Security Risks & Consequences

This lesson can be done either in person OR virtually. Students will work individually and in groups to determine how they have been “hacked” and one item “stolen” from them...

OVERVIEW

Activity Overview:

**This lesson can be done either in person OR virtually. Students will work individually and in groups to determine how they have been “hacked” and one item “stolen” from them (either a car, new credit card issued and used, house purchased or bank account emptied). It will be the job of the group to research various security risks and identify (choose) how they believe their information was stolen, how they were hacked, and how a new item was purchased or their account emptied from lack of cybersecurity or a breach in cybersecurity. Upon completion of research, students will individually create an infographic that describes common security risks and possible solutions to preventing theft or loss of personally identifiable information. Finally, students will host a one-minute “Flash Talk” presenting their information and answering a minimum of three peer questions.

Meta description

  • Subject Area: Computer Science, Science, Technology, Engineering
  • Grade Level : 6-8
  • Computer Science Domains:
    • Networks and The Internet, Impacts of Computing
  • Computer Science Principles:
    • Collaborating Around Computing, Recognizing and Defining Computational Problems, Communicating About Computing
  • Materials:
    • Website
  • Considerations:
    • Teachers should be very comfortable with cybersecurity and guiding students through proble-solving to identify cyber security vulnerabilities

Lesson Plan

Overview

**This lesson can be done either in person OR virtually. Students will work individually and in groups to determine how they have been “hacked” and one item “stolen” from them (either a car, new credit card issued and used, house purchased or bank account emptied). It will be the job of the group to research various security risks and identify (choose) how they believe their information was stolen, how they were hacked, and how a new item was purchased or their account emptied from lack of cybersecurity or a breach in cybersecurity. Upon completion of research, students will individually create an infographic that describes common security risks and possible solutions to preventing theft or loss of personally identifiable information. Finally, students will host a one-minute “Flash Talk” presenting their information and answering a minimum of three peer questions.

ASSESSMENT PRE/POST-TEST

Pre-Questions What is CyberSecurity? What does it mean when someone has been “hacked”? Have you ever received a digital communication (chat, email, phone call, text) that seems suspicious? What are the ways we can protect ourselves from being hacked or exposing our personal information online? Post Questions After completing this assignment, how would you define cybersecurity in your own words? What are three ways you can protect your personally identifiable information in the digital world?

OBJECTIVES

Upon completion of this lesson students will be able to identify common security risks including: Phishing Keylogging rogue access points Man in the Middle shoulder surfing “virtual” dumpster diving tailgating Social Engineering DDoS Ransomware

Students will become experts on their chosen cybersecurity risk and be able to comfortably answer 1-3 questions from their classmates during a Flash Talk and Q&A session.

CATCH/HOOK

Lesson ‘Hook”: When students enter the classroom, they will be met with a “siren” sound (playing from the SmartBoard). Lights will be off and there will be a poster paper on their lab tables saying: “URGET-You have been Hacked! Your information has been stolen and use to purchase a ________”.

Each group/table will have been hacked and one item “stolen” from them (either a car, new credit card issued and used, house purchased or bank account emptied). It will be the job of the group to research various security risks and identify (choose) how they believe their information was stolen, how they were hacked, and how a new item was purchased or their account emptied from lack of cybersecurity or a breach in cybersecurity.

ACTIVITY INSTRUCTIONS

Procedure Class Discussion Prompts: Have you ever received an email or a text message that looked suspicious? Have your parents ever discussed having their identity stolen? Have you ever been unsure if you should open the message or click the link? What are the things that made you suspicious? Examples: Misspellings of words in an email, a certain vagueness, asking for account numbers, ss#, personal information… What are the ways you know of to protect yourself online?

Teacher Duty/Task-Before the Activity Prior to beginning the lesson, teachers should prepare a list of research topics for students (detailing cybersecurity risks) Teachers should have posters on each table/station prior to students entering the room Teachers should have an example of a final, completed infographic on the board to model to students what the final product should resemble

During Lesson-With the Students (1-2 hour session) A list of topics will be given to make a selection from of security risks. Each student will make a selection and create an INFOGRAPHIC about their topic using: Canva LucidPress Venngage WeVideo VDSC Imovie If students have another tool/resource they would like to use, they need to review with the teacher for approval for use in this project Students will also consider what the global or societal impact is of their selected security risk. These risks should be described in detail (a minimum of 3-4 sentences describing each risk). Students will consider and list possible solutions to their described impacts (1-3 solutions for each negative impact described). Studenst will take time to research the topic and give a 1-minute FLASH TALK on the topic with class.

NOTE: If the student is virtual, this could be a video they recorded of their talk then presented to the class. Student presenting will host a “Q&A” session with their class following their Flash Talk”

After Activity/Wrap-Up After this lesson students should clean up their work area and return all materials back to their appropriate location in the classroom. Once clean-up has been completed, students should participate in a group discussion answering the post activity discussion questions:

After completing this assignment, how would you define cybersecurity in your own words? What are three ways you can protect your personally identifiable information in the digital world? What can you tell your friends now about cybersecurity and how to protect yourself online?

Supplements

Any items in this section are the property & under the license of their respective owners.

REVIEW

After Activity/Wrap-Up After this lesson students should clean up their work area and return all materials back to their approrpriate location in the classroom. Once clean-up has been completed, students should participate in a group discussion answering the post activity discussion questions: After completing this assignment, how would you define cybersecurity in your own words? What are three ways you can protect your personally identifiable information in the digital world? What can you tell your friends now about cybersecurity and how to protect yourself online?

STANDARDS

TypeListing
CS DomainsNetworks and The Internet, Impacts of Computing
CS PrinciplesCollaborating Around Computing, Recognizing and Defining Computational Problems, Communicating About Computing
Other Content StandardsMS-LS1-1: Conduct an investigation to produce data to serve as the basis for evidence that meet the goals of an investigation (Grades 6 - 8) Use mathematical representations to describe and/or support scientific conclusions and design solutions (Grades 6 - 8) MS-ETS1-3: Analyze data from tests to determine similarities and differences among several design solutions to identify the best characteristics of each that can be combined into a new solution to better meet the criteria for success.