginia (VT)
Date Added:
10/27/2023