You are on page 1of 23

D I G I TA L S E C U R I T Y W O R K S H O P

Created by Chelsea George


Georgia Southern University – Summer 2023
AGENDA
Opening
Standards and Objectives
Focus Questions
Preassessment

Work Period
Activity 1 –Passwords
Activity 2 – Sharing Information Online
Activity 3 – Frayer Model Extension

Closing
Post Assessment
Standards and Objectives
Focus Questions
OPENING Preassessment
GaPSC Instructional Technology Standards
Citizen. Educators inspire students to positively contribute and responsibly
participate in the digital world. The program shall prepare candidates who:
(iii) Mentor students in the safe, ethical, and legal practice with digital tools
and protection of intellectual rights and property; and
(iv) Model and promote management of personal data and digital identity
and protect student data privacy.
Objectives

01 02 03
Students will be Student will be able Students will be
able to identify the to identify the able to make a
components of a components of a working definition
strong password. safe online profile. of digital security.
Focus Questions

What are the characteristics of a strong password?

What is something to avoid when making a safe online


profile?

How would you define digital security in your own words?


PREASSESSMENT

Complete the K & W columns


WORK PERIOD

Activity 1 –Passwords
Activity 2 – Sharing Information Online
Activity 3 – Frayer Model Extension
Password vs Pass Phrase
ACTIVITY 1
Word Cloud
Creating a Strong Password
S T U D E N T S W I L L B E A B L E T O
I D E N T I F Y T H E C O M P O N E N T S
O F A S T R O N G PA S S W O R D .
Passwords vs Pass Phrase
Characteristics of a Strong Password
Instructions
1. Scan the QR code or click the link in the
chat box. The code for the link is

3202 0925
2. Type at least 2 characteristics of a strong
password.
3. Press submit to send your answers to the
word cloud.
Word Cloud Results
Password Creation
Instructions
1. Take your new knowledge of a strong
password and create 2 of your own.
2. In the chat box share an example of a
strong password that you WILL NOT use.
3. With extra time, create another strong
password that you might want to use for
yourself.
ACTIVITY 2 Basic Online Security
Profile Analysis
S T U D E N T S W I L L B E A B L E T O
I D E N T I F Y T H E C O M P O N E N T S Jamboard
O F A S A F E O N L I N E P R O F I L E .
Basic Online Security
@carmen_gapeach_090604
Jamboard

Instructions:
1. Click the link in the chat box to access the
collaborative Jamboard.
2. Post at least 1 sticky note on each side of the T-
chart.
3. Explain what makes a profile safe or unsafe
(secure or unsecure).

Extension: In the chat box, give specific examples


of what I could’ve done to make my profile safer.
ACTIVITY 3 –
F R AY E R M O D E L
EXTENSION
S T U D E N T S W I L L B E A B L E T O
M A K E A W O R K I N G
D E F I N I T I O N O F D I G I TA L
S E C U R I T Y.
What is a Frayer Model?
Extension – Frayer Model
Review
Post Assessment
CLOSING
Review

Password vs Pass Phrase


Components of a Safe Online Profile
Defining Digital Security
POST ASSESSMENT

Complete the L column

You might also like