Learning Resource Type

Learning Activity

Protect Your Password and Your Privacy!

Subject Area

Digital Literacy and Computer Science

Grade(s)

3, 4, 5

Overview

This activity will guide students through a discussion of why, how and when passwords are used to protect individual privacy, how to create strong passwords, and who to share passwords with. The activity will also show students how they can adjust their privacy settings on their online accounts.  After the presentation and discussion, students will practice what they have learned by playing “InterLand,” an online game resource that is part of the “Be Internet Awesome with Google” digital citizenship curriculum, designed for students in grades 3-6. The “Tower of Treasure” learning game focuses on protecting privacy and creating strong passwords.

This activity was created as a result of the ALEX Resource Development Summit.

    Digital Literacy and Computer Science (2018) Grade(s): 3

    DLCS18.3.9

    Identify the proper use and operation of security technologies.

    Unpacked Content

    UP:DLCS18.3.9

    Vocabulary

    • security technologies
    • password
    • login information
    • virus protection
    • malicious
    • spam filters
    • pop-up blocker

    Knowledge

    Students know:
    • software is installed to protect against malicious items.
    • users can protect their information by not sharing passwords or login information.

    Skills

    Students are able to:
    • login to resources using passwords.
    • understand importance of not sharing login information.
    • identify examples of SPAM, pop up blocks, and virus protection software.

    Understanding

    Students understand that:
    • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
    Digital Literacy and Computer Science (2018) Grade(s): 4

    DLCS18.4.8

    Demonstrate the proper use and operation of security technologies.

    Unpacked Content

    UP:DLCS18.4.8

    Vocabulary

    • security technologies
    • privacy
    • password
    • login information
    • virus protection
    • malicious
    • spam
    • spam filters
    • pop-up blocker
    • online identity theft

    Knowledge

    Students know:
    • software and other features such as pop-up blockers are installed to protect against malicious items.
    • unwanted emails or spam can contain links with viruses.
    • users can protect their information by not sharing passwords or login information to help prevent crimes like online identity theft.

    Skills

    Students are able to:
    • login to resources using private passwords.
    • understand importance of not sharing login information.
    • demonstrate how to properly handle or utilize spam, pop up blockers, and virus protection software and features.

    Understanding

    Students understand that:
    • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
    • if an email or pop-up seems too good to be true, it probably is not true.
    Digital Literacy and Computer Science (2018) Grade(s): 5

    DLCS18.5.9

    Explain the proper use and operation of security technologies.

    Unpacked Content

    UP:DLCS18.5.9

    Vocabulary

    • security technologies
    • password
    • login information
    • virus protection
    • malicious
    • spam filters
    • pop-up blocker

    Knowledge

    Students know:
    • software is installed to protect against malicious items.
    • users can protect their information by not sharing passwords or login information.

    Skills

    Students are able to:
    • explain to others how and why you should use strong passwords.
    • explain the causes and effects of someone having and using your password.
    • explain what SPAM, pop up blockers, and virus protection software can do.

    Understanding

    Students understand that:
    • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.

    Phase

    During/Explore/Explain
    Learning Objectives

    Learning Objectives

    I can identify strong vs. weak passwords and I can create strong passwords that are at least 8 characters, are memorable, and use special characters and/or numbers.

    I can adjust privacy settings on online accounts to protect my information.

     

    Activity Details

    Using this presentation, Secure Your Secrets Activity 1 lead a discussion about why passwords are used, the difference between weak and strong passwords, and the things to keep in mind in creating a strong password. 

    The next presentation, Activity 2 Keep it to Yourself, guides students through the process of choosing settings in online accounts like an email account, to protect their private information. It also explains the use of two-step verification.

    Present the InterLand game, Tower of Treasure, using the presentation, Activity 3. Allow time for students to work through the game.  After students play the game, use the questions on the presentation to assess learning and help students internalize what they have learned.

     

     

    Assessment Strategies

    Assessment Strategies

    Students will submit examples of strong passwords that meet the criteria of being memorable, having at least eight characters, and use a combination of upper and lowercase letters, numbers, and symbols.

    Students will describe how to adjust the privacy setting in online accounts.

    Students will answer reflection questions from the presentations. This can be done interactively, utilizing Pear Deck with the presentations or with written or oral responses. See the "Advance Prep" section for how to set up Pear Deck.

     

    Background and Preparation

    Background / Preparation

    Students will need access to computers/devices with Internet access.

    The teacher will need to  download and project the free presentations created by Google's Be Internet Awesome program:

    Activity 1

    Activity 2

    Activity 3

    Used with Pear Deck, these presentations can be interactive. Students can submit responses via their devices (much like Nearpod). When you make copies of the presentations above, you will be prompted to get the "Add On" for Pear Deck.

    To install the Pear Deck Add-on for Google Slides go to Add-ons, Get Add-ons and search for Pear Deck.

    Accept the permissions and open the Pear Deck Sidebar.  

    To launch your interactive Pear Deck presentation, click Present with Pear Deck from the Pear Deck Sidebar, this starts a new Session.

    Students then can type in the code for the session in the Pear Deck App, or online at the Pear Deck/Join website.

    Digital Tools / Resources

    ALSDE LOGO