Search Results
Student Handout
Image

8, 9, 10, 11, 12, Secondary (9-12)
Students examine the issue of cyber terrorism. They identify the ways that the Internet is used in acts of cyber terrorism and cyber warfare. They review domain-specific terms and concepts such as hacking, steganography, malicious code (i.e., viruses and worms). Students think critically and build upon others' ideas in group discussions; devising preventative measures against cyber attacks.
Lesson Plan
Image

8, 9, 10, 11, 12, Secondary (9-12)
Students examine the issue of cyber terrorism. They identify the ways that the Internet is used in acts of cyber terrorism and cyber warfare. They review domain-specific terms and concepts such as hacking, steganography, malicious code (i.e., viruses and worms). Students think critically and build upon others' ideas in group discussions; devising preventative measures against cyber attacks.
Lesson Plan
Image

8, Intermediate (6-8)
Students review the security risks associated with downloading items online. Students identify types of spyware, and describe how spyware can compromise personal information. They use technology to produce multimedia presentations that educates others about spyware.
Lesson Plan
Image

8, Intermediate (6-8)
Students review what they have learned about cyber security. The correlating slideshow addresses topics such as malware, e-mail protocol, Acceptable Use Policies, peer-to-peer file sharing, and the risks of digital downloads including e-mail attachments, online programs and digital content. They then review signs of digital infection and ways to prevent cyber security issues. Students then complete a media-based empowerment project that educates others about cyber security problems and solutions.
Student Handout
Image

8, Intermediate (6-8)
Students come to understand that Homeland Security threats impact school safety. They review their school's emergency action plan and weigh in on its strength and weaknesses. They then recommend improvements to the plan, incorporating references to digital communication channels in both detecting and responding to threats. As an empowerment project, students produce a public service announcement (PSA).
Lesson Plan
Image

8, Intermediate (6-8)
Students come to understand that Homeland Security threats impact school safety. They review their school's emergency action plan and weigh in on its strength and weaknesses. They then recommend improvements to the plan, incorporating references to digital communication channels in both detecting and responding to threats. As an empowerment project, students produce a public service announcement (PSA).
Student Handout
Image

8, Intermediate (6-8)
Students examine the issue of cyber terrorism. They identify ways that the Internet is used in acts of cyber terrorism and cyber warfare. They acquire and use domain-specific terms and concepts such as hacking, steganography, malicious code (i.e. viruses and worms) Students think critically and build upon others' ideas in group discussions. They devise preventative measures against cyber attacks.
Student Handout
Image

8, Intermediate (6-8)
Students examine the issue of cyber terrorism. They identify ways that the Internet is used in acts of cyber terrorism and cyber warfare. They acquire and use domain-specific terms and concepts such as hacking, steganography, malicious code (i.e. viruses and worms) Students think critically and build upon others' ideas in group discussions. They devise preventative measures against cyber attacks.
Student Handout
Image

8, Intermediate (6-8)
Students examine the issue of cyber terrorism. They identify ways that the Internet is used in acts of cyber terrorism and cyber warfare. They acquire and use domain-specific terms and concepts such as hacking, steganography, malicious code (i.e. viruses and worms) Students think critically and build upon others' ideas in group discussions. They devise preventative measures against cyber attacks.
Student Handout
Image

8, Intermediate (6-8)
Students examine the issue of cyber terrorism. They identify ways that the Internet is used in acts of cyber terrorism and cyber warfare. They acquire and use domain-specific terms and concepts such as hacking, steganography, malicious code (i.e. viruses and worms) Students think critically and build upon others' ideas in group discussions. They devise preventative measures against cyber attacks.
Student Handout
Image

8, Intermediate (6-8)
Students examine the issue of cyber terrorism. They identify ways that the Internet is used in acts of cyber terrorism and cyber warfare. They acquire and use domain-specific terms and concepts such as hacking, steganography, malicious code (i.e. viruses and worms) Students think critically and build upon others' ideas in group discussions. They devise preventative measures against cyber attacks.
Student Handout
Image

8, Intermediate (6-8)
Students examine the issue of cyber terrorism. They identify ways that the Internet is used in acts of cyber terrorism and cyber warfare. They acquire and use domain-specific terms and concepts such as hacking, steganography, malicious code (i.e. viruses and worms) Students think critically and build upon others' ideas in group discussions. They devise preventative measures against cyber attacks.
Lesson Plan
Image

8, Intermediate (6-8)
Students examine the issue of cyber terrorism. They identify ways that the Internet is used in acts of cyber terrorism and cyber warfare. They acquire and use domain-specific terms and concepts such as hacking, steganography, malicious code (i.e. viruses and worms) Students think critically and build upon others' ideas in group discussions. They devise preventative measures against cyber attacks.
Student Handout
Image

8, Intermediate (6-8)
Students come to understand that peer-to-peer (P2P) networks and file-sharing technologies pose security risks. They discuss examples of P2P networks, identify security risks and determine ways to prevent security issues.
Lesson Plan
Image

8, Intermediate (6-8)
Students come to understand that peer-to-peer (P2P) networks and file-sharing technologies pose security risks. They discuss examples of P2P networks, identify security risks and determine ways to prevent security issues.
Lesson Plan
Image

8, Intermediate (6-8)
Students build knowledge and understanding of malware and cybersecurity protocol through close reading of informational text and collaborative discussion. Students also use graphic organizers to aide in comprehension. They practice informed decision-making by responding to a series of cyber security scenarios.
Student Handout
Image

8, Intermediate (6-8)
Students build knowledge and understanding of malware and cybersecurity protocol through close reading of informational text and collaborative discussion. Students also use graphic organizers to aide in comprehension. They practice informed decision-making by responding to a series of cyber security scenarios.
Student Handout
Image

8, Intermediate (6-8)
Students build knowledge and understanding of malware and cybersecurity protocol through close reading of informational text and collaborative discussion. Students also use graphic organizers to aide in comprehension. They practice informed decision-making by responding to a series of cyber security scenarios.
Student Handout
Image

8, Intermediate (6-8)
Students build knowledge and understanding of malware and cybersecurity protocol through close reading of informational text and collaborative discussion. Students also use graphic organizers to aide in comprehension. They practice informed decision-making by responding to a series of cyber security scenarios.
Student Handout
Image

8, Intermediate (6-8)
Students build knowledge and understanding of malware and cybersecurity protocol through close reading of informational text and collaborative discussion. Students also use graphic organizers to aide in comprehension. They practice informed decision-making by responding to a series of cyber security scenarios.