Cyber+Safety

Cyber Safety

Essential Questions: The evolution of the computer and the Internet have provided us with many great opportunities, unfortunately some people choose to use these technologies for malicious purposes.How can we safeguard ourselves?

Day 1:
 * Cyber safety introduction

Day 2:
 * Safe and Unsafe online practices
 * Consequences of unsafe practices
 * Guest Speaker (Cyber Crimes Officer)

Day 3:
 * Warning signs of a predator
 * What information is safe to disclose
 * Guest Speaker (FBI Cyber Crimes Unit)

Day 4:
 * Passwords
 * Screen names

Days 5:
 * Cyber Safety Debate
 * Organize debate teams
 * Teams organize arguments

Day 6:
 * Debate day

Day 7:
 * Cyber Safety Assessment

Cyber safety Password Screen name Bullying Debate FBI Victim Consequence SRO AIM Blog Forum Friend / buddy Predator || Students will be able to differentiate between the various methods of communication and the pros / cons associated with them. ||
 * Guiding Questions || Vocabulary || Learning Goals ||
 * What are some ways to safely communicate well using modern digital devices || Social networking
 * What are the consequences for various cyber crimes?

What are some important steps to remaining safe while online? ||^  || Students will learn to be safe users of 21st century media ||
 * What are the warning signs of a predator

What information is safe to disclose online ||^  || Mr. Huba-FBI cyber safety Crimes Division speaker ||
 * How do we ensure that our online information is as safe as possible

Is the Internet safe

Are social networking sites safe ||^  || Passwords / screen names

Students will be able to safely secure files / data by creating a strong, unique password

Students will be separated into two teams and develop an argument from various questions that will be posed to them ||

Strategies and Resources || Prior Knowledge || Assessment || Preparation for guest speakers || Social networking Cell phone use Media stories || Students will develop a list of five meaningful questions for the guest speaker. ||
 * Required Instructional
 * Dialogue about :
 * Social networking
 * Cell phone use
 * Bullying
 * Internet use
 * Tree maps for notes

SRO

Cyber Crimes officer || Social networking Cell phone use Media stories In class dialogue || Students will take notes on the presentation ||
 * Tree maps for notes

Mr. Huba FBI Cyber Crimes Division || Social networking Cell phone use Media stories In class dialogue || Students will take notes on the presentation ||
 * Computer

Internet

Passwordmeter.com

Create yahoo mail account with password, and have the class attempt to hack it.

Use guided question to organize a debate

Two teams

Computer

E-mail || Network passwords Cyber safety unit || Students will create a password that is strong, to very strong, as well as communicate the importance of a strong password

Number of points that substantiate their arguments to the instructors posed question. Each student must argue at least one point during the debate

Send teacher an e-mailed response to three questions that require the student to reflect on the content of the debate. ||