11
L.O: STUDENTS WILL EXPLORE SECRETS (ENCODING AND DECODING) . 20-25 minutes DO NOW: read Unit 2 Lab 6: Encryption, Page

Lesson2.9 l u2l6 secrets encoding and decoding

  • Upload
    lexume1

  • View
    48

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Lesson2.9 l u2l6 secrets encoding and decoding

L.O: STUDENTS WILL EXPLORE SECRETS (ENCODING AND

DECODING).20-25 minutes

DO NOW: read Unit 2 Lab 6: Encryption, Page 1

Page 2: Lesson2.9 l u2l6 secrets encoding and decoding

Why do countries have spy agencies?

Page 3: Lesson2.9 l u2l6 secrets encoding and decoding

For You To Do

1. On a sheet of paper, make up a message to send to a partner. Invent some way of encoding the message, then send the encoded message to your partner.

2. When you get your partner's encoded message, try to decode it. What strategies are you using to decode the message?

3. Get together with another pair of students and compare the methods you used to encode your messages. Was anyone able to decode their message? How did they do it?

Page 4: Lesson2.9 l u2l6 secrets encoding and decoding

HOMEWORK:read Chapter 5 of “Blown to Bits”.

Reading through the entire chapter will be helpful, especially to get a better understanding of the

evolution of encryption methods and some details of public key encryption.

Page 5: Lesson2.9 l u2l6 secrets encoding and decoding

Learning Objectives:1. LO 6.3.1 Identify existing cybersecurity

concerns and potential options to address these issues with the Internet and the systems built on it. [P1]

2. LO 7.5.2 Evaluate online and print sources for appropriateness and credibility [P5]

Page 6: Lesson2.9 l u2l6 secrets encoding and decoding

Enduring Understandings:

1. EU 6.3 Cybersecurity is an important concern for the Internet and the systems built on it.

2. EU 7.5 An investigative process is aided by effective organization and selection of resources. Appropriate technologies and tools facilitate the accessing of information and enable the ability to evaluate the credibility of sources

Page 7: Lesson2.9 l u2l6 secrets encoding and decoding

Essential Knowledge:1. EK 1.2.5A The context in which an artifact is used

determines the correctness, usability, functionality, and suitability of the artifact.

2. EK 1.2.5B A computational artifact may have weaknesses, mistakes, or errors depending on the type of artifact.

3. EK 1.2.5C The functionality of a computational artifact may be related to how it is used or perceived.

4. EK 1.2.5D The suitability (or appropriateness) of a computational artifact may be related to how it is used or perceived.

5. EK 3.2.2D Maintaining privacy of large data sets containing personal information can be challenging.

Page 8: Lesson2.9 l u2l6 secrets encoding and decoding

Essential Knowledge:

• 6.EK 3.3.1A Digital data representations involve trade-offs related to storage, security, and privacy concerns.

• 7.EK 3.3.1B Security concerns engender trade-offs in storing and transmitting information.

• 8.EK 3.3.1F Security and privacy concerns arise with data containing personal information.

• 9. EK 5.4.1L An explanation of a program helps people understand the functionality and purpose of it.

• 10. EK 5.4.1M The functionality of a program is often described by how a user interacts with it

Page 9: Lesson2.9 l u2l6 secrets encoding and decoding

Essential Knowledge:• 11.EK 6.1.1A The Internet connects devices and networks all

over the world.• 12.EK 6.1.1D The Internet and the systems built on it facilitate

collaboration.• 13.EK 6.3.1A The trust model of the Internet involves trade-offs.• 14. EK 6.3.1B The DNS was not designed to be completely

secure.• 15. EK 6.3.1C Implementing cybersecurity has software,

hardware, and human components.• 16. EK 6.3.1D Cyber warfare and cyber crime have widespread

and potentially devastating effects

Page 10: Lesson2.9 l u2l6 secrets encoding and decoding

Essential Knowledge:

• 17. EK 6.3.1H Cryptography is essential to many models of cybersecurity.

• 18. EK 6.3.1I Cryptography has a mathematical foundation.• 19. EK 6.3.1J Open standards help ensure cryptography is

secure.• 20. EK 6.3.1K Symmetric encryption is a method of

encryption involving one key for encryption and decryption.

• 21. EK 6.3.1L Public key encryption, which is not symmetric, is an encryption method that is widely used because of the functionality it provides.

Page 11: Lesson2.9 l u2l6 secrets encoding and decoding

Essential Knowledge:• 22.EK 6.3.1M Certificate authorities (CAs) issue digital

certificates that validate the ownership of encrypted keys used in secured communications and are based on a trust model.

• 23.EK 7.3.1A Innovations enabled by computing raise legal and ethical concerns.

• 24.EK 7.3.1G Privacy and security concerns arise in the development and use of computational systems and artifacts.

• 25.EK 7.3.1L Commercial and governmental curation of information may be exploited if privacy and other protections are ignored.