ALEX Classroom Resource

  

Cybersecurity 101

  Classroom Resource Information  

Title:

Cybersecurity 101

URL:

https://aptv.pbslearningmedia.org/resource/nvcy-sci-cyber101/cybersecurity-101/

Content Source:

PBS
Type: Audio/Video

Overview:

Learn why protecting your information online is crucial with this video from the NOVA Cybersecurity Lab. The Internet was originally designed to connect large computers at universities, businesses, and governments. It grew exponentially once personal computers became common in the 1980s. Connecting to the Internet leaves computers vulnerable. People can use computers to delete data, spread viruses, or even steal someone’s identity. The good news is that there are several ways to stay safe online. You can learn about protecting information by trying coding, password cracking, and spotting email scams in NOVA’s Cybersecurity Lab. This video includes a student viewing guide to promote discussion.

Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 7
25) List common methods of system cybersecurity.

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • research and list common methods of cybersecurity.
Teacher Vocabulary:
  • cybersecurity
Knowledge:
Students know:
  • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.
Skills:
Students are able to:
  • list common methods of protecting digital data online.
Understanding:
Students understand that:
  • business and personal data is sought out by hackers.
  • business and personal data must be protected using cybersecurity measures.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 8
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • compare and contrast common methods of cybersecurity.
Teacher Vocabulary:
  • cybersecurity
Knowledge:
Students know:
  • that cybersecurity is used to protect data online; one method of securing data may be better than another for a given situation.
Skills:
Students are able to:
  • identify similarities and differences in types of cybersecurity.
Understanding:
Students understand that:
  • many methods exist to protect data.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 9-12
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • explain the tradeoffs when selecting and implementing cybersecurity recommendations.
  • describe pros and cons of two factor authentication (TFA).
  • describe the importance of password requirements.
  • describe the use of geolocation requirements.
Teacher Vocabulary:
  • cybersecurity
  • two-factor authentication (TFA)
  • geolocation
  • privacy
  • cryptography
Knowledge:
Students know:
  • how to evaluate the tradeoffs of cybersecurity recommendations.
  • how to articulate the pros and cons of TFA.
  • the importance of password requirements.
  • how to articulate the pros and cons of geolocation.
Skills:
Students are able to:
  • explain pros and cons of cybersecurity recommendations.
  • describe the use of two-factor authentication.
  • explain the importance of password requirements.
  • describe the use of geolocation.
Understanding:
Students understand that:
  • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.
Tags: cybersecurity, data, digital tools, internet, online, password, scams, viruses
License Type: Custom Permission Type
See Terms: https://www.pbslearningmedia.org/help/terms-of-use/
For full descriptions of license types and a guide to usage, visit :
https://creativecommons.org/licenses
AccessibilityVideo resources: includes closed captioning or subtitles
Comments
  This resource provided by:  
Author: Stephanie Carver
Alabama State Department of Education