Teaching Cybersafety – Budd:e Basics – A Cybersmart Lesson

0
1915

Summary:

In this lesson, students recognise that there are serious security issues associated with the online world. They recognise that there are strategies for being secure and responsible online, just as there are for being safe and secure offline. Students learn that cybersecurity is the responsibility of every ICT user and will be able to Identify four basic cybersecurity strategies: a firewall, anti-virus software, keeping security software up-to-date, and email filtering.

Australian Curriculum Links:

  • Language for interaction – Understand that successful cooperation with others depends on shared use of social
    conventions, including turn-taking patterns, and forms of address that vary according to the degree of formality
    in social situations (ACELA1476).
  • Listen to and contribute to conversations and discussions to share information and
    ideas and negotiate in collaborative situations (ACELY1676).
  • Use comprehension strategies to build literal and inferred meaning and begin to evaluate texts by drawing on a
    growing knowledge of context, text structures and language features (ACELY1680).
  • Use software including word processing programs with growing speed and efficiency to construct and edit texts
    featuring visual, print and audio elements (ACELY1685).

Investigate with ICT

  • Using ICT to plan and refine information searches; to locate and access different types of data and information
    and to verify the integrity of data when investigating questions, topics or problems.
    Communicate with ICT
  • Using ICT to communicate ideas and information with others adhering to social protocols appropriate to the
    communicative context (purpose, audience and technology).

Operate ICT

  • Applying technical knowledge and skills to use ICT efficiently and to manage data and information when and as needed.
  • Apply appropriate social and ethical protocols and practices to operate and manage ICT.

Lesson:

Introduction:
  1. Open a web browser and go to https://budd-e.staysmartonline.gov.au/teachers/teachers/index.html
  2. Click on the ‘TOOB’ Section

     of the resource and watch the ‘SCAMS’ video

  3. Discuss with the students that there are serious security issues

    associated with the online world and ask what might they be?

  4. List down these issues on the board and ask students to do the same in their books.
  5. Explain that Cybercrime is a widespread and

    growing phenomenon. Cybercrime

    is a threat to critical infrastructure,

    and the digital economy. It is also

    a real threat to individual users. Then ask them how do they think Cybercrime might affect them? Record responses.

  6. Explain that the consequence of not adopting

    cybersecurity strategies can be

    very costly, and may include the

    loss of personal identity, privacy,

    data, and devices.

    Unsecured home-based computer

    systems are the frontline of attack

    for many cyber criminals.

    There are simple steps that every

    computer user needs to take to

    secure their home-based system.

    It is the responsibility of every user

    to secure their computers and

    internet devices. And now we’re going to learn how.

Body:
  1. Now show the students the student section of Budd-e by getting them to create an account at https://budd-e.staysmartonline.gov.au/primary/main.php. (if they haven’t already done so)
  2. Model how to start creating their very own Budd-e robot on their computers and how to name it (if they haven’t already done so)
  3. When finished, lead students to unlock the ‘HEAD’ of their Budd:e Robot.

“In this activity, the student is presented with a selection of ‘enhancements’ for their internet device that are represented by graphics. These enhancements include cybersecurity fundamentals (firewall, email filtering, anti-virus software, and security updates) as well as things that are nice to have—graphics, music, games and movies. The student is prompted with feedback to sort the things they ‘need’ to secure their device, from the things that are ‘nice’ to have. They also need to match the graphic depiction of these cybersecurity essentials to their definitions. In this way, the learner discovers the importance of cybersecurity fundamentals. 

Conclusion:

  1. Whole-class discussion to review learning objectives.
  2. Brainstorm why there are cyber criminals and what they are after.
  3. Brainstorm the sorts of data that people keep on computers, and make a list of good things that may be lost if a computer is corrupted.
  4. Brainstorm ways we keep ourselves safe and secure in the offline world. Compare these strategies to safety and security strategies for the online world.
  5. Discuss other cybersecurity measures like backing up data, and securing wireless networks.
  6. Discuss why it’s important to report (to teachers, parents or carers) anything bad that happens online: that it helps to make the web safer and more secure for everyone.

 

Assessment:

  • Anecdotal notes.
  • Completion of the Budd-e robot will show that the students have successfully learnt about the dangers associated with Scams.

Resources:

 

The above work is able to be shared via a Creative Commons Licence  and is courtesy of the Commonwealth of Australia. More resources can be found at https://budd-e.staysmartonline.gov.au/teachers/primary/index.html 

Print Friendly, PDF & Email