ALEX Classroom Resource

  

Top 19 Worst Passwords

  Classroom Resource Information  

Title:

Top 19 Worst Passwords

URL:

https://aptv.pbslearningmedia.org/resource/arct14.sci.nvtop19wor/top-19-worst-passwords/

Content Source:

PBS
Type: Informational Material

Overview:

Discover the 19 worst passwords and learn how to keep your password safe from computer hackers in this article from NOVA scienceNOW.  Students can read this article during a lesson on cybersecurity. 

Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 7
25) List common methods of system cybersecurity.

Examples: Various password requirements, two-factor authentication, biometric, geolocation.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • research and list common methods of cybersecurity.
Teacher Vocabulary:
  • cybersecurity
Knowledge:
Students know:
  • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.
Skills:
Students are able to:
  • list common methods of protecting digital data online.
Understanding:
Students understand that:
  • business and personal data is sought out by hackers.
  • business and personal data must be protected using cybersecurity measures.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 8
24) Compare and contrast common methods of cybersecurity.

Example: Discuss how password protections and encryption are similar and different.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • compare and contrast common methods of cybersecurity.
Teacher Vocabulary:
  • cybersecurity
Knowledge:
Students know:
  • that cybersecurity is used to protect data online; one method of securing data may be better than another for a given situation.
Skills:
Students are able to:
  • identify similarities and differences in types of cybersecurity.
Understanding:
Students understand that:
  • many methods exist to protect data.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 9-12
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • explain the tradeoffs when selecting and implementing cybersecurity recommendations.
  • describe pros and cons of two factor authentication (TFA).
  • describe the importance of password requirements.
  • describe the use of geolocation requirements.
Teacher Vocabulary:
  • cybersecurity
  • two-factor authentication (TFA)
  • geolocation
  • privacy
  • cryptography
Knowledge:
Students know:
  • how to evaluate the tradeoffs of cybersecurity recommendations.
  • how to articulate the pros and cons of TFA.
  • the importance of password requirements.
  • how to articulate the pros and cons of geolocation.
Skills:
Students are able to:
  • explain pros and cons of cybersecurity recommendations.
  • describe the use of two-factor authentication.
  • explain the importance of password requirements.
  • describe the use of geolocation.
Understanding:
Students understand that:
  • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.
Tags: internet, online, password, safety, security, web
License Type: Custom Permission Type
See Terms: https://www.pbslearningmedia.org/help/terms-of-use/
For full descriptions of license types and a guide to usage, visit :
https://creativecommons.org/licenses
Accessibility
Comments

PBS Learningmedia is a free resource for educators.  Educators can create an account to save resources to their dashboard and to assign resources to students.

  This resource provided by:  
Author: Stephanie Carver
Alabama State Department of Education