S1+Brown+Ruth

=Stage 1 Identify Desired Results=
 * **Establish Goals:** **(G)Maine Learning Results, Science and Technology, Grades: 9-Diploma** ||
 * B2. Students use a systematic process, tools and techniques, and a variety of materials to design and produce a solution or product that meets new needs or improves existing designs.

C2. Students explain how the relationship between scientific inquiry and technological design influences the advancement of ideas, products, and systems. C3. Students describe the role of science and technology in creating and solving contemporary issues and challenges.

||

//What understandings are desired?//
•Technicians need to understand computer and network security. •A computer technician will need to know how to implement security procedures in order to protect a computer and information from data loss, corruption, and theft (hardware or data). ||
 * //Students will understand that:// **(U)** ||
 * •The importance of computer security.

//What essential questions will be considered?//
•What are security threats that computer technicians need to understand? •What are security procedures? ||
 * **Essential Questions:** **(Q)** ||
 * •Why is security important?

//What key knowledge and skills will students acquire as a result of this unit?//
•How much security threats cost the United States businesses and global businesses annually. •What assets need to be protected and what are the possible threats. || • Explain - describe the different types of security threats. •Interpret - illustrate security procedures that protect computers and information. •Apply - perform common preventative maintenance techniques for security. •Perspective - analyze threats based on the perspective of an IT professional and a malicious person. •Empathy- consider the importance of having security. •Self-Knowledge - Write a basic security policy. ||
 * //Students will know:// **(K)** || //Students will be able to:// **(S)** ||
 * •Relevant vocabulary words: adware, antivirus program, authentication, dumpster diving, encryption, firewall, grayware, pop-up, social engineering, spam, spyware, stealth virus, trojan, and worm


 * 2004 ASCD and Grant Wiggins and Jay McTighe**