The lesson elements in this module teach students about the privacy principle “There is no anonymity on the Internet”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/theres-no-anonymity/.
Summary of Learning Objectives: Students can explain (in general terms) how data tracked by online services can be used to identify them; students can use tools and techniques to reduce the effectiveness of tracking.
Target Age: High school, college undergraduate.
Creating an identity on the Internet or impersonating somebody else is often just a matter of a few clicks. Currently, there is no foolproof way to match a real person with their online identity. This means that you can never be sure with whom you are communicating and that someone could steal your online identity and impersonate you!
The lesson elements in this module teach students about the privacy principle: “Identity is not guaranteed on the Internet”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/identity-isnt-guaranteed/.
Summary of Learning Objectives: Students can explain why it is difficult to be sure who one is communicating with online; students can investigate and evaluate the legitimacy of services that want their personal information.
Even if you’re not actively using the Internet, someone else may be sharing information about you — intentionally or unintentionally. So, avoiding the Internet does not guarantee privacy.
The lesson elements in this module teach students about the privacy principle: “You can’t avoid having an information footprint by not going online”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/you-cant-escape/.
Summary of Learning Objectives: Students can enumerate ways their offline activities generate data that is stored and shared online; students can communicate effectively with others about everyone’s information-sharing preferences.
In this lesson, students will discuss computer forensics and complete an activity in which they will process an electronic crime scene. Students will understand how computers and other electronic data storage devices leave the footprints and data trails of their users.
Students learn about various types of cybercrimes and the cybersecurity measures that can help prevent them. Then students perform a Rapid Research project investigating a particular cybercrime event with a focus on the data that was lost or stolen and the concerns that arise as a result. The Rapid Research activity features vocabulary, concepts, and skills that should help prepare them for the AP Explore PT, and also serves as a capstone for the sequence of lessons on encryption and security.
Students will be able to:- explain the characteristics of a phishing attack.- explain how a DDoS attack works.- describe how one computer virus works.- research and describe a cyber attack found in the news.- reason about the threats posed by, and methods of recourse for, various types of cyber attacks.- describe plausible storage, security, or privacy concerns for particular pieces of data.
Note: You will need to create a free account on code.org before you can view this resource.
To conclude their study of big data and cryptography, students will complete a small research project related to a dilemma presented by Big Data or Cybersecurity, in the form of a Practice Performance Task. Students will pick one of two issues to research more deeply - either an issue related to big data, or one related to cybersecurity. Students will need to identify appropriate online resources to learn about the functionality, context, and impact of the technological innovation that gave rise to the dilemma they are investigating. After completing their research, students will present their findings both in a written summary and with an audio/visual artifact they found online. The written components students must complete are similar to those students will see in the AP Performance Tasks.
This project is an opportunity to practice many of the skills students will use when completing the Explore Performance Task on the AP® Exam at the end of the year. While an open-ended research project might be intimidating, students have built all the skills they need to complete this task.
Note: This is NOT the official AP® Performance Task that will be submitted as part of the Advanced Placement exam; it is a practice activity intended to prepare students for some portions of their individual performance at a later time.
Students will be able to:- identify reliable and authoritative sources of information about computing information.- synthesize information taken from multiple online sources to create a cohesive description of a computing innovation.- identify an artifact that clarifies an aspect of a computing topic not easily captured in writing.- explain both the beneficial and harmful effects related to a modern social dilemma in computing.