21 Things - Basics

Q5 Safe & Secure: Username & Security

1. Basics

CREATING A GOOD USERNAME

With over 2.7 billion people using the Internet, you will find that the username you want to use to create an account may already be taken. You must be creative and create a username that you will remember and be unique to you.

1. Work with your partner or small group, and each select one of the following resources, take notes, and then share what you learned with your partners.

2. Work with a partner and create an infographic or poster with at least 5 tips for classmates for creating a good username.

MOBILE SAFETY AND SECURITY INTRODUCTION

Mobile cell phones are everywhere. They are just as important as safety and security with your digital computing device, in fact, it is one of the more powerful options used today by many.

1. Open and Read the infographic on Cell Phone Safety (direct link here).

2. Discuss it with a partner or in class.

  • What three points from this infographic stand out to you as most important?
  • Do your points align with your partners?  You should each discuss why you believe your three points are the most important.  

Screenshot of a Tips for Teens for Mobile cell phones.

© 2018 Cyberbullying Research Center | cyberbullying.org Reproduction allowed for non-profit educational purposes only.

TWO FACTOR AUTHENTICATION (2FA)

2FA is also referred to as two-step verification. It means that you need two factors to access your account online. It could be your password AND a special code. When you set up 2FA, it will make sure that the person logging into your account is you.

Play the video to learn more about 2FA.

It adds a second security level (two factors) to complete your login process to make it more secure and protect you. Direct link (2:34).

Sometimes the two-factor authentication uses a set of images and asks you to click on only the ones that include a certain thing like traffic lights, street crossing, a particular animal, etc. The one shown below tells you to click on all the images that have traffic lights, and after selecting them it may show another collection of images before you are logged in securely.Shows a grid of images as an example of two-factor authentication with selecting images containing a specific item. 

This activity is for grades 6-12 and takes approximately one and a half hours to complete. Check with your teacher about this activity located on the PBS website.

Play the Video Introduction (3:38) to learn about it.