0

Cybersecurity - an Introduction to Digital Safety

by  Long Island Science Center

Program image

Students will learn about the importance of how to keep
personal information private in the digital world and about techniques hackers
use to get information. They will test their password making skills, play a
social engineering game, and try their hand at encryption using our cryptography
code. All programs can be delivered in both English and Spanish.

Program Rating

This program has not yet been evaluated.
Book it!

About This Program

Cost

By Request: $225.00


This program includes a mailed kit with materials. Please allow at least 2 weeks for delivery. The attached materials may need to be changed for your grade level.

Length

45-60 minutes


Target Audience

Education: Grade(s) Kindergarten, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, Homeschool/Family , Learning PodPublic Library: Library Patrons

Minimum participants:

5

Maximum participants:

25


Primary Disciplines

STEM, Technology/Information Science


Program Delivery Mode

Videoconference - H.323 (Polycom, Cisco/Tandberg, LifeSize, etc...)
Videoconference – Webcam/desktop (Zoom, Google Meet, Cisco WebEx, GoToMeeting, Microsoft Teams, etc...)
ZoomWe can use the organizations platform of choice



Booking Information

Programs are available from 8am-7pm EST

Book it!

Receive this program and 9 more for one low price when you purchase the CILC Virtual Expeditions package. Learn more

For more information contact CILC at (507) 388-3672

Provider's Cancellation Policy

If your plans change, please let us know as soon as possible. Cancellations made less than 4 weeks out from your reserved date will be subject to a 10% cancellation fee. Cancellations made less than 2 weeks out are subject to a 25% cancellation fee. Date rescheduling may be done up to 2 weeks before your reserved date. Rescheduling done less than 2 weeks before your date will be subject to a 10% rescheduling fee.

About This Provider

Content Provider logo

 

Long Island Science Center

Riverhead, NY
United States

Today's students - tomorrow's innovators! The Long Island Science Center is a 501(c)3 STEAM (Science, Technology, Engineering, Arts, Mathematics)  Learning Museum with a mission to prepare young people for the challenges of a 21st century economy built on advanced technology and innovation. We have provided STEAM based programs to students in schools and libraries in the New York Area since 1995. Our programs have been delivered to more than 350,000 students.

We ignite curiosity, fuel creativity and unlock the passion for problem-solving and discovery with hands-on STEAM curricula, programs, and interactive experiences designed to cultivate future leaders and engaged citizens.

Contact:
Education Department
booking@sciencecenterli.org
6312088000

Program Details

Format

1. This program begins with an introduction to Cybersecurity.
2. The class will then discuss social engineering and play a social engineering game.
3. We then will discuss what encryption and decryption are and try a cryptology challenge.
4. Students will learn about good passwords rules and try to create a team password with the highest score.
5. Students will learn about hacking, phising and tips to keep their information safe.

Objectives

- understand the importance of keeping personal identifiable information safe
- learn rules of password safety
- explore tips for avoiding scams
- engage in a discussion of social engineering
- learn about how encryption can protect your privacy

Standards Alignment

State Standards

NYS Computer Science and Digital Fluency Standards:
K-1.IC.4 Identify public and private spaces in our daily lives.
K-1.CY.1 Identify reasons for keeping information private.
K-1.CY.2 Identify why it is important to keep your account secure.
K-1.CY.4 Decode a word or short message using a simple code.
2-3.IC.4 Identify public and private digital spaces.
2-3.CY.1 Compare reasons why an individual should keep information private or make information public.
2-3.CY.2 Compare and contrast behaviors that do and do not keep information secure.
2-3.CY.3 Identify why someone might choose to share an account, app access, or devices.
2-3.CY.4 Encode and decode a short message or phrase.
4-6.IC.3 Explain current events that involve computing technologies.
4-6.IC.4 Explain who has access to data in different digital spaces.
4-6.CY.1 Explain why different types of information might need to be protected.
4-6.CY.2 Describe common safeguards for protecting personal information.
4-6.CY.3 Describe trade-offs between allowing information to be public and keeping information private and secure.
4-6.CY.4 Model and explain the purpose of simple cryptographic methods.
7-8.IC.4 Identify and discuss issues related to the collection and use of public and private data.
7-8.CY.1 Determine the types of personal information and digital resources that an individual may have access to that needs to be protected.
7-8.CY.2 Describe physical, digital, and behavioral safeguards that can be employed in different situations.
9-12.IC.4 Assess personal and societal tradeoffs related to computing technologies and data privacy.
9-12.CY.1 Determine the types of personal and organizational information and digital resources that an individual may have access to that needs to be protected.
9-12.CY.2 Describe physical, digital, and behavioral safeguards that can be employed to protect the confidentiality, integrity, and accessibility of information.