ALEX Classroom Resource

  

Winning the Cyber Security Game

  Classroom Resource Information  

Title:

Winning the Cyber Security Game

URL:

http://mediasmarts.ca/sites/mediasmarts/files/lesson-plans/lesson_winning_cyber_security_game.pdf

Content Source:

Other
MediaSmarts Canada (mediasmarts.ca)
Type: Lesson/Unit Plan

Overview:

In this lesson, students discuss their online experiences and learn how to minimize the potential risks that may be associated with them. Using a tip sheet, students explore the many tools and strategies that can be used to prevent negative online experiences. Once they have reviewed these strategies and resources, students will extend their knowledge by playing a game in which they compete against other students to match a series of technological "tools" to the "risks" they can help prevent. 

Students will display the ability to:

  • recognize the potential security risks and drawbacks of engaging in various online activities

  • use a variety of tools and techniques to secure and protect their online experiences

  • apply principles of board game design through the creation of a Cyber Security game (Grade 7/8 only)

     

    Note: You will need to create a free account before you can view this resource. 

Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 5
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • explain how to properly use security technologies and how they work.
Teacher Vocabulary:
  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker
Knowledge:
Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.
Skills:
Students are able to:
  • explain to others how and why you should use strong passwords.
  • explain the causes and effects of someone having and using your password.
  • explain what SPAM, pop up blockers, and virus protection software can do.
Understanding:
Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 5
24) Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

Examples: Logging in at school, logging personal devices to public networks.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.
Teacher Vocabulary:
  • authentication
  • users
  • devices
  • access
  • permission
  • privacy
  • security
Knowledge:
Students know:
  • that there is a need for authentication of users and devices as it relates to access permissions, privacy, and security.
Skills:
Students are able to:
  • describe the purpose for authentication of users and devices as it relates to access permissions, privacy, and security.
Understanding:
Students understand that:
  • authentication of users and devices is essential to protect permissions, privacy, and security.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 7
25) List common methods of system cybersecurity.

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • research and list common methods of cybersecurity.
Teacher Vocabulary:
  • cybersecurity
Knowledge:
Students know:
  • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.
Skills:
Students are able to:
  • list common methods of protecting digital data online.
Understanding:
Students understand that:
  • business and personal data is sought out by hackers.
  • business and personal data must be protected using cybersecurity measures.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 8
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • compare and contrast common methods of cybersecurity.
Teacher Vocabulary:
  • cybersecurity
Knowledge:
Students know:
  • that cybersecurity is used to protect data online; one method of securing data may be better than another for a given situation.
Skills:
Students are able to:
  • identify similarities and differences in types of cybersecurity.
Understanding:
Students understand that:
  • many methods exist to protect data.
Tags: online experience, risks, security risks
License Type: Attribution Non-Commercial No Derivatives
For full descriptions of license types and a guide to usage, visit :
https://creativecommons.org/licenses
Accessibility
Comments
  This resource provided by:  
Author: Aimee Bates
Alabama State Department of Education