Unit 6 - BIG Data & PRIVACY

Lesson 10 -Cybercrime

LESSON MATERIALS (YOU CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)

Objectives

Students will be able to:

  • Research and describe a cyber attack found in the news
  • Reason about the threats posed by, and methods of recourse for, various types of cyber attacks
  • Describe plausible storage, security, or privacy concerns for particular pieces of data

Supplementary Resources


Lesson 09 - Public Key Cryptography

LESSON MATERIALS (YOU CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)

Objectives

Students will be able to:

  • Explain the difference between symmetric and asymmetric encryption.
  • Describe the basic process of encrypting data using public key encryption.
  • Explain the benefits of public key cryptography.

Supplementary Resources

Lesson 08 -Encryption with Keys and Passwords

LESSON MATERIALS (YOU CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)

Objectives

Students will be able to:

  • Understand that exponential growth is related to an encryption algorithm strength.
  • Explain how and why the Vigenère cipher is a stronger form of encryption than plain substitution.

Supplementary Resources


Lesson 07 - Simple Encryption

LESSON MATERIALS (YOU CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)

Objectives

Students will be able to:

  • Explain why encryption is an important need for everyday life on the Internet.
  • Crack a message encrypted with a Caesar cipher using a Caesar Cipher Widget

Supplementary Resources

Lesson 06 - The Cost of Free

LESSON MATERIALS (YOU CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)

Objectives

Students will be able to:

  • Explain some of the privacy and economic tradeoffs involved in the collection and use of personal data.
  • Describe the ways and reasons organizations collect information about individuals.

Supplementary Resources

Lesson 05 - Identifying People With Data

LESSON MATERIALS (YOU CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)

Objectives

Students will be able to:

  • Use online search tools to find and connect information about a person or topic of interest.
  • Analyze the personal privacy and security concerns that arise with any use of computational systems.

Supplementary Resources

Lesson 04 - Rapid Research - Data Innovations

LESSON MATERIALS (YOU CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)

Objectives

Students will be able to:

  • Identify a suitable computing innovation for a research project.
  • Synthesize information taken from multiple online sources to create a cohesive description of a computing innovation.

Supplementary Resources

Lesson 03 - Check Your Assumptions

LESSON MATERIALS (YOU CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)

Objectives

Students will be able to:

  • Define the digital divide as the variation in access or use of technology by various demographic characteristics.
  • Identify assumptions made when drawing conclusions from data and data visualizations

Supplementary Resources

Lesson 02 - Finding Trends with Visualizations

LESSON MATERIALS (YOU CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)

Objectives

Students will be able to:

  • Accurately describe what a data visualization of a trend is showing.
  • Provide plausible explanations of trends and patterns observed within a data visualization.

Supplementary Resources

Lesson 01 - What is Big Data?

LESSON MATERIALS (YOU CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)

Objectives

Students will be able to:

  • Explain that new techniques are necessary to store, manage, transmit, and process data at the scale it is currently being produced.

Supplementary Resources

VOCABULARY

  • Big Data - a broad term for data sets so large or complex that traditional data processing applications are inadequate.
  • Moore's Law - a predication made by Gordon Moore in 1965 that computing power will double every 1.5-2 years, it has remained more or less true ever since.
  • Datafied - A modern technological trend turning many aspects of our life into data which is subsequently transfer into information realized as a new form of value.