Email Detective: Spotting Phishing Scams
Created byAllison McCrary
16 views0 downloads

Email Detective: Spotting Phishing Scams

Grade 6Technology1 days
In the "Email Detective: Spotting Phishing Scams" project, sixth-grade students transform into digital detectives focused on identifying and preventing phishing threats. Through engaging activities like analyzing real and phishing emails, verifying email authenticity, and researching the impacts of phishing, students sharpen their digital literacy. This project promotes safe online behavior and collaboration while helping students understand the significance of critically evaluating digital communications to protect personal information.
PhishingDigital LiteracyOnline SafetyCritical AnalysisTechnology EducationCollaboration
Want to create your own PBL Recipe?Use our AI-powered tools to design engaging project-based learning experiences for your students.
📝

Inquiry Framework

Question Framework

Driving Question

The overarching question that guides the entire project.How can we, as digital detectives, identify and protect ourselves from phishing threats in the digital world?

Essential Questions

Supporting questions that break down major concepts.
  • What are the common characteristics of phishing emails?
  • How can identifying phishing clues help protect personal information?
  • What strategies can be used to verify the authenticity of an email?
  • Why is it important to critically analyze digital communications?
  • How does phishing impact individuals and organizations?

Standards & Learning Goals

Learning Goals

By the end of this project, students will be able to:
  • Students will learn to identify key characteristics of phishing emails.
  • Students will develop skills to critically analyze digital communications.
  • Students will understand the importance of protecting personal information online.
  • Students will practice strategies to verify the authenticity of emails.
  • Students will explore the impact of phishing on individuals and organizations.

ISTE Standards for Students

ISTE-1.2.b
Primary
Students engage in positive, safe, legal and ethical behavior when using technology, including social interactions online or when using networked devices.Reason: The project teaches students to identify phishing, encouraging safe online behavior.
ISTE-1.7.b
Supporting
Students use digital tools to connect with others to enhance learning.Reason: The project encourages students to engage with technology safely, promoting ethical and safe social interactions.
ISTE-1.4.b
Supporting
Students select and use digital tools to plan and manage a design process that considers design constraints and calculated risks.Reason: Students analyze digital communications considering risks involved, aligning with managing risks in technology use.

Common Core Standards English Language Arts

CCSS.ELA-LITERACY.RI.6.1
Primary
Cite textual evidence to support analysis of what the text says explicitly as well as inferences drawn from the text.Reason: Students analyze emails and cite evidence to determine authenticity, aligning with citing evidence in text analysis.
CCSS.ELA-LITERACY.RI.6.7
Secondary
Integrate information presented in different media or formats to develop a coherent understanding of a topic or issue.Reason: Students integrate information from various digital communications to identify phishing, aligning with understanding through different media.

Entry Events

Events that will be used to introduce the project to students

The Mysterious Email Challenge

Students receive a mysterious email hinting at a secret code that unlocks a special event or prize. To uncover the code, they must collaborate to distinguish the phishing clues from authentic elements within the email. This scenario taps into students' natural curiosity and problem-solving instincts.
📚

Portfolio Activities

Portfolio Activities

These activities progressively build towards your learning goals, with each submission contributing to the student's final portfolio.
Activity 1

Phishing Clue Collector

Students will explore real and phishing emails to identify common phishing elements. This activity introduces students to the subtle art of detecting fraudulent digital communications.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Introduce students to the concept of phishing and common elements found in phishing emails.
2. Present students with a mix of real and phishing email examples (around 12 in total).
3. Provide a checklist of common phishing clues: suspicious links, urgent language, spelling/grammar mistakes, etc.
4. Have students work in pairs to examine the emails and identify phishing clues using the checklist.

Final Product

What students will submit as the final product of the activityA completed checklist identifying phishing clues found in each email example.

Alignment

How this activity aligns with the learning objectives & standardsAligns with ISTE-1.2.b (safe online behavior), ISTE-1.7.b (safe interactions), and CCSS.ELA-LITERACY.RI.6.1 (citing evidence).
Activity 2

Credibility Checker

Students will evaluate the credibility of emails by researching and applying critical analysis techniques. This ensures students learn the importance of verifying information in emails.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Teach students how to verify email senders and links by researching domain names and checking for traits of credible sources.
2. Assign a small group of students different emails to investigate the credibility of the sender.
3. Have students use online tools and resources to validate the authenticity of each email and document their findings.
4. Facilitate a discussion on how the ability to verify information contributes to digital literacy.

Final Product

What students will submit as the final product of the activityA report documenting the credibility evaluation of each investigated email.

Alignment

How this activity aligns with the learning objectives & standardsAligns with ISTE-1.4.b (managing risks in technology) and CCSS.ELA-LITERACY.RI.6.7 (integrating information).
Activity 3

Phishing Impact Explorer

In this activity, students will research and present case studies showing the impact of phishing on individuals and organizations. This step enhances understanding of the real-world implications of phishing.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Introduce the concept of phishing beyond the email, including its impact and consequences.
2. Assign students to research real-world cases where phishing has negatively impacted individuals or organizations.
3. Guide students to create a short presentation that includes the case background, key incidents, and lessons learned.
4. Organize presentations in class, encouraging peer feedback and reflections on the prevention strategies discussed.

Final Product

What students will submit as the final product of the activityA presentation on a phishing case study showing its impact and possible prevention strategies.

Alignment

How this activity aligns with the learning objectives & standardsSupports ISTE-1.4.b (risk management) and provides real-life context for understanding the effects of phishing.
Activity 4

Digital Detective Role-play

Students engage in a role-play activity where they act as digital detectives to apply their knowledge of phishing threats in simulated scenarios.

Steps

Here is some basic scaffolding to help students complete the activity.
1. Divide students into small groups and assign them different roles as part of a digital forensic team.
2. Present each group with a unique scenario involving potential phishing threats across various digital mediums.
3. Task each group with identifying potential phishing tactics and recommending strategies to mitigate these threats.
4. Have groups present their findings and strategies to the class, mimicking a real forensic team debriefing.

Final Product

What students will submit as the final product of the activityA group presentation highlighting identified phishing tactics and recommended preventive strategies.

Alignment

How this activity aligns with the learning objectives & standardsAligns with ISTE-1.2.b and ISTE-1.7.b by promoting safe technology use and collaborative problem-solving.
🏆

Rubric & Reflection

Portfolio Rubric

Grading criteria for assessing the overall project portfolio

Digital Forensics and Phishing Awareness

Category 1

Understanding of Phishing Concepts

Assesses students' ability to understand and explain phishing and its characteristics.
Criterion 1

Identification of Phishing Clues

Measures students' ability to recognize and list common phishing elements in various digital communications.

Exemplary
4 Points

Accurately identifies all phishing clues across a wide variety of examples, demonstrating a deep understanding of phishing techniques.

Proficient
3 Points

Correctly identifies most phishing clues in provided examples, showing a solid understanding of common phishing tactics.

Developing
2 Points

Recognizes some phishing clues but misses several important ones, indicating an emerging understanding of phishing.

Beginning
1 Points

Struggles to identify phishing clues, showing limited understanding and needing additional guidance.

Criterion 2

Explanation of Phishing Impact

Evaluates students' ability to articulate the effects of phishing on individuals and organizations.

Exemplary
4 Points

Provides a comprehensive explanation of phishing impacts, supported by detailed real-world examples and preventive strategies.

Proficient
3 Points

Explains phishing impacts with relevant examples, offering clear preventive strategies in understanding outcomes.

Developing
2 Points

Discusses phishing impacts with basic examples, identifying some preventive strategies but lacking depth in analysis.

Beginning
1 Points

Gives limited explanation of phishing impacts with few examples or preventive strategies, requiring more support.

Category 2

Skills in Verifying Information

Evaluates ability to verify the authenticity of digital communications using appropriate tools and strategies.
Criterion 1

Use of Verification Techniques

Assesses proficiency in applying digital tools and resources to evaluate the credibility of email senders and content.

Exemplary
4 Points

Skillfully applies a wide range of verification methods, demonstrating authority in digital literacy and thoroughness in information validation.

Proficient
3 Points

Effectively uses several verification methods to assess digital content authenticity, with consistent accuracy.

Developing
2 Points

Applies some verification methods, but with inconsistent results, indicating developing digital literacy skills.

Beginning
1 Points

Struggles with verification techniques, presenting few accurate validations, and needs substantial guidance.

Category 3

Presentation and Collaboration Skills

Evaluates communication and teamwork in presenting findings and collaborating effectively in group settings.
Criterion 1

Quality of Presentation

Assesses clarity, organization, and engagement in presenting case study findings and phishing strategies.

Exemplary
4 Points

Delivers clear, well-organized, and engaging presentations with effective use of multimedia and eloquent delivery.

Proficient
3 Points

Presents information clearly and logically, engaging the audience with relevant content and satisfactory delivery.

Developing
2 Points

Presents content somewhat clearly, with some organizational or delivery issues that detract from audience engagement.

Beginning
1 Points

Delivers fragmented or unclear presentations, struggling to maintain audience interest and coherence.

Criterion 2

Contribution to Group Work

Evaluates teamwork, contribution to group tasks, and supportiveness in collaborative activities.

Exemplary
4 Points

Consistently demonstrates leadership, collaboration, and responsiveness, contributing meaningfully to group goals.

Proficient
3 Points

Actively participates and collaborates effectively, showing reliability and cooperation in group tasks.

Developing
2 Points

Participates in group activities but inconsistently contributes or engages, indicating developing collaboration skills.

Beginning
1 Points

Rarely engages in group activities, needing significant guidance to participate and cooperate effectively.

Reflection Prompts

End-of-project reflection questions to get students to think about their learning
Question 1

Reflect on the skills you developed as a digital detective. How did identifying phishing clues enhance your understanding of online safety?

Text
Required
Question 2

On a scale of 1 to 5, how confident do you feel in your ability to identify phishing emails after participating in the Email Detective Workshop?

Scale
Required
Question 3

What did you find most surprising about phishing and its impact on individuals and organizations?

Text
Required
Question 4

How important do you think it is to verify the authenticity of an email before responding or sharing personal information?

Multiple choice
Required
Options
Very Important
Important
Somewhat Important
Not Important
Question 5

In what ways can the strategies you learned in this workshop be applied outside of an academic setting?

Text
Optional