Objective:
Students will be able to:
- Define alternatives to passwords for authentication.
- Demonstrate an understanding of various methods of authentication
- Make a convincing argument as to what methods of authentication would best accomplish their assigned goal.
Standards:
CSTA Compatibility Standards
- 3A-NI-06: Recommend security measures to address various scenarios based on factors such as efficiency, feasibility, and ethical impacts.
- 3A-NI-07: Compare various security measures, considering tradeoffs between the usability and security of a computing system.
- 3B-NI-04: Compare ways software developers protect devices and information from unauthorized access.
Guiding Question:
What are various methods of authentication?
Resources:
- Lesson Slides 1.1.5 – Methods of Authentication.pptx Presentation, Activity 1.1.5 – Which Authentication Activity available on Google Classroom
Assignment:
- Read the 1.1.5 – Methods of Authentication.pptx Microsoft PowerPoint slideshow in today’s class.
- Complete the Activity 1.1.5 – Which Authentication Activity provided in Google Classroom. (50 pts)
Assigned: March 4th, 2026
Teacher Pacing Due Date: March 5th, 2026