Summary:
In this lesson, students recognise that there are serious security issues associated with the online world. They recognise that there are strategies for being secure and responsible online, just as there are for being safe and secure offline. Students learn that cybersecurity is the responsibility of every ICT user and will be able to Identify four basic cybersecurity strategies: a firewall, anti-virus software, keeping security software up-to-date, and email filtering.
Australian Curriculum Links:
- Language for interaction – Understand that successful cooperation with others depends on shared use of social
conventions, including turn-taking patterns, and forms of address that vary according to the degree of formality
in social situations (ACELA1476). - Listen to and contribute to conversations and discussions to share information and
ideas and negotiate in collaborative situations (ACELY1676). - Use comprehension strategies to build literal and inferred meaning and begin to evaluate texts by drawing on a
growing knowledge of context, text structures and language features (ACELY1680). - Use software including word processing programs with growing speed and efficiency to construct and edit texts
featuring visual, print and audio elements (ACELY1685).
Investigate with ICT
- Using ICT to plan and refine information searches; to locate and access different types of data and information
and to verify the integrity of data when investigating questions, topics or problems.
Communicate with ICT - Using ICT to communicate ideas and information with others adhering to social protocols appropriate to the
communicative context (purpose, audience and technology).
Operate ICT
- Applying technical knowledge and skills to use ICT efficiently and to manage data and information when and as needed.
- Apply appropriate social and ethical protocols and practices to operate and manage ICT.
Lesson:
- Open a web browser and go to https://budd-e.staysmartonline.gov.au/teachers/teachers/index.html
- Click on the ‘TOOB’ Section
of the resource and watch the ‘SCAMS’ video
-
Discuss with the students that there are serious security issues
associated with the online world and ask what might they be?
- List down these issues on the board and ask students to do the same in their books.
-
Explain that Cybercrime is a widespread and
growing phenomenon. Cybercrime
is a threat to critical infrastructure,
and the digital economy. It is also
a real threat to individual users. Then ask them how do they think Cybercrime might affect them? Record responses.
- Explain that the consequence of not adopting
cybersecurity strategies can be
very costly, and may include the
loss of personal identity, privacy,
data, and devices.
Unsecured home-based computer
systems are the frontline of attack
for many cyber criminals.
There are simple steps that every
computer user needs to take to
secure their home-based system.
It is the responsibility of every user
to secure their computers and
internet devices. And now we’re going to learn how.
- Now show the students the student section of Budd-e by getting them to create an account at https://budd-e.staysmartonline.gov.au/primary/main.php. (if they haven’t already done so)
- Model how to start creating their very own Budd-e robot on their computers and how to name it (if they haven’t already done so)
- When finished, lead students to unlock the ‘HEAD’ of their Budd:e Robot.
“In this activity, the student is presented with a selection of ‘enhancements’ for their internet device that are represented by graphics. These enhancements include cybersecurity fundamentals (firewall, email filtering, anti-virus software, and security updates) as well as things that are nice to have—graphics, music, games and movies. The student is prompted with feedback to sort the things they ‘need’ to secure their device, from the things that are ‘nice’ to have. They also need to match the graphic depiction of these cybersecurity essentials to their definitions. In this way, the learner discovers the importance of cybersecurity fundamentals.
Conclusion:
- Whole-class discussion to review learning objectives.
- Brainstorm why there are cyber criminals and what they are after.
- Brainstorm the sorts of data that people keep on computers, and make a list of good things that may be lost if a computer is corrupted.
- Brainstorm ways we keep ourselves safe and secure in the offline world. Compare these strategies to safety and security strategies for the online world.
- Discuss other cybersecurity measures like backing up data, and securing wireless networks.
- Discuss why it’s important to report (to teachers, parents or carers) anything bad that happens online: that it helps to make the web safer and more secure for everyone.
Assessment:
- Anecdotal notes.
- Completion of the Budd-e robot will show that the students have successfully learnt about the dangers associated with Scams.
Resources:
- https://budd-e.staysmartonline.gov.au/teachers/primary/index.html
- Stay Smart Online at www.staysmartonline.gov.au
- SCAMwatch at www.SCAMwatch.gov.au
- ThinkUKnow at www.thinkuknow.org.au
- Cybersmart at www.cybersmart.gov.au
- Cybersafety Help Button at www.dbcde.gov.au/helpbutton
The above work is able to be shared via a Creative Commons Licence and is courtesy of the Commonwealth of Australia. More resources can be found at https://budd-e.staysmartonline.gov.au/teachers/primary/index.html