Section 3.2
Unit 3 Vocabulary
Learning Goals
Students will define terms associated with the security of data and computing resources. All terms can be found here.
Key vocabulary includes: Personally Identifiable Information (PII), search engine, search history, geolocation, cookie, browsing history, privacy, identity theft, authentication measures, multi factor authentication, password, encryption, symmetric encryption, asymmetric encryption, public key encryption, certificate authorities, virus, malware scanning software, malware, phishing, keylogging, rogue access point, malicious link, freeware/shareware, trust model
Objectives and General Description
Vocabulary and terminology are important to any unit of instruction. The objective is to develop an understanding of the key components of this unit and to apply these concepts to the ARC challenge and to classroom demonstrations throughout Unit 3.
Students will be given the overall vocabulary for Unit 3. This vocabulary set covers cybersecurity terms. Students should write the definitions in their own words.
Activities
Activity 3.2.1 (Given as an outside assignment)
Students can find the definitions for these words in textbooks or online. Good online resources are:
Once students have defined the terms, it is important to review the terminology throughout the instructional lessons when the concepts are being demonstrated. A good strategy is to have the daily vocab terms written on the board. This helps ensure that the demonstrations cover the important concepts and makes sure that all vocab terms are eventually covered in class.
Once the class has participated in a lesson, have the students go back to their handwritten vocabulary list. Do they need to add any details or examples to the definition?
Vocabulary review ideas
Write a definition in your own words as a ticket out the door
Have students write assessment questions for vocab terms (multiple choice, fill in the blank, matching, etc.)