Learning Resource Type

Classroom Resource

E-Business: Web Security

Subject Area

Digital Literacy and Computer Science

Grade(s)

3, 4, 5, 9, 10, 11, 12

Overview

In this video, students will learn about the importance of web security which becomes a top priority with more information changing hands electronically.

    Digital Literacy and Computer Science (2018) Grade(s): 3

    DLCS18.3.9

    Identify the proper use and operation of security technologies.

    Unpacked Content

    UP:DLCS18.3.9

    Vocabulary

    • security technologies
    • password
    • login information
    • virus protection
    • malicious
    • spam filters
    • pop-up blocker

    Knowledge

    Students know:
    • software is installed to protect against malicious items.
    • users can protect their information by not sharing passwords or login information.

    Skills

    Students are able to:
    • login to resources using passwords.
    • understand importance of not sharing login information.
    • identify examples of SPAM, pop up blocks, and virus protection software.

    Understanding

    Students understand that:
    • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
    Digital Literacy and Computer Science (2018) Grade(s): 4

    DLCS18.4.8

    Demonstrate the proper use and operation of security technologies.

    Unpacked Content

    UP:DLCS18.4.8

    Vocabulary

    • security technologies
    • privacy
    • password
    • login information
    • virus protection
    • malicious
    • spam
    • spam filters
    • pop-up blocker
    • online identity theft

    Knowledge

    Students know:
    • software and other features such as pop-up blockers are installed to protect against malicious items.
    • unwanted emails or spam can contain links with viruses.
    • users can protect their information by not sharing passwords or login information to help prevent crimes like online identity theft.

    Skills

    Students are able to:
    • login to resources using private passwords.
    • understand importance of not sharing login information.
    • demonstrate how to properly handle or utilize spam, pop up blockers, and virus protection software and features.

    Understanding

    Students understand that:
    • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
    • if an email or pop-up seems too good to be true, it probably is not true.
    Digital Literacy and Computer Science (2018) Grade(s): 5

    DLCS18.5.9

    Explain the proper use and operation of security technologies.

    Unpacked Content

    UP:DLCS18.5.9

    Vocabulary

    • security technologies
    • password
    • login information
    • virus protection
    • malicious
    • spam filters
    • pop-up blocker

    Knowledge

    Students know:
    • software is installed to protect against malicious items.
    • users can protect their information by not sharing passwords or login information.

    Skills

    Students are able to:
    • explain to others how and why you should use strong passwords.
    • explain the causes and effects of someone having and using your password.
    • explain what SPAM, pop up blockers, and virus protection software can do.

    Understanding

    Students understand that:
    • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.
    Digital Literacy and Computer Science (2018) Grade(s): 5

    DLCS18.5.24

    Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

    Unpacked Content

    UP:DLCS18.5.24

    Vocabulary

    • authentication
    • users
    • devices
    • access
    • permission
    • privacy
    • security

    Knowledge

    Students know:
    • that there is a need for authentication of users and devices as it relates to access permissions, privacy, and security.

    Skills

    Students are able to:
    • describe the purpose for authentication of users and devices as it relates to access permissions, privacy, and security.

    Understanding

    Students understand that:
    • authentication of users and devices is essential to protect permissions, privacy, and security.
    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.36

    Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

    Unpacked Content

    UP:DLCS18.HS.36

    Vocabulary

    • cybersecurity
    • two-factor authentication (TFA)
    • geolocation
    • privacy
    • cryptography

    Knowledge

    Students know:
    • how to evaluate the tradeoffs of cybersecurity recommendations.
    • how to articulate the pros and cons of TFA.
    • the importance of password requirements.
    • how to articulate the pros and cons of geolocation.

    Skills

    Students are able to:
    • explain pros and cons of cybersecurity recommendations.
    • describe the use of two-factor authentication.
    • explain the importance of password requirements.
    • describe the use of geolocation.

    Understanding

    Students understand that:
    • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.
    Link to Resource

    CR Resource Type

    Audio/Video

    Resource Provider

    PBS
    Accessibility

    Accessibility

    Video resources: includes closed captioning or subtitles
    License

    License Type

    Custom
    ALSDE LOGO