ALEX Resources

Narrow Results:
Learning Activities (1) Building blocks of a lesson plan that include before, during, and after strategies to actively engage students in learning a concept or skill. Classroom Resources (4)


ALEX Learning Activities  
   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Subject: Digital Literacy and Computer Science (3 - 5)
Title: Protect Your Password and Your Privacy!
Description:

This activity will guide students through a discussion of why, how and when passwords are used to protect individual privacy, how to create strong passwords, and who to share passwords with. The activity will also show students how they can adjust their privacy settings on their online accounts.  After the presentation and discussion, students will practice what they have learned by playing “InterLand,” an online game resource that is part of the “Be Internet Awesome with Google” digital citizenship curriculum, designed for students in grades 3-6. The “Tower of Treasure” learning game focuses on protecting privacy and creating strong passwords.

This activity was created as a result of the ALEX Resource Development Summit.




ALEX Learning Activities: 1

Go To Top of page
ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (5) 30 :
24) Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

Examples: Logging in at school, logging personal devices to public networks.

[DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (3 - 12)
Title: E-Business: Web Security
URL: https://aptv.pbslearningmedia.org/resource/0384063f-d97d-4829-8d04-c20a2d1fe9cd/e-business-jeffrey-bezos/
Description:

In this video, students will learn about the importance of web security which becomes a top priority with more information changing hands electronically.



   View Standards     Standard(s): [DLIT] (3) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

Subject: Digital Literacy and Computer Science (3)
Title: Password Power-Up
URL: https://www.commonsense.org/education/digital-citizenship/lesson/password-power-up
Description:

Stronger, more secure online passwords are a good idea for everyone. But how can we help kids create better passwords and actually remember them? Use the tips in this lesson to help kids make passwords that are both secure and memorable.

Students will be able to:
  • Define the term "password" and describe a password's purpose.
  • Understand why a strong password is important.
  • Practice creating a memorable and strong password.

Users will need to create a free account to access this resource. 



   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (8) 15 :
9) Secure a file or other data.

Examples: lock spreadsheet cell(s), password protect, encrypt.

Subject: Digital Literacy and Computer Science (3 - 8)
Title: Creating Strong Passwords
URL: https://edu.gcfglobal.org/en/internetsafety/creating-strong-passwords/1/
Description:

You'll need to create a password to do just about everything on the Web, from checking your email to online banking. And while it's simpler to use a short, easy-to-remember password, this can also pose serious risks to your online security. To protect yourself and your information, you'll want to use passwords that are long, strong, and difficult for someone else to guess while still keeping them relatively easy for you to remember.

Review video and text tips for creating strong passwords to maintain account security.



   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Subject: Digital Literacy and Computer Science (3 - 5)
Title: Password Duel
URL: https://www.sciencebuddies.org/teacher-resources/lesson-plans/password-security#summary
Description:

Do your students have their own online accounts like email or social media? What about login for school computers? If so, they might have to pick passwords. Have you ever had trouble creating (and forgetting) good passwords? This fun lesson plan involves a guessing game that can teach your students how to make their passwords harder to guess. Learn how to keep your accounts safe!

You will need to create a free account to access the material, however, it has direct integration with Google Classroom and even provides Google Classroom resources such as a quiz and student worksheet.



ALEX Classroom Resources: 4

Go To Top of page