Cybersecurity Guardians: Online Safety Strategies
Created byAllison McCrary
15 views0 downloads

Cybersecurity Guardians: Online Safety Strategies

Grade 6Technology4 days
5.0 (1 rating)
Students become "Cybersecurity Guardians" by investigating real-world cyber threats, focusing on phishing scams. They analyze deceptive tactics in phishing emails, research the impact of these scams, and design awareness campaigns to educate their peers about online safety. The project emphasizes digital literacy, ethical decision-making, and practical strategies for protecting personal information online.
CybersecurityOnline SafetyPhishingCyber ThreatsDigital LiteracyEthical ConsiderationsInternet Safety
Want to create your own PBL Recipe?Use our AI-powered tools to design engaging project-based learning experiences for your students.
📝

Inquiry Framework

Question Framework

Driving Question

The overarching question that guides the entire project.How can we become responsible "Cybersecurity Guardians" by investigating and addressing real-world cyber threats, creating effective strategies for online safety, and considering the ethical implications of our actions?

Essential Questions

Supporting questions that break down major concepts.
  • How do cyber threats impact our daily lives?
  • What strategies can we use to protect our personal information online?
  • What are the ethical considerations surrounding cybersecurity?

Standards & Learning Goals

Learning Goals

By the end of this project, students will be able to:
  • Students will be able to identify common cybersecurity threats.
  • Students will be able to develop strategies to protect their personal information online.
  • Students will be able to evaluate the ethical implications of cybersecurity decisions.

K-12 Computer Science Framework

CAS.a
Primary
Responsible citizens in the modern world apply principles of personal privacy and network security to the use of computing systems, software, the Internet, media, and data.Reason: This standard directly relates to the project's focus on understanding and applying cybersecurity principles for online safety.

Entry Events

Events that will be used to introduce the project to students

The Phishing Trap

Students receive a "phishing" email attempting to trick them into revealing personal information. They analyze the email's deceptive tactics, research real-world phishing scams, and design a campaign to educate their peers about online safety.
📚

Portfolio Activities

Portfolio Activities

These activities progressively build towards your learning goals, with each submission contributing to the student's final portfolio.
Activity 1

Phishing Email Deconstruction

Students will analyze a simulated "phishing" email, identifying the deceptive tactics used to trick recipients into revealing personal information.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Examine the provided phishing email carefully, noting any unusual or suspicious details.
2. Identify the specific tactics used in the email to try and trick the recipient (e.g., urgent language, requests for personal information, suspicious links).
3. Write a detailed analysis explaining why the email is likely a phishing attempt, citing specific evidence from the email itself.

Final Product

What students will submit as the final product of the activityA written analysis of the phishing email, highlighting the suspicious elements and explaining why they are deceptive.

Alignment

How this activity aligns with the learning objectives & standardsCAS.a - Responsible citizens in the modern world apply principles of personal privacy and network security to the use of computing systems, software, the Internet, media, and data.
Activity 2

Real-World Phishing Investigations

Students will research real-world examples of phishing scams and their consequences.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Research different types of phishing attacks (e.g., spear phishing, whaling, clone phishing).
2. Investigate the potential consequences of falling victim to a phishing scam, such as identity theft or financial loss.
3. Prepare a presentation that summarizes your findings, including examples of real-world phishing scams and their impact.

Final Product

What students will submit as the final product of the activityA presentation summarizing different types of phishing scams and their potential impact on individuals and society.

Alignment

How this activity aligns with the learning objectives & standardsCAS.a - Responsible citizens in the modern world apply principles of personal privacy and network security to the use of computing systems, software, the Internet, media, and data.
Activity 3

Cybersecurity Awareness Campaign

Students will develop a campaign to educate their peers about online safety and phishing prevention.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Brainstorm creative ways to educate your peers about phishing scams and online safety.
2. Develop educational materials for your campaign, such as posters, infographics, or a short video.
3. Plan how you will disseminate your campaign materials to reach your target audience effectively.

Final Product

What students will submit as the final product of the activityA comprehensive online safety campaign, including educational materials such as posters, infographics, or a short video.

Alignment

How this activity aligns with the learning objectives & standardsCAS.a - Responsible citizens in the modern world apply principles of personal privacy and network security to the use of computing systems, software, the Internet, media, and data.
🏆

Rubric & Reflection

Portfolio Rubric

Grading criteria for assessing the overall project portfolio

Cybersecurity Guardians Evaluation Rubric

Category 1

Understanding of Cyber Threats

Measures the student's ability to identify and analyze common cybersecurity threats, focusing on phishing.
Criterion 1

Identification of Threats

Ability to recognize and articulate how phishing tactics work and why they pose threats.

Exemplary
4 Points

Identifies phishing tactics comprehensively and articulates detailed explanations of their threat potential, using accurate terminology.

Proficient
3 Points

Identifies most phishing tactics and provides clear explanations of their threat potential with appropriate terminology.

Developing
2 Points

Identifies some phishing tactics but provides limited explanations of their threat potential, with occasional misuse of terminology.

Beginning
1 Points

Struggles to identify phishing tactics and provides inadequate explanations of their threat potential, often misusing terminology.

Criterion 2

Analysis of Phishing Email

Ability to critically evaluate a phishing email, identifying specific deceptive elements.

Exemplary
4 Points

Provides a thorough analysis of the phishing email, identifying multiple deceptive elements with detailed evidence from the email.

Proficient
3 Points

Provides a clear analysis of the phishing email, identifying most deceptive elements with supporting evidence.

Developing
2 Points

Provides a partial analysis of the phishing email, identifying some deceptive elements with minimal supporting evidence.

Beginning
1 Points

Struggles to perform analysis, identifying few deceptive elements and lacks supporting evidence.

Category 2

Development of Online Safety Strategies

Evaluates the strategic approach to creating educational content for online safety and effective dissemination methods.
Criterion 1

Creativity and Originality

Degree of creativity and originality in developing educational materials for the awareness campaign.

Exemplary
4 Points

Demonstrates exceptional creativity and originality, producing innovative educational materials that effectively engage the target audience.

Proficient
3 Points

Demonstrates considerable creativity and originality, producing engaging educational materials for the target audience.

Developing
2 Points

Demonstrates some creativity and originality, producing materials with moderate engagement for the target audience.

Beginning
1 Points

Demonstrates limited creativity and originality, producing educational materials with minimal engagement for the target audience.

Criterion 2

Effectiveness of Dissemination

Evaluation of how effectively the campaign materials are planned and executed to reach the intended audience.

Exemplary
4 Points

Plans and executes dissemination strategies excellently, ensuring the campaign materials reach and impact the intended audience comprehensively.

Proficient
3 Points

Uses effective dissemination strategies, ensuring the campaign materials reach and positively impact the intended audience.

Developing
2 Points

Uses basic dissemination strategies, partially achieving outreach to the intended audience.

Beginning
1 Points

Struggles with dissemination strategies, resulting in limited or ineffective outreach to the intended audience.

Category 3

Ethical Considerations in Cybersecurity

Assesses the understanding and integration of ethical considerations in cybersecurity and online safety actions.
Criterion 1

Ethical Evaluation

Ability to evaluate and integrate ethical considerations in cybersecurity decisions and campaigns.

Exemplary
4 Points

Clearly integrates comprehensive ethical considerations, providing insightful analysis of their application to cybersecurity actions.

Proficient
3 Points

Includes ethical considerations with clear analysis, applying them appropriately to cybersecurity actions.

Developing
2 Points

Includes some ethical considerations but analysis lacks depth, showing limited application to cybersecurity actions.

Beginning
1 Points

Shows minimal understanding of ethical considerations, with inadequate application to cybersecurity actions.

Reflection Prompts

End-of-project reflection questions to get students to think about their learning
Question 1

Reflect on your learning journey throughout the "Cybersecurity Guardians" project. How has your understanding of cybersecurity threats and online safety evolved?

Text
Required
Question 2

How effectively did you contribute to the group activities and discussions during the "Cybersecurity Guardians" project?

Scale
Required
Question 3

Which activity in the "Cybersecurity Guardians" project did you find most engaging and why?

Multiple choice
Required
Options
Phishing Email Deconstruction
Real-World Phishing Investigations
Cybersecurity Awareness Campaign
Question 4

What are two specific actions you can take to improve your online safety practices based on what you learned in this project?

Text
Required
Question 5

How confident are you in your ability to identify and avoid phishing scams and other online threats?

Scale
Required