Learning the Importance of Authentication Factors

Students will learn what authentication factors are, and the importance of keeping them private. They will apply the use of authentication factors to log into a variety of programs and applications in preparation for work throughout the school year.

Author: Kathleen Cherry
Grade Level: K-2
Materials: Locked Mystery Box, IPads, Login Sheets

OVERVIEW

Activity Overview:

Students will learn what authentication factors are, and the importance of keeping them private. They will apply the use of authentication factors to log into a variety of programs and applications in preparation for work throughout the school year.

Meta description

  • Subject Area: Computer Science
  • Grade Level : K-2
  • Computer Science Domains:
    • Networks and The Internet
  • Computer Science Principles:
    • Fostering an Inclusive Computing Culture
  • Materials:
    • Locked Mystery Box, IPads, Login Sheets
  • Considerations: +

Lesson Plan

Overview

Students will learn what authentication factors are, and the importance of keeping them private. They will apply the use of authentication factors to log into a variety of programs and applications in preparation for work throughout the school year.

ASSESSMENT PRE/POST-TEST

What are authentication factors?
Why do we use authentication factors?
How do we keep our authentication factors safe?

OBJECTIVES

Explain what authentication factors are. (DOK 1 Recall) Explain why we use authentication factors. (DOK 1 Recall) Apply authentication factors by logging into a device. (DOK 2 Skill/Concept) Apply authentication factors by logging into a program. (DOK 2 Skill/Concept)

CATCH/HOOK

Students will be presented with a locked mystery box, found somewhere in the building. They will be asked to make predictions as to what may be in the box. They will then be asked why the box may be locked, and how they may go about getting into the box. They will then be asked if it would be right or fair to enter the box without permission from the box’s owner.

Set the mystery box aside and tell students we will circle back to the box in a bit.

ACTIVITY INSTRUCTIONS

At this time, introduce the ipads to students. Give a brief walkthrough of expectations for ipad care and use. Where it will be stored in the classroom, how it will travel from school and home, that it must be charged nightly, and how we will use it throughout the school day.

Charging cords will be distributed to be placed in backpacks.

Ipads will be distributed and placed in student mailboxes.

Talk to students about how many applications can help us learn, and it is important to do our best work and to only work within our own accounts. Revisit the Mystery Box briefly; if that was your box, would you like someone else to break into it? The same can be said for our accounts on our ipads.

Introduce the term, “Authentication Factors,” including login and password. Explain to students they will have a login and password that follows them through the grades for each application we use on our devices.

Explain the importance of keeping their logins and passwords private, and the importance of never ever logging into someone else’s account, much like the mystery box from before.

Revisit the mystery box at this time, share that it does in fact belong to our classroom, and that we have the key.

Unlock the mystery box, and remove the login and password sheets. Introduce them to students, showing them how to locate and use the first set of authentication factors.

At this time, students should work through how to find the app and log in.

Give students time to interact with the application before walking them through the log out process, and putting ipads and login sheets away safely.

Repeat the process of logging into different applications over the course of the next several days, troubleshooting with students that have issues.

Supplements

Any items in this section are the property & under the license of their respective owners.

REVIEW

Give students a heads up: 5 minutes to wrap up, 2 minutes to wrap up, then walk them through the process to log out and putting away supplies.

STANDARDS

TypeListing
CS DomainsNetworks and The Internet
CS PrinciplesFostering an Inclusive Computing Culture
Other Content Standards