
Cybersecurity Guardians: Online Safety Strategies
Inquiry Framework
Question Framework
Driving Question
The overarching question that guides the entire project.How can we become responsible "Cybersecurity Guardians" by investigating and addressing real-world cyber threats, creating effective strategies for online safety, and considering the ethical implications of our actions?Essential Questions
Supporting questions that break down major concepts.- How do cyber threats impact our daily lives?
- What strategies can we use to protect our personal information online?
- What are the ethical considerations surrounding cybersecurity?
Standards & Learning Goals
Learning Goals
By the end of this project, students will be able to:- Students will be able to identify common cybersecurity threats.
- Students will be able to develop strategies to protect their personal information online.
- Students will be able to evaluate the ethical implications of cybersecurity decisions.
K-12 Computer Science Framework
Entry Events
Events that will be used to introduce the project to studentsThe Phishing Trap
Students receive a "phishing" email attempting to trick them into revealing personal information. They analyze the email's deceptive tactics, research real-world phishing scams, and design a campaign to educate their peers about online safety.Portfolio Activities
Portfolio Activities
These activities progressively build towards your learning goals, with each submission contributing to the student's final portfolio.Phishing Email Deconstruction
Students will analyze a simulated "phishing" email, identifying the deceptive tactics used to trick recipients into revealing personal information.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA written analysis of the phishing email, highlighting the suspicious elements and explaining why they are deceptive.Alignment
How this activity aligns with the learning objectives & standardsCAS.a - Responsible citizens in the modern world apply principles of personal privacy and network security to the use of computing systems, software, the Internet, media, and data.Real-World Phishing Investigations
Students will research real-world examples of phishing scams and their consequences.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA presentation summarizing different types of phishing scams and their potential impact on individuals and society.Alignment
How this activity aligns with the learning objectives & standardsCAS.a - Responsible citizens in the modern world apply principles of personal privacy and network security to the use of computing systems, software, the Internet, media, and data.Cybersecurity Awareness Campaign
Students will develop a campaign to educate their peers about online safety and phishing prevention.Steps
Here is some basic scaffolding to help students complete the activity.Final Product
What students will submit as the final product of the activityA comprehensive online safety campaign, including educational materials such as posters, infographics, or a short video.Alignment
How this activity aligns with the learning objectives & standardsCAS.a - Responsible citizens in the modern world apply principles of personal privacy and network security to the use of computing systems, software, the Internet, media, and data.Rubric & Reflection
Portfolio Rubric
Grading criteria for assessing the overall project portfolioCybersecurity Guardians Evaluation Rubric
Understanding of Cyber Threats
Measures the student's ability to identify and analyze common cybersecurity threats, focusing on phishing.Identification of Threats
Ability to recognize and articulate how phishing tactics work and why they pose threats.
Exemplary
4 PointsIdentifies phishing tactics comprehensively and articulates detailed explanations of their threat potential, using accurate terminology.
Proficient
3 PointsIdentifies most phishing tactics and provides clear explanations of their threat potential with appropriate terminology.
Developing
2 PointsIdentifies some phishing tactics but provides limited explanations of their threat potential, with occasional misuse of terminology.
Beginning
1 PointsStruggles to identify phishing tactics and provides inadequate explanations of their threat potential, often misusing terminology.
Analysis of Phishing Email
Ability to critically evaluate a phishing email, identifying specific deceptive elements.
Exemplary
4 PointsProvides a thorough analysis of the phishing email, identifying multiple deceptive elements with detailed evidence from the email.
Proficient
3 PointsProvides a clear analysis of the phishing email, identifying most deceptive elements with supporting evidence.
Developing
2 PointsProvides a partial analysis of the phishing email, identifying some deceptive elements with minimal supporting evidence.
Beginning
1 PointsStruggles to perform analysis, identifying few deceptive elements and lacks supporting evidence.
Development of Online Safety Strategies
Evaluates the strategic approach to creating educational content for online safety and effective dissemination methods.Creativity and Originality
Degree of creativity and originality in developing educational materials for the awareness campaign.
Exemplary
4 PointsDemonstrates exceptional creativity and originality, producing innovative educational materials that effectively engage the target audience.
Proficient
3 PointsDemonstrates considerable creativity and originality, producing engaging educational materials for the target audience.
Developing
2 PointsDemonstrates some creativity and originality, producing materials with moderate engagement for the target audience.
Beginning
1 PointsDemonstrates limited creativity and originality, producing educational materials with minimal engagement for the target audience.
Effectiveness of Dissemination
Evaluation of how effectively the campaign materials are planned and executed to reach the intended audience.
Exemplary
4 PointsPlans and executes dissemination strategies excellently, ensuring the campaign materials reach and impact the intended audience comprehensively.
Proficient
3 PointsUses effective dissemination strategies, ensuring the campaign materials reach and positively impact the intended audience.
Developing
2 PointsUses basic dissemination strategies, partially achieving outreach to the intended audience.
Beginning
1 PointsStruggles with dissemination strategies, resulting in limited or ineffective outreach to the intended audience.
Ethical Considerations in Cybersecurity
Assesses the understanding and integration of ethical considerations in cybersecurity and online safety actions.Ethical Evaluation
Ability to evaluate and integrate ethical considerations in cybersecurity decisions and campaigns.
Exemplary
4 PointsClearly integrates comprehensive ethical considerations, providing insightful analysis of their application to cybersecurity actions.
Proficient
3 PointsIncludes ethical considerations with clear analysis, applying them appropriately to cybersecurity actions.
Developing
2 PointsIncludes some ethical considerations but analysis lacks depth, showing limited application to cybersecurity actions.
Beginning
1 PointsShows minimal understanding of ethical considerations, with inadequate application to cybersecurity actions.