Hi, what do you want to do?
Curated OER
Understanding the Importance of Cyber Ethics
Students play a paper clip game which leads to a lesson on cyber ethics. In this cyber ethics lesson plan, students play the game, and then discuss the proper rules of how society should act and view their internet usage.
Institute of Electrical and Electronics Engineers
Public Keys, One Way Functions and Hard Problems
Use paint to teach about cryptography. Scholars explore public key cryptography by attempting to mix a secret color using paint. After the activity, they investigate the Diffie-Hellman method using prime numbers, exponents, and modular...
Curated OER
Downhill Skiing: Past, Present, and Future
Students research the history of Olympic downhill skiing to gather information on names, dates, winning times, and the native country of Olympic downhill medal winners.
Curated OER
Good Vibrations: Sound, Acoustics, Science, Sports Arenas, Olympics
Students perform a series of tasks that integrate hands-on inquiry-based activities with the Internet to explore sound and acoustics. They develop an acoustics Web page to show what they have learned.
Federal Trade Commission
On Guard Online: Protect Kids Online
Become cyber smart! Learn some practical tips that will help guard you against Internet fraud and protect your personal information. Topics include kids' privacy laws, computer security, informational videos, and internet quizzes.
Other
National Cyber Forensics & Training Alliance
This site contains information about advanced training, security awareness in an effort to reduce cyber vulnerability, forensic and predictive analysis and lab analysis.
US Department of Justice
U.s. Department of Justice: Computer Crime and Intellectual Property Section
Discover information about computer crime, intellectual property, electronic evidence and other high-tech legal issues. Explore documents, reports, white papers, manuals, etc.
Other
Commonwealth of Australia: How to Protect Your Business From Cyber Threats
Learn some tips and suggestions to protect computers from cyber threats.
Other
Department of Homeland Security: Protect Myself From Cyber Attacks
Use these steps to help devise a solution to counter a cyber attack.
Khan Academy
Khan Academy: Computer Malware
Learn abou9t the types of malware and how to protect computers from malware.
PBS
Pbs Teachers:cyber War
Examine the extent to which the critical infrastructure of the U.S., including electrical power, finance, telecommunications, health care, transportation, water, defense and the Internet, is vulnerable to cyber attack.
Khan Academy
Khan Academy: Computer Malware
Learn about malware, how it is installed on a computer, and what type of damage it can do.
Other
Dfrws (Digital Forensic Research Workshop)
This site provides a variety of resources and information about digital forensics.
Khan Academy
Khan Academy: Phishing Attacks
Find out what phishing attacks are and how to avoid them.
Goodwill
Gcf Global: Internet Safety : How to Avoid Malware
Malware is one of the most common hazards to your computer when you're online, but it's easy to avoid. Developing safe and smart browsing habits can protect you from malware and other threats, like viruses. Securing your computer and...
TED Talks
Ted: Ted Ed: Defining Cyberwarfare in Hopes of Preventing It
Can you imagine a future where wars are fought not with bombs and bullets but computer viruses and pacemaker shutdowns? Cyberware is unique in that it is not covered by existing legal framework and it often inspires more questions than...
Other
Symantec: Steganography Revealed
This article provides an overview of steganography as well as steganographic tools and techniques.
Other
Anti Spyware Coalition
This site contains industry and educational accepted spyware definitions and best practices, and includes a document listing and newsroom.
Khan Academy
Khan Academy: Rogue Access Points
Learn about rogue access points to understand wireless internet access.