Unit 2: Cybersecurity, Digital Safety & Emerging Technologies
PDF Version of unit outline: Here
All links below are of lesson plans and supporting documents (PDF format).
Unit Length: 1.5 weeks
Unit Introduction
This unit introduces students to core concepts in cybersecurity, digital privacy, and emerging technologies. Through debates, case studies, collaborative projects, and hands-on exploration, students will learn how to protect their digital lives, understand the balance between privacy and security, and examine the ethical implications of advanced technologies such as AI and facial recognition.
Unit Objective
Students will understand how to identify and respond to cybersecurity threats, evaluate personal and public privacy risks, and analyze the ethical and societal impacts of emerging technologies.
Standards Covered
- 4565.D4.1: Describe the dynamics of privacy versus security.
- 4565.D4.5: Explain the importance of cybersecurity and examine its ethical implications.
- 4565.D4.6: Demonstrate how to optimize operating system and security settings.
- 4565.D5.4: Analyze the impact of emerging technologies on society.
Daily Breakdown
Day 1: What is a Digital Footprint?
Objective: Students will explain what a digital footprint is and how it can impact their future.
Materials Needed: Internet-connected device, reflection sheet
Activities:
- Google Yourself: Reflect on your digital footprint
- Class discussion: Who sees your digital trail?
- Real-world case studies: Explore social media consequences
Day 2: Privacy vs. Security
Objective: Students will differentiate between privacy and security and evaluate trade-offs in real-life scenarios.
Materials Needed: Case study printouts, debate guide
Activities:
- "Would You Rather" Privacy vs. Security Debate
- Case study card sort: Classify as privacy or security issue
- Role-play perspectives: hacker, government, tech company
Day 3: Cyber Threats & Protection
Objective: Students will identify and respond to common cyber threats.
Materials Needed: Escape room (Google Form), threat scenario cards
Activities:
- Cybersecurity Escape Room challenge
- Threat scenario group analysis
- Extension: Research a famous cyberattack and present takeaway
Days 4–6: Cybersecurity Poster or Board Game Project
Objective: Students will collaborate to create a project that promotes digital safety and cybersecurity best practices.
Materials Needed: Poster materials or digital design tools, rubric, team planning document,
Activities:
Day 4: Research & topic selection
Day 5: Design & development
Day 6: Presentations of posters or games
Day 7: Operating Systems & Security Settings
Objective: Students will explore and adjust digital security settings within an OS or device.
Materials Needed: Classroom devices or screenshots
Activities:
- Security Settings Scavenger Hunt
- Annotation of screenshots with improvement suggestions
- Adjusting app permissions and enabling 2FA
Day 8: Emerging Technologies & Ethical Concerns
Objective: Students will analyze the impact and ethical implications of AI and emerging tech.
Materials Needed: AI demo videos, articles, discussion prompts, Kami's digital safety presentation
Activities:
- AI and Ethics Discussion: Impacts on privacy and society
- Deepfake and facial recognition video analysis
- Mini-research: Students present one tech concern
Day 9: Post-Test & Jeopardy Review
Objective: Students will review and demonstrate understanding of cybersecurity concepts.
Materials Needed: Kahoot or Quizizz, buzz-in game, post-test
Activities:
- Jeopardy review game (use buzzin.live)
- Short post-test
- Exit reflection: How will you apply cybersecurity daily?
**If you prefer a Google Drive Folder, please email me (jdthomps@purdue.edu)**