1. This program begins with an introduction to Cybersecurity.
2. The class will then discuss social engineering and play a social engineering game.
3. We then will discuss what encryption and decryption are and try a cryptology challenge.
4. Students will learn about good passwords rules and try to create a team password with the highest score.
5. Students will learn about hacking, phising and tips to keep their information safe.
- understand the importance of keeping personal identifiable information safe
- learn rules of password safety
- explore tips for avoiding scams
- engage in a discussion of social engineering
- learn about how encryption can protect your privacy
NYS Computer Science and Digital Fluency Standards:
K-1.IC.4 Identify public and private spaces in our daily lives.
K-1.CY.1 Identify reasons for keeping information private.
K-1.CY.2 Identify why it is important to keep your account secure.
K-1.CY.4 Decode a word or short message using a simple code.
2-3.IC.4 Identify public and private digital spaces.
2-3.CY.1 Compare reasons why an individual should keep information private or make information public.
2-3.CY.2 Compare and contrast behaviors that do and do not keep information secure.
2-3.CY.3 Identify why someone might choose to share an account, app access, or devices.
2-3.CY.4 Encode and decode a short message or phrase.
4-6.IC.3 Explain current events that involve computing technologies.
4-6.IC.4 Explain who has access to data in different digital spaces.
4-6.CY.1 Explain why different types of information might need to be protected.
4-6.CY.2 Describe common safeguards for protecting personal information.
4-6.CY.3 Describe trade-offs between allowing information to be public and keeping information private and secure.
4-6.CY.4 Model and explain the purpose of simple cryptographic methods.
7-8.IC.4 Identify and discuss issues related to the collection and use of public and private data.
7-8.CY.1 Determine the types of personal information and digital resources that an individual may have access to that needs to be protected.
7-8.CY.2 Describe physical, digital, and behavioral safeguards that can be employed in different situations.
9-12.IC.4 Assess personal and societal tradeoffs related to computing technologies and data privacy.
9-12.CY.1 Determine the types of personal and organizational information and digital resources that an individual may have access to that needs to be protected.
9-12.CY.2 Describe physical, digital, and behavioral safeguards that can be employed to protect the confidentiality, integrity, and accessibility of information.