Digital Identity and Protection of that IdentityClick here to download document.
Students will engage in lecture and classroom conversation about identity protection, encryption, software, networks, hardware, and ways to protect against threats on those fronts.
This lesson consists of teaching students how to protect their personal and digital identity as well as becoming aware of digital jargon that students need to know in orders to stay informed.
Expected Lesson Duration:
Lesson is expected to last 2 days.
Interdisciplinary Connection(s) to Common Core
Preparing to Teach this Lesson:
There are no resources necessary for this lesson.
There are no handouts for this lesson.
- The class will begin with an image, video or, sound and the student and have them write a story about what is just off the boundary of the medium.
After the daily meme the students will be introduced to the concept of identity protection and the ways in order to incorporate best practices to ensure the safety of their identity.
Identity, and importance of keeping it yours and secure:
Nowadays your email account is equivalent to a secondary social security account. It allows you to connect to a variety of different services and stores valuable data. A very common form of verification is an email verification.
Simple steps to ensure that your email is protected include:
- 1: Developing a password schema:
- 1: Developing a password schema:
Develop a strong password that is at least 10 characters and a mixture of characters, numbers, and symbols.
- Along with that, develop a schema for your passwords so you can develop a pattern for your passwords from site to site because using the same password on multiple sites is dangerous. - Schema example: important # (not birthday) + word or phrase (incorporate at least one capitalization and symbol into the phrase ) + unique identifier that changes from site to site (the unique identifier (uid) can be in any format) - 44-3L3ph@nt-g@@gle - #-phrase-uid - Make sure to vary the schema's order from site to site: - #-phrase-uid - phrase-#-uid - uid-#-phrase
Simple steps to protect yourself and your digital Identity:
- 2 step verification etc.
- 2 step verification etc.
Phishing, Pharming, and spoofing:
“Phishing” refers to criminal activity that attempts to fraudulently obtain sensitive information.
Sometimes someone will first send you a benign email (think of this as the bait) to lure you into a conversation and then follow that up with a phishing email. At other times, the fraudster will just send one phishing email that will direct you to a website requesting you to enter your personal information such as User ID and Password.
Pharming is another scam where a person installs malicious code on a personal computer. This code then redirects any clicks you make on a website to another fake Website without your consent or knowledge.
To avoid phishing or pharming, follow the basic computer safety guidelines:
Safely Surf the Web
Use Anti-Spyware Software(Windows)
Be especially careful when entering financial information on a website. Look for the ’s’ in https in the domain name.
If the website looks different than when you last visited, be suspicious and don’t click unless you are absolutely certain the site is secure.
Now spoofing comes in many forms from wifi spoofing (free wifi) to site-spoofing on the receiving of the pharming scams.
What is it? How can I protect myself? Simple:
To turn on Site Isolation on Windows, Mac, Linux, Chrome OS or Android:
Type or copy-paste chrome://flags/#enable-site-per-process into the URL field at the top of your Chrome web browser, then hit the Enter key.
Look for Strict Site Isolation, then tap or click the box labeled Enable.
If your work is saved, hit Relaunch Now. Otherwise, save your work, then quit and relaunch Chrome.
For Chrome on iOS (iPhone, iPad), Google says Apple will deliver any necessary fixes.
While you are being smart lets clean up that phone or desktop right from your browser as well :
- URL chrome://settings/cleanup in your browser, or by going to Settings > Reset and clean up > Clean up computer. Give it a shot, especially if your browser seems sluggish.
Identify different types of threats present in the cyber world and how to protect oneself and one’s information from different types threats
Explain methods one can take to increase the protection of personal information and accounts, such as rules for password creation, 2 step verification, etc.
Ability to define and identify different attack methods and scams, such as phishing, pharming, and spoofing
Thorough understanding of the importance of personally identifiable information and other confidential information, the risks of storing this information without proper protection, and the consequences of having such information leaked
Content of Lesson
Acquiring Key Concepts: discussion of character roles, types, and development and how to identify these terms in media in any given medium.
Engaging in Experiential Learning: identifying the concepts discussed in examples of tv shows and videos.
Building Proficiencies: using skills from previous discussion and activity to work with a group in developing a unique storyline from a random image.
Connecting with STEM Professionals: view a video interview with a director or writer in which they discuss the concepts focused.
Closure and Review
Reiterate the importance of storytelling in media, describe the amount of written work that is consumed by media outlets and the amount of recycled material that continues to be recirculated due to the lack of new material.
Explain the importance of diversity in the storytellers and writers due to experiences and how it shapes our stories.
Higher Level Thinking Skills Noted
Developing a dynamic story
Adapting stories due to character developments
Perception due to appearance
The art and skill of storytelling that will be practiced in this class will help the students reasoning skills, cognitive constructive capabilities, and develop character. The creation of a narrative requires the student to develop a logical order from a sequence of events. In order for the student to develop a meaningful arrangement of events the student must begin to grow their narrative reasoning skills. These skills can evolve through the consumption and dissection of narrative literature, of a mixed medium. While developing of their narrative reasoning skills the students should/ will become more empathetic to others, wise to deciphering the true purpose of the story, and become comprehensive thinkers of their own circumstances. The students are finally at the age in which they are beginning to construct their own narratives. We, as educators, want them to be exposed to a great diversity of narratives in order mature those narrative reasoning skills. The more developed their narrative reasoning skills are the more they get from a story (deeper perspective). The more advanced their skills, the more likely they are to rationalize why this character chose a particular path, place themselves in the characters shoes, and develop their own character.
Explorations and Extensions:
Does the dynamic aspect of storytelling take anything away from the message that the author may be trying to deliver?
Assessment Criteria for Success:
Content knowledge, student knowledge, and appropriate resources are aligned to instructional outcomes. student learning will be assessed throughout the lesson via question responses and correlation to the project.
Students will have successfully met the outcomes when fundamental questions about the importance of storytelling and its role in imagery can be observed through their writing and reflections of their peers work. Also questions about their current disposition are taken into consideration when they see media should begin to arise. Also a fluid and respectful use of time, along with an essay that is fluid, easy to follow, and retains its essentials as an ELA.
Students will receive feedback from their peers and instructor while they are sharing their story with their classmates. Students can then share what they felt about the project with their instructor; as well as what they gained from it, how it could have better benefited them, etc.
To be completed upon the end of lesson.