Top 19 Worst Passwords

Learning Resource Type

Classroom Resource

Subject Area

Digital Literacy and Computer Science

Grade(s)

7, 8, 9, 10, 11, 12

Overview

Discover the 19 worst passwords and learn how to keep your password safe from computer hackers in this article from NOVA scienceNOW.  Students can read this article during a lesson on cybersecurity. 

Digital Literacy and Computer Science (2018) Grade(s): 7

DLCS18.7.25

List common methods of system cybersecurity.

UP:DLCS18.7.25

Vocabulary

  • cybersecurity

Knowledge

Students know:
  • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.

Skills

Students are able to:
  • list common methods of protecting digital data online.

Understanding

Students understand that:
  • business and personal data is sought out by hackers.
  • business and personal data must be protected using cybersecurity measures.
Digital Literacy and Computer Science (2018) Grade(s): 8

DLCS18.8.24

Compare and contrast common methods of cybersecurity.

UP:DLCS18.8.24

Vocabulary

  • cybersecurity

Knowledge

Students know:
  • that cybersecurity is used to protect data online; one method of securing data may be better than another for a given situation.

Skills

Students are able to:
  • identify similarities and differences in types of cybersecurity.

Understanding

Students understand that:
  • many methods exist to protect data.
Digital Literacy and Computer Science (2018) Grade(s): 09-12

DLCS18.HS.36

Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

UP:DLCS18.HS.36

Vocabulary

  • cybersecurity
  • two-factor authentication (TFA)
  • geolocation
  • privacy
  • cryptography

Knowledge

Students know:
  • how to evaluate the tradeoffs of cybersecurity recommendations.
  • how to articulate the pros and cons of TFA.
  • the importance of password requirements.
  • how to articulate the pros and cons of geolocation.

Skills

Students are able to:
  • explain pros and cons of cybersecurity recommendations.
  • describe the use of two-factor authentication.
  • explain the importance of password requirements.
  • describe the use of geolocation.

Understanding

Students understand that:
  • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.

CR Resource Type

Informational Material

Resource Provider

PBS

License Type

CUSTOM
ALSDE LOGO