Real World Cyber Security in the Present
Cybersecurity and personal information protection go hand in hand. This is the third of a three lesson unit offering 5th graders an opportunity to seek out present day cyber attacks and present their findings to the classmates. The lesson is easily adaptable for 3rd grade and up through high school integrating ELA, Social Studies, and CS standards through the lens of real-world cyber security. This lesson will need one additional day for students to finalize PowerPoint presentations, and another day to present their work.
OVERVIEW
Activity Overview:
Cybersecurity and personal information protection go hand in hand. This is the third of a three lesson unit offering 5th graders an opportunity to seek out present day cyber attacks and present their findings to the classmates. The lesson is easily adaptable for 3rd grade and up through high school integrating ELA, Social Studies, and CS standards through the lens of real-world cyber security. This lesson will need one additional day for students to finalize PowerPoint presentations, and another day to present their work.
Meta description
- Subject Area: Computer Science, Social Studies, Reading/Language Arts, Technology
- Grade Level : 3-5
- Computer Science Domains:
- Networks and The Internet, Impacts of Computing
- Computer Science Principles:
- Recognizing and Defining Computational Problems
- Materials:
- Web availability to search ‘Top 10 Cyber Attacks’
- Considerations:
- Some students might have trouble getting information in ten minute timeframe. This is a good point to differentiate the focus to either let students continue on with a single event, or have students practice the skill of getting as much as possible in given timeframe knowing that they might not get finished. The latter option really emphasizes that students need to steer clear of ‘wormholes’ and crack down on the task at hand.
Lesson Plan
Overview
Cybersecurity and personal information protection go hand in hand. This is the third of a three lesson unit offering 5th graders an opportunity to seek out present day cyber attacks and present their findings to the classmates. The lesson is easily adaptable for 3rd grade and up through high school integrating ELA, Social Studies, and CS standards through the lens of real-world cyber security. This lesson will need one additional day for students to finalize PowerPoint presentations, and another day to present their work.
ASSESSMENT PRE/POST-TEST
What are some recent cyber attacks that happened around the world?
OBJECTIVES
Students will accurately use reliable sources to research three cyber attacks within the last five years.
Students will create a multimedia presentation that address the following: A. A quick summary of the event with factual text evidence (at least 3 facts) B. Identifying which production, distribution, and consumption category that was affected in terms of needs, wants, goods, and services. C. Describe with 100% accuracy how the areas of health, economy, and/or environment were impacted by this cyber attack.
CATCH/HOOK
Will we ever be fully protected from cyber attacks? How, or why not?
ACTIVITY INSTRUCTIONS
5 min Think/Pair/Share what was remembered about the Maroochy-Shire Water Treatment Cyber Attack. Introduce the daily focus of researching three recent cyber attacks that have taken place anywhere in the world in the last five years. They’ll start by working individually jotting cyber attacks they know about on their white boards. .
8 min Write/Pair/Share cyber attack stories students have heard of. Students pair and
share for three (one minute) sessions, growing their own lists from peer sharing. Students then partner up and Google search “Top 10 Cyber Attacks in the World,” to find if they have any matches on their whiteboards. Students then open up “Cyber Security” Google slides they created from the previous two lessons and add a slide listing three cyber attacks they want to research with their partner.
8 min Student teams collaborate via Google Slides and create three slides to describe each cyber attack they’ve chosen. Each slide needs two panels; one for each student to type their noted findings from research. Use remainder of ten minutes to begin researching and noting cyber attack choice #1.
8 min Student teams research and note cyber attack choice #2.
8 min Student teams research and note cyber attack choice #3
8 min Wrap up
Project a few student volunteers’ working drafts on a classroom large screen to share findings with the whole class.. After a few students have quickly shown their work, tie lesson to;
- The impacts their chosen events had on the economy, health, and environment.
- Did the company that was attacked fulfill a need, want, good, and/or service.
- What was learned through the lens of how we may have averted this attack.
- How we know we used reliable sources for our research.
Close lesson with explaining to students that they will spend one more day to finish up research and polishing up slide presentations; being sure to have information that includes the attacks’ impacts. And the next day presenting our Google Slides to the class.
Supplements
Any items in this section are the property & under the license of their respective owners.
REVIEW
Project a few student volunteers’ working drafts on a classroom large screen to share findings with the whole class.. After a few students have quickly shown their work, tie lesson to;
- The impacts their chosen events had on the economy, health, and environment.
- Did the company that was attacked fulfill a need, want, good, and/or service.
- What was learned through the lens of how we may have averted this attack.
- How we know we used reliable sources for our research.
Close lesson with explaining to students that they will spend one more day to finish up research and polishing up slide presentations; being sure to have information that includes the attacks’ impacts. And the next day presenting our Google Slides to the class.
STANDARDS
| Type | Listing |
|---|---|
| CS Domains | Networks and The Internet, Impacts of Computing |
| CS Principles | Recognizing and Defining Computational Problems |
| Other Content Standards | RI5.6; SS5.6.3; SS5.4.3 |