ALEX Classroom Resource

  

Public Encryption Key

  Classroom Resource Information  

Title:

Public Encryption Key

URL:

https://www.youtube.com/watch?v=jJrICB_HvuI&feature=youtu.be

Content Source:

Other
CSUnplugged
Type: Audio/Video

Overview:

This video shows an entertaining way to introduce Computer Science to students. It also offers an explanation of a public encryption key in a way that students can easily grasp. Students find out things they thought were safe on the internet are not safe.

Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 8
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • compare and contrast common methods of cybersecurity.
Teacher Vocabulary:
  • cybersecurity
Knowledge:
Students know:
  • that cybersecurity is used to protect data online; one method of securing data may be better than another for a given situation.
Skills:
Students are able to:
  • identify similarities and differences in types of cybersecurity.
Understanding:
Students understand that:
  • many methods exist to protect data.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 9-12
29) Summarize the role of compression and encryption in modifying the structure of digital artifacts and the varieties of information carried in the metadata of these artifacts.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • summarize the roles of compression and encryption.
  • examine how the structure of digital artifacts may be modified when compressed or encrypted.
  • describe the effects on the metadata of an artifact when compressing or encrypting the file.
Teacher Vocabulary:
  • compression
  • encryption
  • metadata
Knowledge:
Students know:
  • that when a file is altered in any way, changes may be seen in the file metadata.
  • compression and encryption are two methods used when sharing data.
Skills:
Students are able to:
  • explain the roles of compression and encryption.
  • summarize the effects of compression and encryption on the metadata of a digital artifact.
Understanding:
Students understand that:
  • any process applied to data has the potential to alter the structure of the data.
  • it is important to be aware of potential changes to data structure when electing to use a process.
Tags: cybersecurity, encryption, public encryption key
License Type: Attribution Share Alike
For full descriptions of license types and a guide to usage, visit :
https://creativecommons.org/licenses
AccessibilityVideo resources: includes closed captioning or subtitles
Comments
  This resource provided by:  
Author: Aimee Bates
Alabama State Department of Education