Winning the Cyber Security Game

Learning Resource Type

Classroom Resource

Subject Area

Digital Literacy and Computer Science

Grade(s)

5, 7, 8

Overview

In this lesson, students discuss their online experiences and learn how to minimize the potential risks that may be associated with them. Using a tip sheet, students explore the many tools and strategies that can be used to prevent negative online experiences. Once they have reviewed these strategies and resources, students will extend their knowledge by playing a game in which they compete against other students to match a series of technological "tools" to the "risks" they can help prevent. 

Students will display the ability to:

  • recognize the potential security risks and drawbacks of engaging in various online activities

  • use a variety of tools and techniques to secure and protect their online experiences

  • apply principles of board game design through the creation of a Cyber Security game (Grade 7/8 only)

     

    Note: You will need to create a free account before you can view this resource. 

Digital Literacy and Computer Science (2018) Grade(s): 5

DLCS18.5.9

Explain the proper use and operation of security technologies.

UP:DLCS18.5.9

Vocabulary

  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker

Knowledge

Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.

Skills

Students are able to:
  • explain to others how and why you should use strong passwords.
  • explain the causes and effects of someone having and using your password.
  • explain what SPAM, pop up blockers, and virus protection software can do.

Understanding

Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.
Digital Literacy and Computer Science (2018) Grade(s): 5

DLCS18.5.24

Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

UP:DLCS18.5.24

Vocabulary

  • authentication
  • users
  • devices
  • access
  • permission
  • privacy
  • security

Knowledge

Students know:
  • that there is a need for authentication of users and devices as it relates to access permissions, privacy, and security.

Skills

Students are able to:
  • describe the purpose for authentication of users and devices as it relates to access permissions, privacy, and security.

Understanding

Students understand that:
  • authentication of users and devices is essential to protect permissions, privacy, and security.
Digital Literacy and Computer Science (2018) Grade(s): 7

DLCS18.7.25

List common methods of system cybersecurity.

UP:DLCS18.7.25

Vocabulary

  • cybersecurity

Knowledge

Students know:
  • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.

Skills

Students are able to:
  • list common methods of protecting digital data online.

Understanding

Students understand that:
  • business and personal data is sought out by hackers.
  • business and personal data must be protected using cybersecurity measures.
Digital Literacy and Computer Science (2018) Grade(s): 8

DLCS18.8.24

Compare and contrast common methods of cybersecurity.

UP:DLCS18.8.24

Vocabulary

  • cybersecurity

Knowledge

Students know:
  • that cybersecurity is used to protect data online; one method of securing data may be better than another for a given situation.

Skills

Students are able to:
  • identify similarities and differences in types of cybersecurity.

Understanding

Students understand that:
  • many methods exist to protect data.

CR Resource Type

Lesson/Unit Plan

Resource Provider

Other

License Type

BY-NC-ND

Resource Provider other

MediaSmarts Canada (mediasmarts.ca)
ALSDE LOGO