13
L.O: STUDENTS WILL BE ABLE TO EXPLAIN CRYPTOGRAPHY AND INNOVATIONS. 110-120 minutes DO NOW: READ Unit 2 Lab 6: Encryption, Page 5

Lesson2.9 p u2l6 cryptography and innovations

  • Upload
    lexume1

  • View
    38

  • Download
    1

Embed Size (px)

Citation preview

Page 1: Lesson2.9 p u2l6 cryptography and innovations

L.O: STUDENTS WILL BE ABLE TO EXPLAIN CRYPTOGRAPHY

AND INNOVATIONS.110-120 minutes

DO NOW: READUnit 2 Lab 6: Encryption,

Page 5

Page 2: Lesson2.9 p u2l6 cryptography and innovations

FOR YOU TO DO:1. Choose and research an innovation that

has some relation to cryptography. Two suggestions are listed on the next page, but you may choose a different innovation, if you like—any innovation that interests you.

Page 3: Lesson2.9 p u2l6 cryptography and innovations

For example, you might look into some recent stories about hacking into car information systems, or stories of people showing they can interfere with self-driving cars:

• Why driverless cars may never happen (from UK Telegraph, 9/8/15)

• Counting on government to protect cars from hackers isn't our best option (op-ed from Washington Post, 8/26/15)

• Jeep owners urged to update their cars after hackers take remote control (Guardian, 7/21/15)

Page 4: Lesson2.9 p u2l6 cryptography and innovations

you might research Bitcoin, a "cryptocurrency":

• Bitcoin: The payment revolution (The Market Mogul)

• 21 Things I Learned About Bitcoin From Living On It For A Week (Forbes, 5/9/13)

• Bitcoin's Dark Side Could Get Darker (MIT Tech Review, 8/13/15)

Page 5: Lesson2.9 p u2l6 cryptography and innovations

2. The following are prompts from the AP Explore Task. Write about your innovation, responding to

each prompt in a separate paragraph. Remember to cite your sources.

a. the innovation name and a description of the intended purpose of the innovation (100 words max)

b. an explanation of the technical details of this innovation in terms that someone completely unfamiliar with the innovation would understand (100 words max)

c. a description of the role computing plays in implementing the functionality associated with the innovation (100 words max)

d. a description of the relationship between data and the innovation. For example, you could describe the data used or produced by the innovation or any privacy issues associated with the innovation data (100 words max).

3. When you’re done: Trade your paragraphs with a partner. Read your partner's response

for each prompt. How well did the paragraphs respond to the prompts?

Page 6: Lesson2.9 p u2l6 cryptography and innovations

HOMEWORK:read Chapter 5 of “Blown to Bits”.

Reading through the entire chapter will be helpful, especially to get a better understanding of the

evolution of encryption methods and some details of public key encryption.

Page 7: Lesson2.9 p u2l6 cryptography and innovations

Learning Objectives:1. LO 6.3.1 Identify existing cybersecurity

concerns and potential options to address these issues with the Internet and the systems built on it. [P1]

2. LO 7.5.2 Evaluate online and print sources for appropriateness and credibility [P5]

GIVE EXAMPLES OF THESE LEARNING OBJECTIVES IN THE LESSON

Page 8: Lesson2.9 p u2l6 cryptography and innovations

Enduring Understandings:

1. EU 6.3 Cybersecurity is an important concern for the Internet and the systems built on it.

2. EU 7.5 An investigative process is aided by effective organization and selection of resources. Appropriate technologies and tools facilitate the accessing of information and enable the ability to evaluate the credibility of sources

EXPLAIN THESE “ENDURING UNDERSTANDINGS”

Page 9: Lesson2.9 p u2l6 cryptography and innovations

Essential Knowledge:1. EK 1.2.5A The context in which an artifact is used

determines the correctness, usability, functionality, and suitability of the artifact.

2. EK 1.2.5B A computational artifact may have weaknesses, mistakes, or errors depending on the type of artifact.

3. EK 1.2.5C The functionality of a computational artifact may be related to how it is used or perceived.

4. EK 1.2.5D The suitability (or appropriateness) of a computational artifact may be related to how it is used or perceived.

5. EK 3.2.2D Maintaining privacy of large data sets containing personal information can be challenging.

EXPLAIN THESE “ENDURING UNDERSTANDINGS”

Page 10: Lesson2.9 p u2l6 cryptography and innovations

Essential Knowledge:

• 6.EK 3.3.1A Digital data representations involve trade-offs related to storage, security, and privacy concerns.

• 7.EK 3.3.1B Security concerns engender trade-offs in storing and transmitting information.

• 8.EK 3.3.1F Security and privacy concerns arise with data containing personal information.

• 9. EK 5.4.1L An explanation of a program helps people understand the functionality and purpose of it.

• 10. EK 5.4.1M The functionality of a program is often described by how a user interacts with it

EXPLAIN THESE “ENDURING UNDERSTANDINGS”

Page 11: Lesson2.9 p u2l6 cryptography and innovations

Essential Knowledge:• 11.EK 6.1.1A The Internet connects devices and networks all

over the world.• 12.EK 6.1.1D The Internet and the systems built on it facilitate

collaboration.• 13.EK 6.3.1A The trust model of the Internet involves trade-offs.• 14. EK 6.3.1B The DNS was not designed to be completely

secure.• 15. EK 6.3.1C Implementing cybersecurity has software,

hardware, and human components.• 16. EK 6.3.1D Cyber warfare and cyber crime have widespread

and potentially devastating effects

EXPLAIN THESE “ENDURING UNDERSTANDINGS”

Page 12: Lesson2.9 p u2l6 cryptography and innovations

Essential Knowledge:

• 17. EK 6.3.1H Cryptography is essential to many models of cybersecurity.

• 18. EK 6.3.1I Cryptography has a mathematical foundation.• 19. EK 6.3.1J Open standards help ensure cryptography is

secure.• 20. EK 6.3.1K Symmetric encryption is a method of

encryption involving one key for encryption and decryption.

• 21. EK 6.3.1L Public key encryption, which is not symmetric, is an encryption method that is widely used because of the functionality it provides.

EXPLAIN THESE “ENDURING UNDERSTANDINGS”

Page 13: Lesson2.9 p u2l6 cryptography and innovations

Essential Knowledge:• 22.EK 6.3.1M Certificate authorities (CAs) issue digital

certificates that validate the ownership of encrypted keys used in secured communications and are based on a trust model.

• 23.EK 7.3.1A Innovations enabled by computing raise legal and ethical concerns.

• 24.EK 7.3.1G Privacy and security concerns arise in the development and use of computational systems and artifacts.

• 25.EK 7.3.1L Commercial and governmental curation of information may be exploited if privacy and other protections are ignored.

EXPLAIN THESE “ENDURING UNDERSTANDINGS”