Learning Resource Type

Classroom Resource

Winning the Cyber Security Game

Subject Area

Digital Literacy and Computer Science

Grade(s)

5, 7, 8

Overview

In this lesson, students discuss their online experiences and learn how to minimize the potential risks that may be associated with them. Using a tip sheet, students explore the many tools and strategies that can be used to prevent negative online experiences. Once they have reviewed these strategies and resources, students will extend their knowledge by playing a game in which they compete against other students to match a series of technological "tools" to the "risks" they can help prevent. 

Students will display the ability to:

  • recognize the potential security risks and drawbacks of engaging in various online activities

  • use a variety of tools and techniques to secure and protect their online experiences

  • apply principles of board game design through the creation of a Cyber Security game (Grade 7/8 only)

     

    Note: You will need to create a free account before you can view this resource. 

    Digital Literacy and Computer Science (2018) Grade(s): 5

    DLCS18.5.9

    Explain the proper use and operation of security technologies.

    Unpacked Content

    UP:DLCS18.5.9

    Vocabulary

    • security technologies
    • password
    • login information
    • virus protection
    • malicious
    • spam filters
    • pop-up blocker

    Knowledge

    Students know:
    • software is installed to protect against malicious items.
    • users can protect their information by not sharing passwords or login information.

    Skills

    Students are able to:
    • explain to others how and why you should use strong passwords.
    • explain the causes and effects of someone having and using your password.
    • explain what SPAM, pop up blockers, and virus protection software can do.

    Understanding

    Students understand that:
    • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.
    Digital Literacy and Computer Science (2018) Grade(s): 5

    DLCS18.5.24

    Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

    Unpacked Content

    UP:DLCS18.5.24

    Vocabulary

    • authentication
    • users
    • devices
    • access
    • permission
    • privacy
    • security

    Knowledge

    Students know:
    • that there is a need for authentication of users and devices as it relates to access permissions, privacy, and security.

    Skills

    Students are able to:
    • describe the purpose for authentication of users and devices as it relates to access permissions, privacy, and security.

    Understanding

    Students understand that:
    • authentication of users and devices is essential to protect permissions, privacy, and security.
    Digital Literacy and Computer Science (2018) Grade(s): 7

    DLCS18.7.25

    List common methods of system cybersecurity.

    Unpacked Content

    UP:DLCS18.7.25

    Vocabulary

    • cybersecurity

    Knowledge

    Students know:
    • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.

    Skills

    Students are able to:
    • list common methods of protecting digital data online.

    Understanding

    Students understand that:
    • business and personal data is sought out by hackers.
    • business and personal data must be protected using cybersecurity measures.
    Digital Literacy and Computer Science (2018) Grade(s): 8

    DLCS18.8.24

    Compare and contrast common methods of cybersecurity.

    Unpacked Content

    UP:DLCS18.8.24

    Vocabulary

    • cybersecurity

    Knowledge

    Students know:
    • that cybersecurity is used to protect data online; one method of securing data may be better than another for a given situation.

    Skills

    Students are able to:
    • identify similarities and differences in types of cybersecurity.

    Understanding

    Students understand that:
    • many methods exist to protect data.
    Link to Resource

    CR Resource Type

    Lesson/Unit Plan

    Resource Provider

    Other

    Resource Provider other

    MediaSmarts Canada (mediasmarts.ca)
    Accessibility
    License

    License Type

    BY-NC-ND
    ALSDE LOGO