E-Business: Web Security

Learning Resource Type

Classroom Resource

Subject Area

Digital Literacy and Computer Science

Grade(s)

3, 4, 5, 9, 10, 11, 12

Overview

In this video, students will learn about the importance of web security which becomes a top priority with more information changing hands electronically.

Digital Literacy and Computer Science (2018) Grade(s): 3

DLCS18.3.9

Identify the proper use and operation of security technologies.

UP:DLCS18.3.9

Vocabulary

  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker

Knowledge

Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.

Skills

Students are able to:
  • login to resources using passwords.
  • understand importance of not sharing login information.
  • identify examples of SPAM, pop up blocks, and virus protection software.

Understanding

Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
Digital Literacy and Computer Science (2018) Grade(s): 4

DLCS18.4.8

Demonstrate the proper use and operation of security technologies.

UP:DLCS18.4.8

Vocabulary

  • security technologies
  • privacy
  • password
  • login information
  • virus protection
  • malicious
  • spam
  • spam filters
  • pop-up blocker
  • online identity theft

Knowledge

Students know:
  • software and other features such as pop-up blockers are installed to protect against malicious items.
  • unwanted emails or spam can contain links with viruses.
  • users can protect their information by not sharing passwords or login information to help prevent crimes like online identity theft.

Skills

Students are able to:
  • login to resources using private passwords.
  • understand importance of not sharing login information.
  • demonstrate how to properly handle or utilize spam, pop up blockers, and virus protection software and features.

Understanding

Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
  • if an email or pop-up seems too good to be true, it probably is not true.
Digital Literacy and Computer Science (2018) Grade(s): 5

DLCS18.5.9

Explain the proper use and operation of security technologies.

UP:DLCS18.5.9

Vocabulary

  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker

Knowledge

Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.

Skills

Students are able to:
  • explain to others how and why you should use strong passwords.
  • explain the causes and effects of someone having and using your password.
  • explain what SPAM, pop up blockers, and virus protection software can do.

Understanding

Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.
Digital Literacy and Computer Science (2018) Grade(s): 5

DLCS18.5.24

Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

UP:DLCS18.5.24

Vocabulary

  • authentication
  • users
  • devices
  • access
  • permission
  • privacy
  • security

Knowledge

Students know:
  • that there is a need for authentication of users and devices as it relates to access permissions, privacy, and security.

Skills

Students are able to:
  • describe the purpose for authentication of users and devices as it relates to access permissions, privacy, and security.

Understanding

Students understand that:
  • authentication of users and devices is essential to protect permissions, privacy, and security.
Digital Literacy and Computer Science (2018) Grade(s): 09-12

DLCS18.HS.36

Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

UP:DLCS18.HS.36

Vocabulary

  • cybersecurity
  • two-factor authentication (TFA)
  • geolocation
  • privacy
  • cryptography

Knowledge

Students know:
  • how to evaluate the tradeoffs of cybersecurity recommendations.
  • how to articulate the pros and cons of TFA.
  • the importance of password requirements.
  • how to articulate the pros and cons of geolocation.

Skills

Students are able to:
  • explain pros and cons of cybersecurity recommendations.
  • describe the use of two-factor authentication.
  • explain the importance of password requirements.
  • describe the use of geolocation.

Understanding

Students understand that:
  • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.

CR Resource Type

Audio/Video

Resource Provider

PBS

License Type

Custom

Accessibility

Video resources: includes closed captioning or subtitles
ALSDE LOGO