ALEX Resources

Narrow Results:
Learning Activities (1) Building blocks of a lesson plan that include before, during, and after strategies to actively engage students in learning a concept or skill. Classroom Resources (5)


ALEX Learning Activities  
   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Subject: Digital Literacy and Computer Science (3 - 5)
Title: Protect Your Password and Your Privacy!
Description:

This activity will guide students through a discussion of why, how and when passwords are used to protect individual privacy, how to create strong passwords, and who to share passwords with. The activity will also show students how they can adjust their privacy settings on their online accounts.  After the presentation and discussion, students will practice what they have learned by playing “InterLand,” an online game resource that is part of the “Be Internet Awesome with Google” digital citizenship curriculum, designed for students in grades 3-6. The “Tower of Treasure” learning game focuses on protecting privacy and creating strong passwords.

This activity was created as a result of the ALEX Resource Development Summit.




ALEX Learning Activities: 1

Go To Top of page
ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (5) 30 :
24) Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

Examples: Logging in at school, logging personal devices to public networks.

[DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (3 - 12)
Title: E-Business: Web Security
URL: https://aptv.pbslearningmedia.org/resource/0384063f-d97d-4829-8d04-c20a2d1fe9cd/e-business-jeffrey-bezos/
Description:

In this video, students will learn about the importance of web security which becomes a top priority with more information changing hands electronically.



   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (8) 15 :
9) Secure a file or other data.

Examples: lock spreadsheet cell(s), password protect, encrypt.

Subject: Digital Literacy and Computer Science (3 - 8)
Title: Creating Strong Passwords
URL: https://edu.gcfglobal.org/en/internetsafety/creating-strong-passwords/1/
Description:

You'll need to create a password to do just about everything on the Web, from checking your email to online banking. And while it's simpler to use a short, easy-to-remember password, this can also pose serious risks to your online security. To protect yourself and your information, you'll want to use passwords that are long, strong, and difficult for someone else to guess while still keeping them relatively easy for you to remember.

Review video and text tips for creating strong passwords to maintain account security.



   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Subject: Digital Literacy and Computer Science (3 - 5)
Title: Password Duel
URL: https://www.sciencebuddies.org/teacher-resources/lesson-plans/password-security#summary
Description:

Do your students have their own online accounts like email or social media? What about login for school computers? If so, they might have to pick passwords. Have you ever had trouble creating (and forgetting) good passwords? This fun lesson plan involves a guessing game that can teach your students how to make their passwords harder to guess. Learn how to keep your accounts safe!

You will need to create a free account to access the material, however, it has direct integration with Google Classroom and even provides Google Classroom resources such as a quiz and student worksheet.



   View Standards     Standard(s): [DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Subject: Digital Literacy and Computer Science (4 - 5)
Title: Firewall Foundations
URL: https://pivotproject.org/challenges/firewall-foundations
Description:

The PIVOT Firewall lab is meant for individuals to learn how to use a firewall. Students will build their own virtual environment using Virtual Box and Ubuntu Linux. In the resulting network, the student will configure one of the Linux systems as the firewall and build a policy to provide the access required in each of the questions.



   View Standards     Standard(s): [DLIT] (4) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 16 :
10) Identify the different forms of web advertising and why websites, digital resources, and artifacts may include advertisements and collect personal information.

Examples: Search ads, pay-per-click ads, banner ads, targeted ads, in-game ads, email ads.

Subject: Digital Literacy and Computer Science (4)
Title: Computer Science Fundamentals Unit 6 Course E Lesson 12: Private and Personal Information (2018)
URL: https://curriculum.code.org/csf-18/coursee/12/
Description:

Developed by Common Sense Education, this lesson is about the difference between information that is safe to share online and information that is not.

As students visit sites that request information about their identities, they learn to adopt a critical inquiry process that empowers them to protect themselves and their families from identity theft. In this lesson, students learn to think critically about the user information that some websites request or require. They learn the difference between private information and personal information, as well as how to distinguish what is safe or unsafe to share online.

Common Sense Education has created this lesson to teach kids the importance of security on the internet. By discussing the difference between personal and private information, students will be able to recognize what information should and shouldn't be shared. Students will also learn what signs you should look for to determine if a website is safe or not.

Students will be able to:
- learn about the benefits and risks of sharing information online.
- understand what type of information can put them at risk for identity theft and other scams.

Note: You will need to create a free account on code.org before you can view this resource.



ALEX Classroom Resources: 5

Go To Top of page