CYBER.ORG: AP Cybersecurity – Lesson 1.1.5 – Methods of Authentication

Objective:

Students will be able to:

  • Define alternatives to passwords for authentication.
  • Demonstrate an understanding of various methods of authentication
  • Make a convincing argument as to what methods of authentication would best accomplish their assigned goal.

Standards:

CSTA Compatibility Standards

  • 3A-NI-06: Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
  • 3A-NI-07: Compare various security measures, considering tradeoffs between the usability and security of a computing system.
  • 3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.

Guiding Question:

What are various methods of authentication?

Resources:

  • Lesson Slides 1.1.5 – Methods of Authentication.pptx Presentation, Activity 1.1.5 – Which Authentication Activity available on Google Classroom

Assignment:

  1. Read the 1.1.5 – Methods of Authentication.pptx Microsoft PowerPoint slideshow in today’s class.
  2. Complete the Activity 1.1.5 – Which Authentication Activity provided in Google Classroom. (50 pts)

Assigned: March 4th, 2026
Teacher Pacing Due Date: March 5th, 2026