Curated OER
Language Arts: Prince Harry - A Bullet Magnet?
Young scholars research Prince Harry's upcoming deployment to Iraq as a British soldier. They write reaction papers expressing their opinions about it. Students choose from two points of view - should he be deployed, or will his...
Curated OER
Security Guards: Are They Needed?
Students discuss the need for some school districts in their area to hire security guards. Using the internet, they identify the severity of the problem in the other districts and discuss what else could be done to make schools safer....
Curated OER
Safe and Secure: More or Less?
Students discuss what they believe to be the state of security of the nation since September 11, 2001. Reading articles on security, they gather insight into new reports on security. They write letters to major newspapers expressing...
Curated OER
Does Security Mean Safer? Exploring Issues of Security in Public Places
Students explore various scenarios that may or may not make them suspicious in the post-September 11 world, and discuss and write position papers about a fatal shooting involving air marshals and a mentally ill passenger.
Curated OER
Under Electronic Lock and Key
Students evaluate issues of privacy and security by discussing whether or not one must compromise privacy to better ensure security and vice versa.
Curated OER
Cyberattack Detection Versus Privacy Protection
Students examine the issues of privacy and security as they relate to computer monitoring. In this privacy protection lesson, students carry out a round table discussion and write a persuasive essay pertaining to whether citizens must...
Curated OER
ComSec for Network+: New Threats
Young scholars identify the different types of security threats on a system. In this technology lesson plan, students demonstrate ways to defend the system from such attacks. They use computer simulation to implement security procedure.
Curated OER
Why Wait for the G-8?
Students reflect on what they consider to be the top global issues that world leaders face. They discuss the growing tension between the United States and Russia on the eve of the 2007 G-8 Summit by reading and discussing the articles....
Curated OER
ADULT ESOL LESSON PLAN--Safety and Security
Students, with the help of a vocabulary list of terms involving safety and security procedures, analyze pictures of recreational activities found in magazines/dictionaries and in groups review all the safety and security procedures...
Curated OER
ADULT ESOL LESSON PLAN--Level4-Safety and Security
Students examine a variety of countries specific procedures for identifying and reporting crimes. They review a lengthy list of vocabulary terms to assist them in their research.
Curated OER
Security Is...
Students brainstorm examples of how they have heard or seen the word "security" used. Examples might include: security blanket, Social Security, security deposit, or security guards. They create a class list of responses, then create a...
Curated OER
Classifying Rights From Various Constitutions
Students examine classification categories of rights: liberty, security, cultural and group rights using worksheets. They analyze the constitutions of five countries of the Pacific Rim while looking at the rights that are included in them.
Curated OER
Privacy: Lesson 6: What Are the Possible Consequences of Privacy?
Pupils recognize the advantages and disadvantages of privacy in general and increase their ability to recognize the benefits and costs of privacy in specific situations. Examples of benefits of privacy that students learn include...
Massachusetts Institute of Technology
Mit: Open Course Ware: Network and Computer Security
This MIT course on network and computer security covers topics such as security in multi-user distributed systems, cryptography, authentication, intrusion detection, and many other security topics.
Other
Overseas Security Advisory Council
Everything you wanted to know about the Overseas Security Advisory Council - "an enormously succcessful joint venture for effective security cooperation. Topics include: Global News, What's New, Publications, and Site Search, among others.
Other
Firewall.com
Directory of firewall and computer security information includes tools, reviews of several popular packages, patches, employment, articles, and more.
National Institute of Standards and Technology (NIST)
Fipsp: Authentication Technology Alternatives
These guidelines describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations toFederal agencies and departments for the acquisition and use of technology which supports...
Other
Center for Strategic & International Studies
"The Center for Strategic and International Studies (CSIS) is a public policy research institution dedicated to analysis and policy impact." Site gives student information and research on topics of national and international security.
US Department of Justice
U.s. Department of Justice: Computer Crime and Intellectual Property Section
Discover information about computer crime, intellectual property, electronic evidence and other high-tech legal issues. Explore documents, reports, white papers, manuals, etc.
TeachEngineering
Teach Engineering: An Implementation of Steganography
Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated...
Other
Dfrws (Digital Forensic Research Workshop)
This site provides a variety of resources and information about digital forensics.
Michigan State University
Michigan State University: Biometrics Research
This is a site on the use of biometrics in personal identification. Includes a summary of some of the many types of biometric methods under development.
TeachEngineering
Teach Engineering: Hidden in Plain Sight
Steganography is the science and art of hiding messages in plain sight so only the sender and intended recipient know the existence of a message. Steganography can be characterized as security through obscurity. Through this lesson,...
Other
National Cyber Forensics & Training Alliance
This site contains information about advanced training, security awareness in an effort to reduce cyber vulnerability, forensic and predictive analysis and lab analysis.