Search Results
Student Handout
Image

6, Intermediate (6-8)
Students use what they know and understand about digital security to write a story for younger students. They use a variety of narrative techniques to develop the sequence of events including descriptive details and dialogue that reveal characters' thoughts and feelings. Students plan, revise and edit their literary work. They use media or illustrations to aid in comprehension. Digital publication is optional.
Student Handout
Image

7, Intermediate (6-8)
Students come to understand that Homeland Security threats impact school safety. They review their school's emergency action plan and weigh in on its strength and weaknesses. They then recommend improvements to the plan, incorporating references to digital communication channels in both detecting and responding to threats. As an empowerment project, students produce a public service announcement (PSA) that may incorporate a skit or dramatization.
Student Handout
Image

7, Intermediate (6-8)
Students examine the necessary components of an Acceptable Use Policy (AUP). They use a rubric to evaluate their school's AUP, and they recommend ways that their school or district can strengthen its guidelines and consequences for responsible use of technology.
Lesson Plan
Image

7, Intermediate (6-8)
Students examine the necessary components of an Acceptable Use Policy (AUP). They use a rubric to evaluate their school's AUP, and they recommend ways that their school or district can strengthen its guidelines and consequences for responsible use of technology.
Lesson Plan
Image

7, Intermediate (6-8)
Students closely read informational text and discover that malicious software, or malware, is comprised of computer code. They define different types of malware and they share their knowledge and experience with malware during a collaborative class discussion. Students use what they have learned to write a script or scenario that depicts the problem of malware then demonstrates an appropriate solution.
Student Handout
Image

7, Intermediate (6-8)
Students closely read informational text and discover that malicious software, or malware, is comprised of computer code. They define different types of malware and they share their knowledge and experience with malware during a collaborative class discussion. Students use what they have learned to write a script or scenario that depicts the problem of malware then demonstrates an appropriate solution.
Student Handout
Image

7, Intermediate (6-8)
Students closely read informational text and discover that malicious software, or malware, is comprised of computer code. They define different types of malware and they share their knowledge and experience with malware during a collaborative class discussion. Students use what they have learned to write a script or scenario that depicts the problem of malware then demonstrates an appropriate solution.
Parent & Family Tip Sheet
Image

7, 8, Intermediate (6-8)
Students come to understand that routine maintenance is essential to ensure data security and to protect their computers and devices. They identify types of malware, discuss the ways that malware infects computers and devices, and learn how to prevent security issues.
Student Handout
Image

7, 8, Intermediate (6-8)
Students come to understand that routine maintenance is essential to ensure data security and to protect their computers and devices. They identify types of malware, discuss the ways that malware infects computers and devices, and learn how to prevent security issues.
Student Handout
Image

7, 8, Intermediate (6-8)
Students come to understand that routine maintenance is essential to ensure data security and to protect their computers and devices. They identify types of malware, discuss the ways that malware infects computers and devices, and learn how to prevent security issues.
Parent & Family Tip Sheet
Image

8, Intermediate (6-8)
Students review the security risks associated with downloading items online. Students identify types of spyware, and describe how spyware can compromise personal information. They use technology to produce multimedia presentations that educates others about spyware.
Student Handout
Image

8, 9, 10, 11, 12, Secondary (9-12)
Students examine the issue of cyber terrorism. They identify the ways that the Internet is used in acts of cyber terrorism and cyber warfare. They review domain-specific terms and concepts such as hacking, steganography, malicious code (i.e., viruses and worms). Students think critically and build upon others' ideas in group discussions; devising preventative measures against cyber attacks.
Student Handout
Image

8, 9, 10, 11, 12, Secondary (9-12)
Students examine the issue of cyber terrorism. They identify the ways that the Internet is used in acts of cyber terrorism and cyber warfare. They review domain-specific terms and concepts such as hacking, steganography, malicious code (i.e., viruses and worms). Students think critically and build upon others' ideas in group discussions; devising preventative measures against cyber attacks.
Student Handout
Image

8, 9, 10, 11, 12, Secondary (9-12)
Students examine the issue of cyber terrorism. They identify the ways that the Internet is used in acts of cyber terrorism and cyber warfare. They review domain-specific terms and concepts such as hacking, steganography, malicious code (i.e., viruses and worms). Students think critically and build upon others' ideas in group discussions; devising preventative measures against cyber attacks.
Student Handout
Image

8, 9, 10, 11, 12, Secondary (9-12)
Students examine the issue of cyber terrorism. They identify the ways that the Internet is used in acts of cyber terrorism and cyber warfare. They review domain-specific terms and concepts such as hacking, steganography, malicious code (i.e., viruses and worms). Students think critically and build upon others' ideas in group discussions; devising preventative measures against cyber attacks.
Student Handout
Image

8, 9, 10, 11, 12, Secondary (9-12)
Students examine the issue of cyber terrorism. They identify the ways that the Internet is used in acts of cyber terrorism and cyber warfare. They review domain-specific terms and concepts such as hacking, steganography, malicious code (i.e., viruses and worms). Students think critically and build upon others' ideas in group discussions; devising preventative measures against cyber attacks.
Student Handout
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate cyber security issues. They acquire and use technical terminology related to cyber security while discussing the ramifications for lack of security and the actions that promote the spread of malicious code. Students then describe four basic steps to ensure digital security and create informative materials to educate others.
Multimedia Resource
Image

9, 10, 11, 12, Secondary (9-12)
Students investigate cyber security issues. They acquire and use technical terminology related to cyber security while discussing the ramifications for lack of security and the actions that promote the spread of malicious code. Students then describe four basic steps to ensure digital security and create informative materials to educate others.
Multimedia Resource
Image

K, 1, 2, Primary (K-2)
Students follow dialogue between characters Dot & i as well as informational text to learn that people use the Internet to communicate with one another. Students come to understand that, in order to stay safe and secure, they need to protect their personal information. They discuss safety and security risks, tips and strategies and create a poster to help others stay safe and secure when online.
Multimedia Resource
Image

K, 1, 2, Primary (K-2)
Students follow dialogue between characters Dot & i as well as informational text to learn that people use the Internet to communicate with one another. Students come to understand that, in order to stay safe and secure, they need to protect their personal information. They discuss safety and security risks, tips and strategies and create a poster to help others stay safe and secure when online.