Morphology through Cyber Security

Students will identify and define words utilizing basic tenets of cyber security.

Author: Andrew Disney
Grade Level: 9-12
Standard Framework: CCSS ELA
Standards: ELA.9.V.1.2: Apply knowledge of etymology and derivations to determine meanings of words and phrases in grade-level content. ELA.9.V.1.3: Apply knowledge of context clues, figurative language, word relationships, reference materials, and/or background knowledge to determine the connotative and denotative meaning of words and phrases, appropriate to grade level.
Materials: Website

OVERVIEW

Activity Overview:

Students will identify and define words utilizing basic tenets of cyber security.

Meta description

  • Grade Level : 9-12
  • Subject Area: Reading/Language Arts
  • Cybersecurity Concept:
    • Confidentiality
  • Computer Science Domains:
    • Algorithms and Programming
  • Computer Science Principles:
    • Recognizing and Defining Computational Problems, Communicating About Computing
  • Materials:
    • Website
  • Considerations:
    • The Caesar Cipher, invented by Julius Caesar more than two thousand years ago to communicate messages to his allies. The Caesar Cipher is a great introduction to encryption, decryption, and code cracking, thanks to its simplicity.

Lesson Plan

Overview

Students will identify and define words utilizing basic tenets of cyber security.

PRE/POST-TEST

Culminating Task

OBJECTIVES

Students make connections between words and construct meaningful knowledge. Apply Cyber Security concepts to “decode” the English language. Impact student achievement by increasing reading skills and comprehension.

CATCH/HOOK

Can we apply Cyber Security concepts to “decode” the English language?

ACTIVITY INSTRUCTIONS

Class #1: Introduction/Discussion of Encryption, decryption, and cracking Class #2: Interact with content: Encryption, decryption, and cracking Class #3: Introduction/Discussion of Decoding vs. encoding in reading Class #4: Interact with content: Decoding vs. encoding in reading

ELA9_ Morphology through Cyber Security - Andrew Disney.pdf

REVIEW

Students will identify and define words utilizing basic tenets of cyber security.

STANDARDS

ELA.9.V.1.2: Apply knowledge of etymology and derivations to determine meanings of words and phrases in grade-level content.

ELA.9.V.1.3: Apply knowledge of context clues, figurative language, word relationships, reference materials, and/or background knowledge to determine the connotative and denotative meaning of words and phrases, appropriate to grade level. FL