Secure Your Future. Cyber Security Safety.

Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an application essay based upon the following prompt: Described a time where you have either been inspired by, or inspired someone else. How did this impact you?

Author: Brian Axon
Grade Level: 9-12
Standards Framework: CCSS ELA, Wyoming CS
Standards: ELA.10.C.1.3, ELA.10.C.3.1
Materials: Google doc.

OVERVIEW

Activity Overview:

Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an application essay based upon the following prompt: Described a time where you have either been inspired by, or inspired someone else. How did this impact you? For this essay, before they submit it to the college, they want to share it with their friend. How can they ensure someone else does not steal their essay and use it as their own?

Meta description

  • Grade Level : 9-12
  • Subject Area: Reading/Language Arts
  • Cybersecurity Concept:
    • Confidentiality, Think Like an Adversary
  • Computer Science Domains:
    • Networks and The Internet, Impacts of Computing
  • Computer Science Principles:
    • Collaborating Around Computing, Communicating About Computing
  • Materials:
    • Google doc.
  • Considerations:
    • The types of social media and other tools your students know how to use. The knowledge base can vary from one student to another.

Lesson Plan

Overview

Students will be provided a scenario. In this scenario, a student is applying to a college. They have created an application essay based upon the following prompt: Described a time where you have either been inspired by, or inspired someone else. How did this impact you? For this essay, before they submit it to the college, they want to share it with their friend. How can they ensure someone else does not steal their essay and use it as their own?

PRE/POST-TEST

What strategies did the group suggest? Why/why not do you think these are effective ways to maintain the security of the document? Why is cybersecurity important in this scenario? How does this connect to our discussion about things like “Tik Tok,” and “Instagram?”

OBJECTIVES

Ech group will need to come to a consensus on how to keep steps needed to keep the document safe from others, while also being able to share it with their friend to peer edit. This will be done in a 3-5 minute presentation, so they will need to have at least 3 steps included to keep the document safe.

CATCH/HOOK

Through discussions I have had with my students, I found out that they will need to write either an essay for a college application or put together a resume. These are both very important digital documents which need to be kept safely secured.

ACTIVITY INSTRUCTIONS

We will begin with a class discussion about social media and the importance of cyber security. I want to ensure they not only have an understanding of the term, but also how it connects to a lot of things they do on a day-to-day basis. Next, they will be provided the scenario and have time in their group to brainstorm their ideas, before adding it to their presentation.

REVIEW

Students will provide additional examples of other times where cyber security is important to think about and implement, and then the future impact what they are posting can have.

STANDARDS

ELA.10.C.1.3, ELA.10.C.3.1 FL NI.NCO 2.NI.NCO.01