ALEX Resources

Narrow Results:
Learning Activities (2) Building blocks of a lesson plan that include before, during, and after strategies to actively engage students in learning a concept or skill. Classroom Resources (5)


ALEX Learning Activities  
   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Subject: Digital Literacy and Computer Science (3 - 5)
Title: Protect Your Password and Your Privacy!
Description:

This activity will guide students through a discussion of why, how and when passwords are used to protect individual privacy, how to create strong passwords, and who to share passwords with. The activity will also show students how they can adjust their privacy settings on their online accounts.  After the presentation and discussion, students will practice what they have learned by playing “InterLand,” an online game resource that is part of the “Be Internet Awesome with Google” digital citizenship curriculum, designed for students in grades 3-6. The “Tower of Treasure” learning game focuses on protecting privacy and creating strong passwords.

This activity was created as a result of the ALEX Resource Development Summit.




   View Standards     Standard(s): [DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (5) 7 :
1) Construct a complex system of numbers or letters to represent information.

Example: Student-created complex secret codes using more than one form to solve a problem or answer a question.

Subject: Digital Literacy and Computer Science (5)
Title: Security Technologies: Encryption
Description:

Students will understand and explain the security technologies of encryption and public keys and construct a complex system of numbers and/or letters to represent information.

This activity was created as a result of the DLCS COS Resource Development Summit.




ALEX Learning Activities: 2

Go To Top of page
ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (5) 30 :
24) Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

Examples: Logging in at school, logging personal devices to public networks.

[DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (3 - 12)
Title: E-Business: Web Security
URL: https://aptv.pbslearningmedia.org/resource/0384063f-d97d-4829-8d04-c20a2d1fe9cd/e-business-jeffrey-bezos/
Description:

In this video, students will learn about the importance of web security which becomes a top priority with more information changing hands electronically.



   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (8) 15 :
9) Secure a file or other data.

Examples: lock spreadsheet cell(s), password protect, encrypt.

Subject: Digital Literacy and Computer Science (3 - 8)
Title: Creating Strong Passwords
URL: https://edu.gcfglobal.org/en/internetsafety/creating-strong-passwords/1/
Description:

You'll need to create a password to do just about everything on the Web, from checking your email to online banking. And while it's simpler to use a short, easy-to-remember password, this can also pose serious risks to your online security. To protect yourself and your information, you'll want to use passwords that are long, strong, and difficult for someone else to guess while still keeping them relatively easy for you to remember.

Review video and text tips for creating strong passwords to maintain account security.



   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Subject: Digital Literacy and Computer Science (3 - 5)
Title: Password Duel
URL: https://www.sciencebuddies.org/teacher-resources/lesson-plans/password-security#summary
Description:

Do your students have their own online accounts like email or social media? What about login for school computers? If so, they might have to pick passwords. Have you ever had trouble creating (and forgetting) good passwords? This fun lesson plan involves a guessing game that can teach your students how to make their passwords harder to guess. Learn how to keep your accounts safe!

You will need to create a free account to access the material, however, it has direct integration with Google Classroom and even provides Google Classroom resources such as a quiz and student worksheet.



   View Standards     Standard(s): [DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Subject: Digital Literacy and Computer Science (4 - 5)
Title: Firewall Foundations
URL: https://pivotproject.org/challenges/firewall-foundations
Description:

The PIVOT Firewall lab is meant for individuals to learn how to use a firewall. Students will build their own virtual environment using Virtual Box and Ubuntu Linux. In the resulting network, the student will configure one of the Linux systems as the firewall and build a policy to provide the access required in each of the questions.



   View Standards     Standard(s): [DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (5) 30 :
24) Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

Examples: Logging in at school, logging personal devices to public networks.

[DLIT] (7) 31 :
25) List common methods of system cybersecurity.

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

[DLIT] (8) 30 :
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

Subject: Digital Literacy and Computer Science (5 - 8)
Title: Winning the Cyber Security Game
URL: http://mediasmarts.ca/sites/mediasmarts/files/lesson-plans/lesson_winning_cyber_security_game.pdf
Description:

In this lesson, students discuss their online experiences and learn how to minimize the potential risks that may be associated with them. Using a tip sheet, students explore the many tools and strategies that can be used to prevent negative online experiences. Once they have reviewed these strategies and resources, students will extend their knowledge by playing a game in which they compete against other students to match a series of technological "tools" to the "risks" they can help prevent. 

Students will display the ability to:



ALEX Classroom Resources: 5

Go To Top of page