ALEX Classroom Resources

ALEX Classroom Resources  
   View Standards     Standard(s): [DLIT] (7) 31 :
25) List common methods of system cybersecurity.

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

[DLIT] (8) 30 :
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

[DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Top 19 Worst Passwords
URL: https://aptv.pbslearningmedia.org/resource/arct14.sci.nvtop19wor/top-19-worst-passwords/
Description:

Discover the 19 worst passwords and learn how to keep your password safe from computer hackers in this article from NOVA scienceNOW.  Students can read this article during a lesson on cybersecurity. 



   View Standards     Standard(s): [DLIT] (9-12) 28 :
22) Research the impact of computing technology on possible career pathways.

Examples: Government, business, medicine, entertainment, education, transportation.

[DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Hot Shots & Hot Jobs: Cyber Security Analysts Fight Crime
URL: https://aptv.pbslearningmedia.org/resource/pbslearningmedia.orgresourcecybersecurityanalyst/hot-jobs-cyber-security-analysts-fight-crime/
Description:

Learn about the exciting opportunities for and vital roles played by Cyber Security Analysts in the growing field of Cyber Security. Watch this Science Matters video to learn what it means to be a Cyber Security Analyst and see if this job could be the right fit for you.

Worms. Trojan Horses. Hackers and Clouds. It is not what’s happening in the movies, but what’s happening in cyberspace- that area that connects all of us and our computers to the internet and each other. Cyber Security is important to all of us and it's a HOT JOB of the future. This video comes with discussion questions. 



   View Standards     Standard(s): [DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Cybersecurity: Crash Course Computer Science #31
URL: https://aptv.pbslearningmedia.org/resource/cybersecurity-crash-course-cs/cybersecurity-crash-course-cs/
Description:

Cybersecurity is a set of techniques to protect the secrecy, integrity, and availability of computer systems and data against threats. In this episode, we’re going to unpack these three goals and talk through some strategies we use like passwords, biometrics, and access privileges to keep our information as secure, but also as accessible, as possible.



   View Standards     Standard(s): [DLIT] (3) 15 :
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (4) 14 :
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

[DLIT] (5) 15 :
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

[DLIT] (5) 30 :
24) Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

Examples: Logging in at school, logging personal devices to public networks.

[DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (3 - 12)
Title: E-Business: Web Security
URL: https://aptv.pbslearningmedia.org/resource/0384063f-d97d-4829-8d04-c20a2d1fe9cd/e-business-jeffrey-bezos/
Description:

In this video, students will learn about the importance of web security which becomes a top priority with more information changing hands electronically.



   View Standards     Standard(s): [DLIT] (7) 31 :
25) List common methods of system cybersecurity.

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

[DLIT] (8) 30 :
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

[DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (7 - 12)
Title: Cybersecurity 101
URL: https://aptv.pbslearningmedia.org/resource/nvcy-sci-cyber101/cybersecurity-101/
Description:

Learn why protecting your information online is crucial with this video from the NOVA Cybersecurity Lab. The Internet was originally designed to connect large computers at universities, businesses, and governments. It grew exponentially once personal computers became common in the 1980s. Connecting to the Internet leaves computers vulnerable. People can use computers to delete data, spread viruses, or even steal someone’s identity. The good news is that there are several ways to stay safe online. You can learn about protecting information by trying coding, password cracking, and spotting email scams in NOVA’s Cybersecurity Lab. This video includes a student viewing guide to promote discussion.



   View Standards     Standard(s): [DLIT] (9-12) 1 :
R1) Identify, demonstrate, and apply personal safe use of digital devices.

[DLIT] (9-12) 17 :
11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.

a. Recognize user tracking methods and hazards.

Examples: Cookies, WiFi packet sniffing.

b. Understand how to apply techniques to mitigate effects of user tracking methods.

c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.

d. Explain the relationship between online privacy and personal security.

Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.

e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.

Examples: Cyberbullying/harassment, inappropriate sexual communications.

f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them.

[DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Risk Check for New Tech
URL: https://www.commonsense.org/education/digital-citizenship/lesson/risk-check-for-new-tech
Description:

New tech, like location services and smart devices, helps make our lives easier and opens opportunities that didn't exist before. But these innovations also come with a cost -- especially to our privacy. Help students consider the benefits and drawbacks of these new technologies -- and decide whether they're ultimately worth it.

Students will be able to:
  • Identify important benefits and privacy risks that new technologies present.
  • Decide whether or not the benefits of new technologies outweigh their privacy risks.
  • Create a compelling video that argues for or against using a new technology.

Users will need to create a free account to access this resource. 



   View Standards     Standard(s): [DLIT] (9-12) 19 :
13) Compare various security measures of a computer system.

Examples: Usability, security, portability, and scalability.

[DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Cybersecurity Lab
URL: https://www.pbs.org/wgbh/nova/labs/lab/cyber/
Description:

In the game, players work for a start-up social network company that is the target of increasingly sophisticated cyber attacks. Working alongside their friend and colleague—a brilliant, business-savvy entrepreneur—their goal is to grow their tiny company into a global empire. To do this, players must complete challenges to strengthen their cyber defenses and thwart their attackers. There are four major gameplay components: a coding challenge, a password challenge, a social engineering challenge, and a series of cyber battles.

The Lab also features stories of real-world cyber attacks, a glossary of cyber terms, short animated videos, and video quizzes. The videos explain the need for cybersecurity; privacy versus security; cryptography (cyber codes); and what exactly hackers are.

This alignment results from the ALEX Resource Development Summit.



   View Standards     Standard(s): [DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Computer Science Principles Unit 4 Chapter 1 Lesson 7: Simple Encryption
URL: https://curriculum.code.org/csp-18/unit4/7/
Description:

In this lesson, students are introduced to the need for encryption and simple techniques for breaking (or cracking) secret messages. Students try their own hand at cracking a message encoded with the classic Caesar cipher and also a Random Substitution Cipher. Students should become well-acquainted with the idea that in an age of powerful computational tools, techniques of encryption will need to be more sophisticated. The most important aspect of this lesson is to understand how and why encryption plays a role in all of our lives every day on the Internet, and that making good encryption is not trivial. Students will get their feet wet with understanding the considerations that must go into making strong encryption in the face of powerful computational tools that can be used to crack it. The need for secrecy when sending bits over the Internet is important for anyone using the Internet.

Students will be able to:
- explain why encryption is an important need for everyday life on the Internet.
- crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget.
- crack a message encrypted with random substitution using Frequency Analysis.
- explain the weaknesses and security flaws of substitution ciphers.

Note: You will need to create a free account on code.org before you can view this resource.



   View Standards     Standard(s): [DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Computer Science Principles Unit 4 Chapter 1 Lesson 8: Encryption With Keys and Passwords
URL: https://curriculum.code.org/csp-18/unit4/8/
Description:

In this lesson, students learn about the relationship between cryptographic keys and passwords. Students explore the Vigenère cipher with a widget to examine how a cryptographic "key" can be used to encrypt and decrypt a message. Then, students use a tool that shows them about how long it would take to crack a given password using a standard desktop computer. Students experiment with what makes a good password and answer questions about the “human components” of cybersecurity.

Students will be able to:
- explain the relationship between cryptographic keys and passwords.
- explain in broad terms what makes a key difficult to “crack.”
- reason about strong vs. weak passwords using a tool that shows password strength.
- understand that exponential growth is related to an encryption algorithm’s strength.
- explain how and why the Vigenère cipher is a stronger form of encryption than plain substitution.
- explain properties that make for a good key when using the Vigenère Cipher.

Note: You will need to create a free account on code.org before you can view this resource.



   View Standards     Standard(s): [DLIT] (9-12) 42 :
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Subject: Digital Literacy and Computer Science (9 - 12)
Title: Computer Science Principles Unit 4 Chapter 1 Lesson 9: Public Key Cryptography
URL: https://curriculum.code.org/csp-18/unit4/9/
Description:

This is a big multi-part lesson that introduces the concept of public key cryptography which is an answer to the crucial question: How can two people send encrypted messages back and forth over insecure channels (the Internet) without meeting ahead of time to agree on a secret key? In a nutshell, there are two main principles we want students to understand:

  1. The mechanics of communication with public key cryptography
  2. The basic mathematical principles that make it possible

The lesson gets at these two core ideas through a deliberate chain of thought experiments, demonstrations, activities, and widgets. All parts are building blocks that lead to a deeper understanding of how it works.

Students will be able to:
- explain what the modulo operation does and how it operates as a "one-way" function.
- follow an asymmetric encryption algorithm to encrypt a numerical message using the Public Key Crypto widget.
- explain the difference between symmetric and asymmetric encryption.
- describe the basic process of encrypting data using public key encryption.
- explain the benefits of public key cryptography.

Note: You will need to create a free account on code.org before you can view this resource.



ALEX Classroom Resources: 10

Go To Top of page