E' is for Erosion
Students will learn the effects of wind and water erosion. They will create their own landscape to show how water erosion works. After the background knowledge has been built, the town of Rawlins has had a cybersecurity breech and they have released all of the water supply in Rawlins. Students will have to come up with a plan to avoid the cybersecurity breech in the future and then determine the impact of the breech on the community.
OVERVIEW
Activity Overview:
Students will learn the effects of wind and water erosion. They will create their own landscape to show how water erosion works. After the background knowledge has been built, the town of Rawlins has had a cybersecurity breech and they have released all of the water supply in Rawlins. Students will have to come up with a plan to avoid the cybersecurity breech in the future and then determine the impact of the breech on the community.
Meta description
- Subject Area: Computer Science, Science, Technology, Engineering
- Grade Level : 3-5
- Computer Science Domains:
- Impacts of Computing
- Computer Science Principles:
- Fostering an Inclusive Computing Culture
- Materials:
- Website
- Considerations:
- I based this off of Rawlins because of our current water situation, you might need to change it to fit your community.
Lesson Plan
Overview
Students will learn the effects of wind and water erosion. They will create their own landscape to show how water erosion works. After the background knowledge has been built, the town of Rawlins has had a cybersecurity breech and they have released all of the water supply in Rawlins. Students will have to come up with a plan to avoid the cybersecurity breech in the future and then determine the impact of the breech on the community.
ASSESSMENT PRE/POST-TEST
What is erosion and some examples of erosion? What are some examples of a cybersecurity threat? How can you try to avoid a cybersecurity threat? Give some examples of what could happen to a community with a major security breech?
OBJECTIVES
- Students can explain and give examples of erosion.
- Students can explain what a cybersecurity threat it and how to help avoid it.
- Students can explain the impact of a security breech and how it could effect and entire community.
CATCH/HOOK
https://www.youtube.com/watch?v=q34iZw4eDPI
ACTIVITY INSTRUCTIONS
Supplements
Any items in this section are the property & under the license of their respective owners.
REVIEW
Students will present their ideas with a google Slideshow on how the cybersecurity problem could have been avoided and the domino effect of the security breech.
STANDARDS
| Type | Listing |
|---|---|
| CS Domains | Impacts of Computing |
| CS Principles | Fostering an Inclusive Computing Culture |
| Other Content Standards | *5.NI.C.01 Discuss real-world cybersecurity problems and identify and implement appropriate strategies for how personal information can be protected. |