Overview: |
Unencrypted communication over the Internet works a lot like sending a postcard: it can be read by anybody along the delivery route. Communication is routed through intermediary computers and systems, which are connected to many more computers and systems. Encryption, or encoding information so it appears scrambled to anyone who doesn’t know the key, is a way to wrap a postcard in an envelope. While it can never be 100% secure, stronger encryption makes it harder for people to get to the contents.
The lesson elements in this module teach students about the privacy principle “Communication over a network, unless strongly encrypted, is never just between two parties”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/someone-could-listen/.
Summary of Learning Objectives: Students can articulate how the multi-step, multi-party pathways of networked communication affect users’ privacy; students can identify and use more secure communication options.
Target Age: High school, college undergraduate.
Learning Objectives:
- Students can describe how intermediary devices, and the services that provide them, are involved in transmitting information from point A to point B on the Internet.
- Students can explain how the interconnected, many-layered structure of the Internet affects the security and privacy of online communication.
- Students can identify the difference between a private network and a shared network and can describe some of the potential risks of using a shared network.
- Students can describe how encryption decreases the chances of outside parties infiltrating private communications and accessing private information.
- Students can explain why their security depends (in part) on their own decisions and behavior.
- Students can give some examples of common encryption protocols, identify what layer of an electronic communication each of those protocols protects, and describe how they would verify that those protocols were being used.
|
Content Standard(s): |
Digital Literacy and Computer Science DLIT (2018) Grade: 9-12 | R1) Identify, demonstrate, and apply personal safe use of digital devices. Unpacked Content
| Digital Literacy and Computer Science DLIT (2018) Grade: 9-12 | 11) Model and demonstrate behaviors that are safe, legal, and ethical while living, learning, and working in an interconnected digital world.
a. Recognize user tracking methods and hazards.
Examples: Cookies, WiFi packet sniffing.
b. Understand how to apply techniques to mitigate effects of user tracking methods.
c. Understand the ramifications of end-user license agreements and terms of service associated with granting rights to personal data and media to other entities.
d. Explain the relationship between online privacy and personal security.
Examples: Convenience and accessibility, data mining, digital marketing, online wallets, theft of personal information.
e. Identify physical, legal, and ethical consequences of inappropriate digital behaviors.
Examples: Cyberbullying/harassment, inappropriate sexual communications.
f. Explain strategies to lessen the impact of negative digital behaviors and assess when to apply them. Unpacked Content
| Digital Literacy and Computer Science DLIT (2018) Grade: 9-12 | 12) Describe how sensitive data can be affected by malware and other attacks. Unpacked Content
| Digital Literacy and Computer Science DLIT (2018) Grade: 9-12 | 13) Compare various security measures of a computer system.
Examples: Usability, security, portability, and scalability. Unpacked Content
| Digital Literacy and Computer Science DLIT (2018) Grade: 9-12 | 16) Identify laws regarding the use of technology and their consequences and implications.
Examples: Unmanned vehicles, net neutrality/common carriers, hacking, intellectual property, piracy, plagiarism. Unpacked Content
| Digital Literacy and Computer Science DLIT (2018) Grade: 9-12 | 20) Evaluate strategies to manage digital identity and reputation with awareness of the permanent impact of actions in a digital world. Unpacked Content
| Digital Literacy and Computer Science DLIT (2018) Grade: 9-12 | 29) Summarize the role of compression and encryption in modifying the structure of digital artifacts and the varieties of information carried in the metadata of these artifacts. Unpacked Content
| Digital Literacy and Computer Science DLIT (2018) Grade: 9-12 | 30) Evaluate the tradeoffs involved in choosing methods for the organization of data elements and the location of data storage, including the advantages and disadvantages of networked computing.
Examples: Client server, peer-to-peer, cloud computing. Unpacked Content
|
|
|