Learning Resource Type

Classroom Resource

Cybersecurity 101

Subject Area

Digital Literacy and Computer Science

Grade(s)

7, 8, 9, 10, 11, 12

Overview

Learn why protecting your information online is crucial with this video from the NOVA Cybersecurity Lab. The Internet was originally designed to connect large computers at universities, businesses, and governments. It grew exponentially once personal computers became common in the 1980s. Connecting to the Internet leaves computers vulnerable. People can use computers to delete data, spread viruses, or even steal someone’s identity. The good news is that there are several ways to stay safe online. You can learn about protecting information by trying coding, password cracking, and spotting email scams in NOVA’s Cybersecurity Lab. This video includes a student viewing guide to promote discussion.

    Digital Literacy and Computer Science (2018) Grade(s): 7

    DLCS18.7.25

    List common methods of system cybersecurity.

    Unpacked Content

    UP:DLCS18.7.25

    Vocabulary

    • cybersecurity

    Knowledge

    Students know:
    • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.

    Skills

    Students are able to:
    • list common methods of protecting digital data online.

    Understanding

    Students understand that:
    • business and personal data is sought out by hackers.
    • business and personal data must be protected using cybersecurity measures.
    Digital Literacy and Computer Science (2018) Grade(s): 8

    DLCS18.8.24

    Compare and contrast common methods of cybersecurity.

    Unpacked Content

    UP:DLCS18.8.24

    Vocabulary

    • cybersecurity

    Knowledge

    Students know:
    • that cybersecurity is used to protect data online; one method of securing data may be better than another for a given situation.

    Skills

    Students are able to:
    • identify similarities and differences in types of cybersecurity.

    Understanding

    Students understand that:
    • many methods exist to protect data.
    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.36

    Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

    Unpacked Content

    UP:DLCS18.HS.36

    Vocabulary

    • cybersecurity
    • two-factor authentication (TFA)
    • geolocation
    • privacy
    • cryptography

    Knowledge

    Students know:
    • how to evaluate the tradeoffs of cybersecurity recommendations.
    • how to articulate the pros and cons of TFA.
    • the importance of password requirements.
    • how to articulate the pros and cons of geolocation.

    Skills

    Students are able to:
    • explain pros and cons of cybersecurity recommendations.
    • describe the use of two-factor authentication.
    • explain the importance of password requirements.
    • describe the use of geolocation.

    Understanding

    Students understand that:
    • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.
    Link to Resource

    CR Resource Type

    Audio/Video

    Resource Provider

    PBS
    Accessibility

    Accessibility

    Video resources: includes closed captioning or subtitles
    License

    License Type

    Custom
    ALSDE LOGO