6
Activity Cyber Crime Key Learning Students will explore the issue of cyber crime and raise awareness about the importance of cyber security at school and at home. The Australian Curriculum > General Capabilities / Information and communication technology (ICT) Applying social and ethical protocols and practices when using ICT General capabilities Information and communication technology capability Literacy Personal and social capability Critical and creative thinking Ethical behaviour Students develop ICT capability within a context of social and ethical protocols and practice. This element involves students in developing an understanding of: digital information security, including the responsibility to: - protect the rights, identity, privacy and emotional safety of online audiences - avoid and prevent cyberbullying - ensure security of self and/or others - respect audiences, being aware of the portrayal of self and others the benefits and consequences of ICT for individuals, groups and communities in society, such as: - becoming drivers of ICT, seeing themselves as creators as well as consumers of ICT - recognising its capacity to enhance participation and inclusion Link to ICT general capability > http://www.australiancurriculum.edu.au/GeneralCapabilities/Informatio n-and-Communication-Technology-capability/Introduction/Background (for further information click on the General Capabilities PDF link) Focus Questions 1. Before watching the BtN story predict what you think it is going to be about. 2. Discuss the issues raised in the story with another student. 3. Describe what a pirate is in the context of this story. ©ABC 2013 Episode 7 19 th March 2013

 · Web viewmalware spyware phishing trojan virus pirates adware hacking APT’s (Advanced Persistent Threat agents) Further activity: Create a word cloud using Wordle Illustrate

Embed Size (px)

Citation preview

Page 1:  · Web viewmalware spyware phishing trojan virus pirates adware hacking APT’s (Advanced Persistent Threat agents) Further activity: Create a word cloud using Wordle Illustrate

Activity

Cyber CrimeKey LearningStudents will explore the issue of cyber crime and raise awareness about the importance of cyber security at school and at home.

The Australian Curriculum > General Capabilities / Information and communication technology (ICT)

Applying social and ethical protocols and practices when using ICT General capabilitiesInformation and communication technology capability

LiteracyPersonal and social capability

Critical and creative thinking

Ethical behaviour

Students develop ICT capability within a context of social and ethical protocols and practice. This element involves students in developing an understanding of:

digital information security, including the responsibility to:

- protect the rights, identity, privacy and emotional safety of online audiences

- avoid and prevent cyberbullying

- ensure security of self and/or others

- respect audiences, being aware of the portrayal of self and others

the benefits and consequences of ICT for individuals, groups and communities in society, such as:

- becoming drivers of ICT, seeing themselves as creators as well as consumers of ICT

- recognising its capacity to enhance participation and inclusion

Link to ICT general capability > http://www.australiancurriculum.edu.au/GeneralCapabilities/Information-and-Communication-Technology-capability/Introduction/Background (for further information click on the General Capabilities PDF link)

Focus Questions1. Before watching the BtN story predict what you think it is going to be about. 2. Discuss the issues raised in the story with another student.3. Describe what a pirate is in the context of this story.4. Someone who tries to scam you out of your personal details is referred to as a:

a. Trawlerb. Baiterc. Phisher

5. Complete this sentence. Sometimes phishers use their phony emails to spread ____________.6. Name one hacktivist group.7. What are hacktivists trying to achieve by carrying out cyber attacks?8. Why are governments around the world worried about APT’s (Advanced Persistent Threats)? 9. How did this story make you feel?10. What do you understand more clearly since watching the BtN story?

©ABC 2013

Episode 719th March 2013

Page 2:  · Web viewmalware spyware phishing trojan virus pirates adware hacking APT’s (Advanced Persistent Threat agents) Further activity: Create a word cloud using Wordle Illustrate

Activities

What is cyber crime?

Before watching the BtN Cyber Crime story ask students to write down what they think the terms cyber crime and cyber security mean.

Swap definitions with a partner and ask them to add to or change the definition. Check their meanings against a dictionary definition.

Ask students to find definitions for the following terms in the context of cyber security. Refer students to the budd:e glossary to assist them with this activity https://budd-e.staysmartonline.gov.au/teachers/primary/glossary.html

malware spyware phishing

trojan virus pirates

adware hackingAPT’s (Advanced Persistent

Threat agents)

Further activity: Create a word cloud using Wordle http://www.wordle.net/ Illustrate these terms in an interesting way (poster format). Display illustrations around the

classroom. Here are some illustrative examples:

Phishing Phishing

Computer virus Computer worm

©ABC 2013

Page 3:  · Web viewmalware spyware phishing trojan virus pirates adware hacking APT’s (Advanced Persistent Threat agents) Further activity: Create a word cloud using Wordle Illustrate

Project research

Hold a class discussion and reflect on the issue of cyber security. Here are some discussion starters: Why is it important to keep yourself safe when you are on the internet? Can you think of ways that you could make things cyber secure? Think about how this applies to

your computer, phone and other devices that connect to the internet. What does your school have in place to make sure it is cyber secure? Why is it important to have strong passwords? Refer students to BtN’s Password Power story for

more information http://www.abc.net.au/btn/story/s3374197.htm

Malware, short for malicious software, is software used or created by attackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. Examples of malware include viruses, trojan horses, worms, adware and spyware.

Ask students to choose one type of malware and then conduct research using the following structure. Students will then present their findings in an interesting way and consider sharing their findings with students in other classes.

1. What do experts say about it?2. How does it get there in the first place?3. How does this affect me?4. What is some advice?

Budd:e – a fun way for students to learn about cyber security

Budd:e for primary schools offers fun and engaging games and activities to build unique robots, while introducing basic practices that will equip children to stay safe and secure online. Topics include privacy, password creation, protecting personal details, virus scanning, secure websites and scams.

https://budd-e.staysmartonline.gov.au/primary/main.php#

Cyber Security Awareness Week – Get involved!

Host your own Cyber Security Awareness Week event at your school.

This year, Cyber Security Awareness Week will be held from 20 to 24 May 2013. The aim of Awareness Week is to help Australians using the internet – whether at home, the workplace or school – understand the simple steps they can take to protect their personal and financial information online. http://www.staysmartonline.gov.au/awareness_week

Here are some ideas for activities that you could organise to help raise awareness about cyber security at your school.

Hold a seminar for students from other classes about cyber security (when preparing your seminar you will need to consider how you communicate the information to enhance audience engagement and understanding).

Produce a flyer about cyber security which includes tips and hints for students and teachers. Include a fun word search or quiz.

©ABC 2013

Page 4:  · Web viewmalware spyware phishing trojan virus pirates adware hacking APT’s (Advanced Persistent Threat agents) Further activity: Create a word cloud using Wordle Illustrate

Share your research and information in the form of a blog using edublogs http://edublogs.org/. Produce a podcast on a specific type of malware, for example a computer worm or trojan. Consider

producing several podcasts to inform students and teachers about different types of malwares. Refer students to BtN’s Podcast Kid story page for instructions on how to create your own podcast. http://www.abc.net.au/btn/story/s3714622.htm

Further Investigation

NetBasics comprises a set of 11 animated episodes that follow the Jones Family through a typical day of online activity. Each episode is designed to show how users’ computer activities can expose them to a number of security vulnerabilities, and reinforce positive steps they can take to protect their computers and data. http://www.cybersmart.gov.au/Schools/Teacher%20resources/Lower%20se condary/NetBasics.aspx

To inform and assist teachers, children and parents about online safety, Cybersmart Outreach offers free cybersafety presentations in metropolitan and regional centres throughout Australia. http://www.cybersmart.gov.au/Outreach.aspx

8 Related Research Links

Stay Smart Online – School Resourceshttp://www.staysmartonline.gov.au/school

Stay Smart Online – Budd:e E-security education packagehttp://www.cybersmart.gov.au/Schools/Cyber%20issues/e-security%20and%20e-commerce.aspx

Stay Smart Online – Use and update security softwarehttp://www.staysmartonline.gov.au/home_users/secure_your_computer/use_and_update_anti-virus_and_anti-spyware_software

Think U Know – Think U Knowhttp://www.thinkuknow.org.au/

Cyber Smart – How cyber smart are you?http://www.cybersmart.gov.au/Kids.aspx

Cyber Smart – e-security and e-commercehttp://www.cybersmart.gov.au/Schools/Cyber%20issues/e-security%20and%20e-commerce.aspx

ABC Science – Hackinghttp://www.abc.net.au/science/tag/browse.htm?tag=hacking

Sorted – Keep your information secure onlinehttp://www.childnet.com/sorted/

Behind the News – Malwarehttp://www.abc.net.au/btn/story/s2316644.htm

Behind the News – Cyber Crimehttp://www.abc.net.au/btn/story/s2690100.htm

©ABC 2013