
6.9. Cybersecurity¶
This lesson introduces concepts and terminology involved with computer security - how computer systems and data are kept safe. Multi-factor authentication is introduced and explained.
CSP Framework | |||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
![]() | |||||||||||||||||||||||||||||||||||||||||
Enduring Understanding IOC-2: The use of computing innovations may involve risks to your personal safety and identity. | |||||||||||||||||||||||||||||||||||||||||
Learning Objective IOC-2.B: Explain how computing resources can be protected and can be misused. | |||||||||||||||||||||||||||||||||||||||||
Learning Objective IOC-2.C: Explain how unauthorized access to computing resources is gained. | |||||||||||||||||||||||||||||||||||||||||
Professional Development
The Student Lesson: Complete the activities for Mobile CSP Unit 6: Lesson 6.9 Cybersecurity
Materials
- Text version of the student lesson - This document is long and should be broken into several parts and interspersed with activities, as described below.
- Slides
- There are four short video clips in this lesson:
Video 1: What is Two-Factor Authentication (2FA) (1:59)
Video 2: Killing the Need for Passwords With Biometrics (2:24)
Video 3: Symantec Guide to Scary Internet Stuff - Pests on Your PC - Viruses, Trojans & Worms (2:36)
Video 4: Phishing Symantec (2:31) - Computer lab with projection system
6.9.1. Learning Activities¶
Estimated Length: 45 minutes
- Hook/Motivation (5 minutes): Recall that in Unit 5, we saw that it is very difficult to guess a long complex password. Open howsecureismypassword.net in a browser. Try entering the following potential passwords and record the results. Then discuss the students’ findings as a class as well as ask: What would you do if your password is stolen? How might certain apps/websites try to prevent other people from logging into your account using your password?
- abc123
- ComputerScience123
- ComputerSciencer0ck$
- Experiences and Explorations (35 minutes):
- Part 1: Authentication - Using Video 1 (1:59), discuss two-factor and multi-factor authentication. Describe in general how multi-factor authentication works and the types of evidence used (e.g. Something you know, something you have, something you are). Using Video 2 (2:24), further explain biometric authentication. After watching the video, take 2-3 minutes to ask students to share what types of biometric authentication they have seen in real life or in movies.
- Part 2: Malware - Explain that although multi-factor authentication and complex passwords can be used to try to prevent unauthorized account access, another computer security issue to be aware of is malware. Using Video 3 (2:26) discuss malware and the steps you can take to prevent malware and computer viruses.
- Part 3: Unauthorized Access - Using Video 4 (2:31), discuss how phishing, keylogging, and rogue access points can be used to gain unauthorized access to an individual’s personal information. Explain the importance of firewalls
- Activity: Select one or more of the following activities for students complete after watching and discussing the videos. Students should document their findings in their portfolio reflection before the end of class.
- Can you spot when you’re being phished? Do the Phishing Quiz working in pairs or POGIL groups: https://phishingquiz.withgoogle.com. See how many you get right.
- In pairs or POGIL groups, investigate this map http://cybermap.kaspersky.com/ (click on a country and more details or statistics) and http://securelist.com/statistics/ which shows the current week’s infections and attacks. What are the top 3 attacked countries? What country has the highest rate of infections? What is the top infection (virus) currently?
- Investigate a famous or recent malware, hacking, or security breach incident. Write down who, what, when, where, how, and the consequences of the incident.
- (Optional) Activity (30 minutes): Divide students into groups of 2-4. First, they should discuss and write down their responses to the questions designated before the video. Then, show the video. After watching the PBS video, they should discuss and write down their responses to the questions designated after the video. Facilitate groups sharing their answers to both sets of questions.
- Rethink, Reflect and/or Revise (5 minutes): In the time that remains, have students complete the self-check questions and their portfolio reflections.
6.9.2. Professional Development Reflection¶