Lesson: Powerful Passwords (Adapted from Cybersmart Curriculum)

Total Page:16

File Type:pdf, Size:1020Kb

Lesson: Powerful Passwords (Adapted from Cybersmart Curriculum)

Lesson: Powerful Passwords (adapted from CyberSmart curriculum) Author: Sharon Kowalsky, SU MSLIS Student, 2010

BACKGROUND Audience Description This lesson plan is designed for fourth grade students at the Anna S. Kuhl Elementary School who visit the library in individual classes ranging in size from 25-34 students. This would be one of a series of lessons on Internet safety and etiquette. It can be assumed that students have already been taught to use print materials and some basic research skills.

Needs Assessment Highlights The students’ ability and motivational range varies greatly from student to student and class to class. While some students are greatly motivated, others have a low expectation for success. The abilities range and often the classes include inclusion classes that have students with varying learning disabilities.

GOALS AASL Standards Addressed 1.1.2 Use prior and background knowledge as context for new learning.

2.1.4 Use strategies to draw conclusion from information and apply knowledge to curricular areas, real-world situations, and further investigations.

2.4.3 Recognize new knowledge and understanding.

4.1.5 Connect ideas to own interests and previous knowledge and experience.

ISTE.NETS Standards Addressed 1.A Apply existing knowledge to generate new ideas, products, or processes.

2.A Communicate information and ideas effectively to multiple audiences using a variety of media formats.

5.A Advocate and practice safe, legal, and responsible use of information and technology.

5.B Exhibit a positive attitude toward using technology that supports collaboration, leadership, and productivity.

Specific Outcomes Taught Students will:  Be able to describe the function of a password.  Be able to create “safe” passwords that are hard to guess but easy to remember.  Understand why they should not share passwords.  Identify strategies for creating and protecting secure passwords. REQUIRED MATERIALS For Instructor Powerful Passwords worksheet

For Students Powerful Passwords worksheet Pens or pencils Index cards or blank pieces of paper Game pieces (beans, cubes, etc.) Dice (one per table) LESSON Anticipatory Set (Lead-In) Time allotted: 5 minutes  Have students begin by brainstorming the various websites they use on a daily basis. Do any of these require a user name and password?  Ask students to explain why they think passwords exist and explain that it works like a house key or garage door combination.  Ask students how they would feel if someone stole their house key – what could that person do if they had their house key?  Ask students to explain what someone could do if s/he had access to the student’s password.  Point out that adults use passwords to protect their bank accounts.

Step-By-Step Procedures (with Comprehension Checks) Time allotted: 15 minutes  Have students come up with 3 strong things that each password should have.  Discuss what they have come up with and go over the following tips for creating good passwords, using a whiteboard or chalkboard to give a class example: o DO: . Do make passwords eight or more characters long. . Do include letters, numbers, and symbols in your password . Do change your password at least every 6 months. . Do give your password to your parent or guardian. o DON’T . Don’t use your nickname as your password. . Don’t share your password with your friends. . Don’t use private identify information in your password. . Don’t use your phone number as your password. . Don’t use dictionary words as your password.  Hand out Powerful Password worksheets.  As a class, go through the creation of a password together.  Start with a word or phrase you can remember (the word “whatever” and the phrase “I love candy” are both easy to remember)

o I love candy whatever o i<3candy wh4t3v3r o i<3c4ndy wh4t#v3r o I<3c4n6y Wh4t#v3r

 Have students practice making passwords on the worksheet to bring home as examples. Remind students not to use these passwords since we came up with them together.

Closure (Reflect Anticipatory Set) Time Allotted: 2 minutes Ask students to name the key rules in making a strong password. Ask if there are any questions.

Assessment Based On Outcomes  Instructor will look through students’ papers to determine how well they followed directions.  Instructor will gauge comprehension based on class discussion and student reaction to password guidelines.  Students will be cognizant of not sharing their password and creating strong passwords.

OPTIONAL

Adaptations (For Students with Learning Disabilities) This lesson is quite flexible and can be done with little instructor input or with a much more guided approach.

Extensions (For Gifted Students) To expand on this, the instructor may ask students to come up with 5 variations of a password that they currently use.

Possible Connections to Other Subjects This can be used as a general introduction to Internet safety and etiquette.

Resources:

American Association of School Librarians. Standards for the 21st-Century Learner. (2007). Retrieved from http://www.ala.org/ala/mgrps/divs/aasl/guidelinesandstandards/learningstandards/stand ards.cfm

Internet Society for Technology in Education. National Educational Technology Standards. (2007). Retrieved from http://www.iste.org/standards/nets-for-students.aspx

CyberSmart! Curriculum. (2010). Common Sense Media. Retrieved from http://cybersmartcurriculum.org/

Recommended publications