IN THIS LESSON

I can compare real-world cybersecurity problems and explain how personal information can be protected.

Today, we will begin by discussing some cybersecurity problems we have heard of. We will then watch a short video about cybersecurity. Finally, you will play a game to put your cybersecurity skills to the test.

  • IOA-3.a discuss real-world cybersecurity problems (e.g. viruses, phishing attacks, clickbait, etc) and how personal information can be protected

    AKS-6 select and use the most appropriate platform, tool, style, format and digital media to clearly and creatively express thoughts, messages, goals, or positions

  • E - I can solve real-world cybersecurity problems and create an engaging PowerPoint presentation about cybersecurity.

    S - I can solve real-world cybersecurity problems and create a PowerPoint presentation about cybersecurity.

    N - I can solve real-world cybersecurity problems and begin making a presentation about cybersecurity.

    U - I cannot solve cybersecurity problems or create a presentation.