1B-NI-05 -- Discuss real-world cybersecurity problems and how personal information can be protected.
Grade band: 3 - 5 Concept: Networks & the Internet Sub-concept: Cybersecurity Practice: 3.1 Recognizing and Defining Computational Problems
Just as we protect our personal property offline, we also need to protect our devices and the information stored on them. Information can be protected using various security measures. These measures can be physical and/or digital. Students could discuss or use a journaling or blogging activity to explain, orally or in writing, about topics that relate to personal cybersecurity issues. Discussion topics could be based on current events related to cybersecurity or topics that are applicable to students, such as the necessity of backing up data to guard against loss, how to create strong passwords and the importance of not sharing passwords, or why we should install and keep anti-virus software updated to protect data and systems.
The ability to recognize appropriate and worthwhile opportunities to apply computation is a skill that is central to computing. Solving a problem with a computational approach requires defining the problem, breaking it down into parts, and evaluating each part to determine whether a computational solution is appropriate.
Make it timely and discuss how tools such as Zoom are being Zoombombed. How do we embrace what is happening in our world today, as it relates to cybersecurity?
Iowa's CS Standards are the CSTA Standards
|