ALEX Classroom Resource

  

E-Business: Web Security

  Classroom Resource Information  

Title:

E-Business: Web Security

URL:

https://aptv.pbslearningmedia.org/resource/0384063f-d97d-4829-8d04-c20a2d1fe9cd/e-business-jeffrey-bezos/

Content Source:

PBS
Type: Audio/Video

Overview:

In this video, students will learn about the importance of web security which becomes a top priority with more information changing hands electronically.

Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 3
9) Identify the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • identify how to properly use security technologies and how they work.
Teacher Vocabulary:
  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker
Knowledge:
Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.
Skills:
Students are able to:
  • login to resources using passwords.
  • understand importance of not sharing login information.
  • identify examples of SPAM, pop up blocks, and virus protection software.
Understanding:
Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 4
8) Demonstrate the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • identify how to properly use security technologies and how they work.
Teacher Vocabulary:
  • security technologies
  • privacy
  • password
  • login information
  • virus protection
  • malicious
  • spam
  • spam filters
  • pop-up blocker
  • online identity theft
Knowledge:
Students know:
  • software and other features such as pop-up blockers are installed to protect against malicious items.
  • unwanted emails or spam can contain links with viruses.
  • users can protect their information by not sharing passwords or login information to help prevent crimes like online identity theft.
Skills:
Students are able to:
  • login to resources using private passwords.
  • understand importance of not sharing login information.
  • demonstrate how to properly handle or utilize spam, pop up blockers, and virus protection software and features.
Understanding:
Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and protect your personal information.
  • if an email or pop-up seems too good to be true, it probably is not true.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 5
9) Explain the proper use and operation of security technologies.

Examples: Passwords, virus protection software, spam filters, pop-up blockers, cookies.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • explain how to properly use security technologies and how they work.
Teacher Vocabulary:
  • security technologies
  • password
  • login information
  • virus protection
  • malicious
  • spam filters
  • pop-up blocker
Knowledge:
Students know:
  • software is installed to protect against malicious items.
  • users can protect their information by not sharing passwords or login information.
Skills:
Students are able to:
  • explain to others how and why you should use strong passwords.
  • explain the causes and effects of someone having and using your password.
  • explain what SPAM, pop up blockers, and virus protection software can do.
Understanding:
Students understand that:
  • proper use and operation of security technologies is important to keep a device working correctly and to protect your personal information.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 5
24) Describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.

Examples: Logging in at school, logging personal devices to public networks.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • describe the need for authentication of users and devices as it relates to access permissions, privacy, and security.
Teacher Vocabulary:
  • authentication
  • users
  • devices
  • access
  • permission
  • privacy
  • security
Knowledge:
Students know:
  • that there is a need for authentication of users and devices as it relates to access permissions, privacy, and security.
Skills:
Students are able to:
  • describe the purpose for authentication of users and devices as it relates to access permissions, privacy, and security.
Understanding:
Students understand that:
  • authentication of users and devices is essential to protect permissions, privacy, and security.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 9-12
36) Explain the tradeoffs when selecting and implementing cybersecurity recommendations.

Examples: Two-factor authentication, password requirements, geolocation requirements.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • explain the tradeoffs when selecting and implementing cybersecurity recommendations.
  • describe pros and cons of two factor authentication (TFA).
  • describe the importance of password requirements.
  • describe the use of geolocation requirements.
Teacher Vocabulary:
  • cybersecurity
  • two-factor authentication (TFA)
  • geolocation
  • privacy
  • cryptography
Knowledge:
Students know:
  • how to evaluate the tradeoffs of cybersecurity recommendations.
  • how to articulate the pros and cons of TFA.
  • the importance of password requirements.
  • how to articulate the pros and cons of geolocation.
Skills:
Students are able to:
  • explain pros and cons of cybersecurity recommendations.
  • describe the use of two-factor authentication.
  • explain the importance of password requirements.
  • describe the use of geolocation.
Understanding:
Students understand that:
  • security, privacy and convenience tradeoffs are factors in selecting and implementing cybersecurity recommendations.
Tags: internet, online, security, web
License Type: Custom Permission Type
See Terms: https://www.pbslearningmedia.org/help/terms-of-use/
For full descriptions of license types and a guide to usage, visit :
https://creativecommons.org/licenses
AccessibilityVideo resources: includes closed captioning or subtitles
Comments
  This resource provided by:  
Author: Stephanie Carver