Learning Resource Type

Classroom Resource

Top 19 Worst Passwords

Subject Area

Digital Literacy and Computer Science

Grade(s)

7, 8, 9, 10, 11, 12

Overview

Discover the 19 worst passwords and learn how to keep your password safe from computer hackers in this article from NOVA scienceNOW.  Students can read this article during a lesson on cybersecurity. 

    Digital Literacy and Computer Science (2018) Grade(s): 7

    DLCS18.7.25

    List common methods of system cybersecurity.

    Unpacked Content

    UP:DLCS18.7.25

    Vocabulary

    • cybersecurity

    Knowledge

    Students know:
    • there are individuals who go to great lengths to obtain personal information, therefore it is important to use cybersecurity to protect personal and business data.

    Skills

    Students are able to:
    • list common methods of protecting digital data online.

    Understanding

    Students understand that:
    • business and personal data is sought out by hackers.
    • business and personal data must be protected using cybersecurity measures.
    Digital Literacy and Computer Science (2018) Grade(s): 8

    DLCS18.8.24

    Compare and contrast common methods of cybersecurity.

    Unpacked Content

    UP:DLCS18.8.24

    Vocabulary

    • cybersecurity

    Knowledge

    Students know:
    • that cybersecurity is used to protect data online; one method of securing data may be better than another for a given situation.

    Skills

    Students are able to:
    • identify similarities and differences in types of cybersecurity.

    Understanding

    Students understand that:
    • many methods exist to protect data.
    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.36

    Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

    Unpacked Content

    UP:DLCS18.HS.36

    Vocabulary

    • cybersecurity
    • two-factor authentication (TFA)
    • geolocation
    • privacy
    • cryptography

    Knowledge

    Students know:
    • how to evaluate the tradeoffs of cybersecurity recommendations.
    • how to articulate the pros and cons of TFA.
    • the importance of password requirements.
    • how to articulate the pros and cons of geolocation.

    Skills

    Students are able to:
    • explain pros and cons of cybersecurity recommendations.
    • describe the use of two-factor authentication.
    • explain the importance of password requirements.
    • describe the use of geolocation.

    Understanding

    Students understand that:
    • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.
    Link to Resource

    CR Resource Type

    Informational Material

    Resource Provider

    PBS
    Accessibility
    License

    License Type

    CUSTOM
    ALSDE LOGO