9-12.NI.6 Compare and contrast security measures to address various security threats.
Students learn about encryption including HTTPS, certificate authorities.
Students investigate three security risks (phishing, keylogging, malware).
Students learn about cybersecurity & crime, Equifax breach.
Explore ways computers, programs, networks, & people are exploited by hackers & prevention tips.
Explore ways computers, programs, networks, & people are exploited by hackers & prevention tips.
Students describe various challenges to cybersecurity.
Students learn about limits of algorithms, parallel computing.
Students investigate privacy risks for mobile devices.
9-12.NI.7 Compare and contrast cryptographic techniques to model the secure transmission of information.
Lesson plans, slides, student texts, applicable links.
Students make their own Enigma Machine, the famous encryption device used during World War II.
Students review publis security issues & user security challenges.
Students explore two different encryption widgets.
Students tour multifactor authentication, software updates to protect data.
Map Tour with TinyDB, Electronic Documents.
Students investigate privacy risks for mobile devices.
Students learn about limits of algorithms, parallel computing.
Classic cryptography covers encryption & decryption of various ciphers & historical context.
Lesson from Mobile CSP curriculum.