ALEX Learning Activity

  

Protect Your Password and Your Privacy!

A Learning Activity is a strategy a teacher chooses to actively engage students in learning a concept or skill using a digital tool/resource.

You may save this Learning Activity to your hard drive as an .html file by selecting “File”,then “Save As” from your browser’s pull down menu. The file name extension must be .html.
  This learning activity provided by:  
Author: Mary Andrews
System:Lanett City
School:W. O. Lance Elementary
  General Activity Information  
Activity ID: 2343
Title:
Protect Your Password and Your Privacy!
Digital Tool/Resource:
InterLand Tower of Treasure
Web Address – URL:
Overview:

This activity will guide students through a discussion of why, how and when passwords are used to protect individual privacy, how to create strong passwords, and who to share passwords with. The activity will also show students how they can adjust their privacy settings on their online accounts.  After the presentation and discussion, students will practice what they have learned by playing “InterLand,” an online game resource that is part of the “Be Internet Awesome with Google” digital citizenship curriculum, designed for students in grades 3-6. The “Tower of Treasure” learning game focuses on protecting privacy and creating strong passwords.

This activity was created as a result of the ALEX Resource Development Summit.

  Associated Standards and Objectives  
Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 3
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • identify how to properly use security technologies and how they work.
Teacher Vocabulary:
  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker
Knowledge:
Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.
Skills:
Students are able to:
  • login to resources using passwords.
  • understand importance of not sharing login information.
  • identify examples of SPAM, pop up blocks, and virus protection software.
Understanding:
Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 4
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • identify how to properly use security technologies and how they work.
Teacher Vocabulary:
  • security technologies
  • privacy
  • password
  • login information
  • virus protection
  • malicious
  • spam
  • spam filters
  • pop-up blocker
  • online identity theft
Knowledge:
Students know:
  • software and other features such as pop-up blockers are installed to protect against malicious items.
  • unwanted emails or spam can contain links with viruses.
  • users can protect their information by not sharing passwords or login information to help prevent crimes like online identity theft.
Skills:
Students are able to:
  • login to resources using private passwords.
  • understand importance of not sharing login information.
  • demonstrate how to properly handle or utilize spam, pop up blockers, and virus protection software and features.
Understanding:
Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
  • if an email or pop-up seems too good to be true, it probably is not true.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 5
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • explain how to properly use security technologies and how they work.
Teacher Vocabulary:
  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker
Knowledge:
Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.
Skills:
Students are able to:
  • explain to others how and why you should use strong passwords.
  • explain the causes and effects of someone having and using your password.
  • explain what SPAM, pop up blockers, and virus protection software can do.
Understanding:
Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.
Learning Objectives:

I can identify strong vs. weak passwords and I can create strong passwords that are at least 8 characters, are memorable, and use special characters and/or numbers.

I can adjust privacy settings on online accounts to protect my information.

 

  Strategies, Preparations and Variations  
Phase:
During/Explore/Explain
Activity:

Using this presentation, Secure Your Secrets Activity 1 lead a discussion about why passwords are used, the difference between weak and strong passwords, and the things to keep in mind in creating a strong password. 

The next presentation, Activity 2 Keep it to Yourself, guides students through the process of choosing settings in online accounts like an email account, to protect their private information. It also explains the use of two-step verification.

Present the InterLand game, Tower of Treasure, using the presentation, Activity 3. Allow time for students to work through the game.  After students play the game, use the questions on the presentation to assess learning and help students internalize what they have learned.

 

 

Assessment Strategies:

Students will submit examples of strong passwords that meet the criteria of being memorable, having at least eight characters, and use a combination of upper and lowercase letters, numbers, and symbols.

Students will describe how to adjust the privacy setting in online accounts.

Students will answer reflection questions from the presentations. This can be done interactively, utilizing Pear Deck with the presentations or with written or oral responses. See the "Advance Prep" section for how to set up Pear Deck.

 


Advanced Preparation:

Students will need access to computers/devices with Internet access.

The teacher will need to  download and project the free presentations created by Google's Be Internet Awesome program:

Activity 1

Activity 2

Activity 3

Used with Pear Deck, these presentations can be interactive. Students can submit responses via their devices (much like Nearpod). When you make copies of the presentations above, you will be prompted to get the "Add On" for Pear Deck.

To install the Pear Deck Add-on for Google Slides go to Add-ons, Get Add-ons and search for Pear Deck.

Accept the permissions and open the Pear Deck Sidebar.  

To launch your interactive Pear Deck presentation, click Present with Pear Deck from the Pear Deck Sidebar, this starts a new Session.

Students then can type in the code for the session in the Pear Deck App, or online at the Pear Deck/Join website.

Variation Tips (optional):
 
Notes or Recommendations (optional):
 
  Keywords and Search Tags  
Keywords and Search Tags: online security, passwords, privacy settings, protecting privacy