ALEX Resources

Narrow Results:
Classroom Resources (2)


ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (5) 30 :
24) Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

Examples: Logging in at school, logging personal devices to public networks.

[DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (3 - 12)
Title: E-Business: Web Security
URL: https://aptv.pbslearningmedia.org/resource/0384063f-d97d-4829-8d04-c20a2d1fe9cd/e-business-jeffrey-bezos/
Description:

In this video, students will learn about the importance of web security which becomes a top priority with more information changing hands electronically.



   View Standards     Standard(s): [DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (5) 30 :
24) Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

Examples: Logging in at school, logging personal devices to public networks.

[DLIT] (7) 31 :
25) List common methods of system cybersecurity.

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

[DLIT] (8) 30 :
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

Subject: Digital Literacy and Computer Science (5 - 8)
Title: Winning the Cyber Security Game
URL: http://mediasmarts.ca/sites/mediasmarts/files/lesson-plans/lesson_winning_cyber_security_game.pdf
Description:

In this lesson, students discuss their online experiences and learn how to minimize the potential risks that may be associated with them. Using a tip sheet, students explore the many tools and strategies that can be used to prevent negative online experiences. Once they have reviewed these strategies and resources, students will extend their knowledge by playing a game in which they compete against other students to match a series of technological "tools" to the "risks" they can help prevent. 

Students will display the ability to:



ALEX Classroom Resources: 2

Go To Top of page