Cybersecurity - Secure Passwords
Online Authentication often revolves around passwords. We will discuss how to develop simple rules to create strong passwords. These rules are scalable and can be used for all websites to achieve desired password strength.
OVERVIEW
Activity Overview:
Online Authentication often revolves around passwords. We will discuss how to develop simple rules to create strong passwords. These rules are scalable and can be used for all websites to achieve desired password strength.
Meta description
- Subject Area: Computer Science, Technology, Library
- Grade Level : 3-5
- Computer Science Domains:
- Networks and The Internet
- Computer Science Principles:
- Collaborating Around Computing, Recognizing and Defining Computational Problems, Developing and Using Abstractions, Communicating About Computing
- Materials:
- Considerations:
- What projects are teachers currently working on with their students and how is this relevant to the students’ current goals.
Lesson Plan
Overview
Online Authentication often revolves around passwords. We will discuss how to develop simple rules to create strong passwords. These rules are scalable and can be used for all websites to achieve desired password strength.
ASSESSMENT PRE/POST-TEST
Pre:
- What is authentication?
- What are the consequences of losing your password?
- Where do you find authentication rules set by websites?
OBJECTIVES
Identify the meaning and purpose of authentication. Discover the authentication rules set by the website administrator. Develop an easy to remember, personal strategy that can grow as they grow.
CATCH/HOOK
We all understand how locks protect us and our property. If everyone had the keys then everyone would be able to gain access to our lockers, homes and even ride off with our bikes! Internet passwords protect our online selves the same way. Just as physical locks must be strong, our online passwords must also be strong. And, just as we keep our keys in an easy to remember location, our passwords must also be easy to remember.
ACTIVITY INSTRUCTIONS
(10min) Discuss what authentication means and how it is used. Resource found here: https://curriculum.code.org/csf-19/coursec/2/#powerful-passwords2
- Students start by identifying what they think makes a password strong. Then, they compare it to the do’s and don’ts in the resource.
- The students independently write down 3 categories that they find easy to remember; like favorite food, cartoon, sport, etc.
- Finally, the students use these facts to create a strong password and test it in the game described in the resource.
Supplements
Any items in this section are the property & under the license of their respective owners.
REVIEW
Review (10mins) Authentication What is it? Authentication is how we show something is true. What are some examples of personal authentication? Passwords Identity Document (ex: Birth Certificate, Driver’s License) Personal Identifiable Information (Birthday, birth location, family names) Unique Physical Traits (fingerprints, photo) Passwords Why do we use passwords online? What makes a password strong? How can we make our passwords easy to remember?
STANDARDS
| Type | Listing |
|---|---|
| CS Domains | Networks and The Internet |
| CS Principles | Collaborating Around Computing, Recognizing and Defining Computational Problems, Developing and Using Abstractions, Communicating About Computing |
| Other Content Standards | NI.NCO / IC.SI / IC.SLE / SL.5.1 |