ALEX Classroom Resources

ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (8) 30 :
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

[DLIT] (9-12) 35 :
29) Summarize the role of compression and encryption in modifying the structure of digital artifacts and the varieties of information carried in the metadata of these artifacts.

Subject: Digital Literacy and Computer Science (8 - 12)
Title: Public Encryption Key
URL: https://www.youtube.com/watch?v=jJrICB_HvuI&feature=youtu.be
Description:

This video shows an entertaining way to introduce Computer Science to students. It also offers an explanation of a public encryption key in a way that students can easily grasp. Students find out things they thought were safe on the internet are not safe.



   View Standards     Standard(s): [DLIT] (7) 31 :
25) List common methods of system cybersecurity.

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

[DLIT] (8) 30 :
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

[DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Top 19 Worst Passwords
URL: https://aptv.pbslearningmedia.org/resource/arct14.sci.nvtop19wor/top-19-worst-passwords/
Description:

Discover the 19 worst passwords and learn how to keep your password safe from computer hackers in this article from NOVA scienceNOW.  Students can read this article during a lesson on cybersecurity. 



   View Standards     Standard(s): [DLIT] (7) 31 :
25) List common methods of system cybersecurity.

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

[DLIT] (8) 30 :
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: NOVA Cybersecurity Lab Lesson Plan
URL: https://aptv.pbslearningmedia.org/resource/nvcy-doc-cyberlplan/nova-cybersecurity-lab-lesson-plan/
Description:

In this media-rich lesson plan, students explore how to keep their digital lives safe, spot cyber scams, and learn the basics of coding from NOVA Labs. The lesson begins with students watching the Cybersecurity 101 video and discussing the online safety measures that they currently take. Next, students make predictions about online safety best practices, complete the Level 1 challenges of the NOVA Cybersecurity Lab, and compare the best practices from the game with their predictions. Students reconvene for direct instruction on the best practices and key computer science terms and then finish the Cybersecurity Lab game. Finally, students complete the video quizzes with short-response discussion questions and can work on the Cybersecurity stories as homework reading assignments.



   View Standards     Standard(s): [DLIT] (7) 31 :
25) List common methods of system cybersecurity.

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

[DLIT] (8) 30 :
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

[DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Cybersecurity 101
URL: https://aptv.pbslearningmedia.org/resource/nvcy-sci-cyber101/cybersecurity-101/
Description:

Learn why protecting your information online is crucial with this video from the NOVA Cybersecurity Lab. The Internet was originally designed to connect large computers at universities, businesses, and governments. It grew exponentially once personal computers became common in the 1980s. Connecting to the Internet leaves computers vulnerable. People can use computers to delete data, spread viruses, or even steal someone’s identity. The good news is that there are several ways to stay safe online. You can learn about protecting information by trying coding, password cracking, and spotting email scams in NOVA’s Cybersecurity Lab. This video includes a student viewing guide to promote discussion.



   View Standards     Standard(s): [DLIT] (7) 15 :
9) Identify common methods of securing data.

Examples: Permissions, encryption, vault, locked closet.

[DLIT] (8) 30 :
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

Subject: Digital Literacy and Computer Science (7 - 8)
Title: Cryptography: Crash Course Computer Science #33
URL: https://aptv.pbslearningmedia.org/resource/cryptography-crash-course-cs/cryptography-crash-course-cs/
Description:

This video will walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.



   View Standards     Standard(s): [DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (5) 30 :
24) Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

Examples: Logging in at school, logging personal devices to public networks.

[DLIT] (7) 31 :
25) List common methods of system cybersecurity.

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

[DLIT] (8) 30 :
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

Subject: Digital Literacy and Computer Science (5 - 8)
Title: Winning the Cyber Security Game
URL: http://mediasmarts.ca/sites/mediasmarts/files/lesson-plans/lesson_winning_cyber_security_game.pdf
Description:

In this lesson, students discuss their online experiences and learn how to minimize the potential risks that may be associated with them. Using a tip sheet, students explore the many tools and strategies that can be used to prevent negative online experiences. Once they have reviewed these strategies and resources, students will extend their knowledge by playing a game in which they compete against other students to match a series of technological "tools" to the "risks" they can help prevent. 

Students will display the ability to:



ALEX Classroom Resources: 6

Go To Top of page