Search Results
Teacher Reference Page
Image

3, 4, 5, Elementary (3-5)
Students come to understand the basic ways that phishing, spam, and scam e-mails solicit personal information. They use vocabulary terms in a class discussion, and discover ways to age-appropriately deal with security risks.
Teacher Reference Page
Image

3, 4, 5, Elementary (3-5)
Students come to understand the basic ways that phishing, spam, and scam e-mails solicit personal information. They use vocabulary terms in a class discussion, and discover ways to age-appropriately deal with security risks.
Student Handout
Image

3, 4, 5, 6, Elementary (3-5), Intermediate (6-8)
Henny Penny thinks the sky is falling because of what she receives in her e-mail inbox. Students learn about security risks associated with e-mail by determining the central lesson in the story. They acquire and use new vocabulary terms related to digital security in discussion and when answering questions about the events in the story.
Student Handout
Image

3, 4, 5, 6, Elementary (3-5), Intermediate (6-8)
Henny Penny thinks the sky is falling because of what she receives in her e-mail inbox. Students learn about security risks associated with e-mail by determining the central lesson in the story. They acquire and use new vocabulary terms related to digital security in discussion and when answering questions about the events in the story.
Lesson Plan
Image

3, 4, 5, 6, Elementary (3-5), Intermediate (6-8)
Students come to understand that technology users are responsible for maintaining the security of their computers and devices. They determine the central lesson in the Story of the Pig Family; discuss digital security issues, and draw correlations with the central lesson in the traditional story of the Three Little Pigs.
Parent & Family Tip Sheet
Image

5, Elementary (3-5)
Students come to understand that malware causes damage to computers and digital devices. They learn how to identify suspicious e-mail attachments, detect the signs of an infected computer, and follow the recommended protocol in the case of compromised security. Students aquire and use domain-specific vocabulary terms: malware, malicious code, viruses, worms, Trojans and spyware.
Teacher Reference Page
Image

5, Elementary (3-5)
Students come to understand that malware causes damage to computers and digital devices. They learn how to identify suspicious e-mail attachments, detect the signs of an infected computer, and follow the recommended protocol in the case of compromised security. Students aquire and use domain-specific vocabulary terms: malware, malicious code, viruses, worms, Trojans and spyware.
Student Handout
Image

5, Elementary (3-5)
Students come to understand that malware causes damage to computers and digital devices. They learn how to identify suspicious e-mail attachments, detect the signs of an infected computer, and follow the recommended protocol in the case of compromised security. Students aquire and use domain-specific vocabulary terms: malware, malicious code, viruses, worms, Trojans and spyware.
Student Handout
Image

5, Elementary (3-5)
Students learn how malicious code spreads by participating in a hands-on activity that simulates a computer virus. They then reflect on what they have learned in a class discussion and in writing.
Student Handout
Image

5, Elementary (3-5)
Students learn how malicious code spreads by participating in a hands-on activity that simulates a computer virus. They then reflect on what they have learned in a class discussion and in writing.
Multimedia Resource
Image

6, Intermediate (6-8)
Students review what they have learned about cyber security. The correlating slideshow addresses topics such as malware, e-mail protocol, Acceptable Use Policies, peer-to-peer file sharing, and the risks of digital downloads including e-mail attachments, online programs and digital content. They then review signs of digital infection and ways to prevent cyber security issues. Students then complete a media-based empowerment project that educates others about cyber security problems and solutions.
Student Handout
Image

6, Intermediate (6-8)
Students learn to identify SPAM and scam e-mails through close reading of informational text and collaborative discussion. Students conduct a short research project on SPAM and scam e-mail, and they add to their list of security tips.
Lesson Plan
Image

6, Intermediate (6-8)
Students learn to identify SPAM and scam e-mails through close reading of informational text and collaborative discussion. Students conduct a short research project on SPAM and scam e-mail, and they add to their list of security tips.
Student Handout
Image

6, Intermediate (6-8)
Students come to understand that, by following the proper protocol when using e-mail applications, they can protect their computer or device from security issues. Through close reading of informational text and relevant exercises, students learn how to identify potentially malicious e-mails. Students add to their list of cyber security tips.
Student Handout
Image

6, Intermediate (6-8)
Students come to understand that, by following the proper protocol when using e-mail applications, they can protect their computer or device from security issues. Through close reading of informational text and relevant exercises, students learn how to identify potentially malicious e-mails. Students add to their list of cyber security tips.
Student Handout
Image

6, Intermediate (6-8)
Students come to understand that, by following the proper protocol when using e-mail applications, they can protect their computer or device from security issues. Through close reading of informational text and relevant exercises, students learn how to identify potentially malicious e-mails. Students add to their list of cyber security tips.
Student Handout
Image

6, Intermediate (6-8)
Students come to understand that, by following the proper protocol when using e-mail applications, they can protect their computer or device from security issues. Through close reading of informational text and relevant exercises, students learn how to identify potentially malicious e-mails. Students add to their list of cyber security tips.
Teacher Reference Page
Image

6, Intermediate (6-8)
Students come to understand that, by following the proper protocol when using e-mail applications, they can protect their computer or device from security issues. Through close reading of informational text and relevant exercises, students learn how to identify potentially malicious e-mails. Students add to their list of cyber security tips.
Student Handout
Image

6, Intermediate (6-8)
Students use what they know and understand about digital security to write a story for younger students. They use a variety of narrative techniques to develop the sequence of events including descriptive details and dialogue that reveal characters' thoughts and feelings. Students plan, revise and edit their literary work. They use media or illustrations to aid in comprehension. Digital publication is optional.
Student Handout
Image

6, Intermediate (6-8)
Students use what they know and understand about digital security to write a story for younger students. They use a variety of narrative techniques to develop the sequence of events including descriptive details and dialogue that reveal characters' thoughts and feelings. Students plan, revise and edit their literary work. They use media or illustrations to aid in comprehension. Digital publication is optional.