Search Results
Lesson Plan
Image

8, Intermediate (6-8)
Students review what they already know and understand about malware. They examine cyber security issues ranging from a personal to national level. Students create and publish a Public Service Announcement (PSA) to inform others of the steps to prevent cyber security issues. Students accurately use domain-specific words and phrases in their PSA.
Lesson Plan
Image

7, Intermediate (6-8)
Students come to understand that Homeland Security threats impact school safety. They review their school's emergency action plan and weigh in on its strength and weaknesses. They then recommend improvements to the plan, incorporating references to digital communication channels in both detecting and responding to threats. As an empowerment project, students produce a public service announcement (PSA) that may incorporate a skit or dramatization.
Student Handout
Image

7, Intermediate (6-8)
Students examine the necessary components of an Acceptable Use Policy (AUP). They use a rubric to evaluate their school's AUP, and they recommend ways that their school or district can strengthen its guidelines and consequences for responsible use of technology.
Lesson Plan
Image

7, Intermediate (6-8)
Students examine specific types of malware to discover how e-mail attachments, files and programs downloaded from the Internet affect computers and devices. They then learn how to protect their computers and information from security threats. Students come to understand that school policies and guidelines aim to prevent digital security issues, and they develop a cyber security action plan. As evidence of their learning students write a narrative that depicts a cyber security situation while accurately using domain-specific terminology.
Lesson Plan
Image

6, Intermediate (6-8)
Students use what they know and understand about digital security to write a story for younger students. They use a variety of narrative techniques to develop the sequence of events including descriptive details and dialogue that reveal characters' thoughts and feelings. Students plan, revise and edit their literary work. They use media or illustrations to aid in comprehension. Digital publication is optional.
Lesson Plan
Image

6, Intermediate (6-8)
Students learn to identify SPAM and scam e-mails through close reading of informational text and collaborative discussion. Students conduct a short research project on SPAM and scam e-mail, and they add to their list of security tips.
Lesson Plan
Image

6, Intermediate (6-8)
Students come to understand that, by following the proper protocol when using e-mail applications, they can protect their computer or device from security issues. Through close reading of informational text and relevant exercises, students learn how to identify potentially malicious e-mails. Students add to their list of cyber security tips.
Lesson Plan
Image

6, Intermediate (6-8)
Students examine specific types of malware, and they learn how to protect their computers, devices and information security. Students acquire and use technical terms. As an empowerment project, students create a media-based project that educates and empowers others to practice cyber security.
Lesson Plan
Image

5, 6, Elementary (3-5), Intermediate (6-8)
Students come to understand that spyware is type of malicious program that tracks computer user activities and collects personal information. They learn how computers become infected with spyware, identify signs that a computer is infected, and discover ways to keep their computer and personal information secure.
Lesson Plan
Image

5, Elementary (3-5)
Students come to understand that malware causes damage to computers and digital devices. They learn how to identify suspicious e-mail attachments, detect the signs of an infected computer, and follow the recommended protocol in the case of compromised security. Students aquire and use domain-specific vocabulary terms: malware, malicious code, viruses, worms, Trojans and spyware.
Parent & Family Tip Sheet
Image

3, 4, 5, Elementary (3-5)
Students come to understand the basic ways that phishing, spam, and scam e-mails solicit personal information. They use vocabulary terms in a class discussion, and discover ways to age-appropriately deal with security risks.
Lesson Plan
Image

3, 4, 5, Elementary (3-5)
Students come to understand the basic ways that phishing, spam, and scam e-mails solicit personal information. They use vocabulary terms in a class discussion, and discover ways to age-appropriately deal with security risks.
Lesson Plan
Image

3, 4, Elementary (3-5)
Students build on prior learning. They examine cyber security issues brought about by e-mail attachments. Students identify types of malware. They learn the steps to prevent malicious code from damaging a computer and use vocabulary terms in a class discussion. As evidence of their learning, students select the best response in a given scenario.
Lesson Plan
Image

1, Primary (K-2)
Students learn that a computer virus is type of program that can infect a computer through e-mail. This lesson builds upon prior learning in grade K. Students participate in collaborative class discussion and share their learning with family members.
Lesson Plan
Image

K, 1, 2, 3, 4, 5, Primary (K-2), Elementary (3-5)
As an Empowerment Activity, students use what they have learned about digital security to construct a bulletin board filled with security tips.
Lesson Plan
Image

K, Primary (K-2)
The i-SAFE character “i-Buddy” demonstrates how computers can get sick with a virus. Students learn that a computer virus prevents a computer or device from functioning properly.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students understand that information found on the Web is easy to select, copy and paste into one’s own written work. iDrive Digital Correspondents gather multiple perspectives on plagiarism and examine the present and future consequences for passing off another person’s work as their own. Students examine their own school policy on digital ethics and practice giving credit where credit is due. Use with iDrive Student Toolkit.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate the problem of intellectual property violations that occur through the Internet. Through the video and class discussion, students clarify misconceptions about using information and media found online for personal use and school assignments. They examine the consequences of intellectual property theft both for the owner and the person that violates ownership rights. Students come to understand that digital citizens respect and protect intellectual property rights.
Lesson Plan
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate the problem of intellectual property violations that occur through the Internet. Through the video and class discussion, students clarify misconceptions about using information and media found online for personal use and school assignments. They examine the consequences of intellectual property theft both for the owner and the person that violates ownership rights. Students come to understand that digital citizens respect and protect intellectual property rights.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students closely read informational text about digital piracy. They then participate in a survey that gains insight into their knowledge and experiences with online intellectual property. Students engage in a collaborative discussion and determine ways to legally and ethically obtain music online.