ALEX Classroom Resource

  

Firewall Foundations

  Classroom Resource Information  

Title:

Firewall Foundations

URL:

https://pivotproject.org/challenges/firewall-foundations

Content Source:

Other
Pivot Project
Type: Learning Activity

Overview:

The PIVOT Firewall lab is meant for individuals to learn how to use a firewall. Students will build their own virtual environment using Virtual Box and Ubuntu Linux. In the resulting network, the student will configure one of the Linux systems as the firewall and build a policy to provide the access required in each of the questions.

Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 4
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • identify how to properly use security technologies and how they work.
Teacher Vocabulary:
  • security technologies
  • privacy
  • password
  • login information
  • virus protection
  • malicious
  • spam
  • spam filters
  • pop-up blocker
  • online identity theft
Knowledge:
Students know:
  • software and other features such as pop-up blockers are installed to protect against malicious items.
  • unwanted emails or spam can contain links with viruses.
  • users can protect their information by not sharing passwords or login information to help prevent crimes like online identity theft.
Skills:
Students are able to:
  • login to resources using private passwords.
  • understand importance of not sharing login information.
  • demonstrate how to properly handle or utilize spam, pop up blockers, and virus protection software and features.
Understanding:
Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
  • if an email or pop-up seems too good to be true, it probably is not true.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 5
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • explain how to properly use security technologies and how they work.
Teacher Vocabulary:
  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker
Knowledge:
Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.
Skills:
Students are able to:
  • explain to others how and why you should use strong passwords.
  • explain the causes and effects of someone having and using your password.
  • explain what SPAM, pop up blockers, and virus protection software can do.
Understanding:
Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.
Tags: cybersecurity, firewall, Linux
License Type: Attribution Share Alike
For full descriptions of license types and a guide to usage, visit :
https://creativecommons.org/licenses
Accessibility
Comments
  This resource provided by:  
Author: Aimee Bates
Alabama State Department of Education