Cyber Safety for Middle Schoolers
Cyber Safety for Middle Schoolers
Objective Instructions
1 5
Students will analyze Ask students what they think Explain to students that the Children’s
text, citing evidence and
summarizing central cybersecurity might mean and involve. Online Privacy Protection Act (COPPA)
ideas. They will make Collect student ideas on the board. Define put restrictions in place to protect kids’
inferences to create
their own cybersecurity cybersecurity as the practice of defending personal information. Note that COPPA
protection plan. computers and servers, mobile devices, also rules that social media companies
Time electronic systems, networks, and data cannot allow children under the age of 13
45 minutes from malicious attacks. Ask students why to use their services.
they think cybersecurity is important.
6
Materials Distribute the Create Your Online
• Copies of #CyberSmarts
student magazine
• Create Your Online
Protection Plan activity
2 Prepare students to do a close reading
of the article and job profiles in the
student magazine by providing them with
Protection Plan activity sheet and
guide students to refer to the magazine as
they complete their plans.
sheet
the following guiding questions:
Level the Lesson
• Why are cybersecurity professionals
Grade 6 Since many sixth-graders
necessary in today’s world?
may be under 13, use this as an
• In what ways do people leave opportunity to broach the subject
SCHOLASTIC and associated logos are trademarks and/or registered trademarks of Scholastic Inc. All rights reserved. © 2019
Name
Cyber threat to watch for I often see this when I’m... Strategy to protect myself
Ex: Pop-up ads Ex: Checking text messages Ex: Use antivirus software
Cyber threat to watch for I often see this when I’m... Strategy to protect myself
Cyber threat to watch for I often see this when I’m... Strategy to protect myself
SPONSORED EDUCATIONAL MATERIALS Grades 6–8
Objective Instructions
1 4
Students will synthesize Explain what preventive technology is Tell students they will present their
research information to
convey technological and how it’s the first line of defense research in a visual/interactive way.
processes using domain- against cybersecurity threats. Give an Provide these presentation options:
specific language in an
informational presentation. example (e.g., antivirus software), then ask
•O
ption 1 Write and perform a skit, acting
students to share others they know of.
Time out a situation where personal data is at
2
45 minutes, plus time to Provide students with a list of risk and how the assigned technology
develop presentations
preventive technologies built and successfully protects the user.
Materials used by cybersecurity pros (e.g., firewalls, •O
ption 2 Write an interview/dialogue
• Know Your Protection
activity sheet available at ad blocker apps, antivirus software, between a computer user and the
scholastic.com voice recognition software, virtual assigned technology. Use role play to
/cybersmarts
private network). Explain that different have the technology “come to life” and
technologies safeguard against different explain to the user how it works to keep
types of threats. people safe.
assign each group a type of technology asking each group to share at least one
to learn more about (or have each group thing they learned about a technology other
choose one). Download and distribute the than the one they researched.
Know Your Protection activity sheet. Give
them the following research goals:
•C
learly and concisely describe what the
technology is and how it works.
•D
escribe the specific threat(s) this
technology protects against and
situations when those threats are most
likely to occur.
•G
ive user-oriented tips for how to activate
the technology and ensure it’s working.
Name
• What tips should users follow to activate the technology and ensure it’s working?
ACT IT OUT
Bring your research to life by demonstrating how the technology you researched works.
Option 1 Option 2
Perform a skit, acting out a Create an interview/dialogue
situation where personal data is between a computer user and the
at risk and how the technology assigned technology. Use role-play
protects the user. to have the technology explain to
the user how it protects their safety.
SPONSORED EDUCATIONAL MATERIALS Grades 6–8
Objective Instructions
1 5
Students will use Ask students to consider how they Explain that cybersecurity experts analyze
analytical and reasoning
skills to identify areas behave differently at home, in school, how people use information online to
of vulnerability in an and around strangers. Have them explain identify security weaknesses and develop
online profile and come
up with strategies for why they may be more aware of/adjust their strategies to protect against potential threats.
how to make them more behavior depending on who they are with. Ask
secure by applying
information from a text.
students to discuss in pairs why people are
cautious around strangers. Have pairs share
6 Distribute the Analyze Your Profile
activity sheet. Have students read the
information and share what they found most
Time their discussions with the class.
90 minutes (two class surprising/interesting. Encourage them to
periods)
Materials 2 Challenge students to compare being
cautious around strangers to their
use the sheet as a safety tool at home.
4 Prompt students to think about types invent their own cybersecurity device.
of profile information that might make They should detail how it works, what
it protects against, and how users can
them vulnerable online. Co-create an anchor
install it on their devices.
chart documenting student responses.
Name
Take This Home!
Use this list to
make sure all
Read the checklist below to make sure you aren’t leaving yourself vulnerable to
a cyberattack. Fill in any extra details you’ve learned in class or from additional
research in the spaces below each set of tips.
STEP 1
These parts of your profile can give away too much private information:
Username Avoid using any part of your first or last name.
Birthday Don’t post the year you were born—the whole Internet will know your age!
L ocation Leave off your street address, town, and school name.
Phone number Avoid listing your area code in particular; it can reveal your general
location and leave you vulnerable to phone scams.
STEP 2
Keep your personal information secure/protected from cyberthreats:
Make sure your username and password meet maximum security standards.
Don’t publicly share your birthday.
on’t use location tags in social media posts; avoid sharing your location publicly.
D
void saving your password for auto login; avoid staying logged in.
A
STEP 3
Outsmart hackers on the hunt for vulnerable profiles:
Check your privacy settings to make sure your profile info is restricted to who you
want to view it (i.e., your close friends or family).
estrict access to your profile info, photos, posts, and other personal information.
R
ever approve friend requests or add people you don’t know in real life.
N
Be careful about in-app purchases or clicking on pop-up links.
Disable location sharing on social media apps so other users can’t track you.
SPONSORED EDUCATIONAL MATERIALS Activity
Name
LEVEL: 2
Username: NickyBell2004
Birthday: September 29, 2004
Hometown: Berryville, VA
About me: I’m a student at Lincoln Middle School and I live to play Fortnite!
Starbright424: Hey, can you message me your number so we can talk stats? :)
online
hacked
not to get
AKA: How
3 cool
+
careers
Y
ou’ve just finished a ton of homework and you’re ready to kick
back and play video games. You log in to your game account
and immediately notice something’s not right. For one thing, you
have a bunch of new updates, which you definitely didn’t buy.
Not only that, but your screen name is different. You’re totally shook
when you realize what’s up: You’ve been hacked.
60
money. Gamers are software that finds
especially vulnerable— digital weaknesses.
after hackers log in and The scripts attempt
rack up purchases on to log in to thousands
kids’ accounts, they can
sell the souped-up user million of computers at
once using easy-to-
profiles for money. Americans guess usernames
One easy way to have been and passwords.
protect yourself: Do not victims of Researchers at the
reuse your password. identity theft University of Maryland
—2018 online survey
According to Vinny by the Harris Poll found a pattern to the
Troia, CEO of Night Lion passwords that hackers
Security and a “certified try most. One of the
Photos: Guerilla; Hero Images
39
“fish”) for your login emails and everything criminals. I study networks
info. Last summer, Jake in them. Lesson: Never and software, and ultimately
I architect the cybersecurity
Photos: kali9; Adam Crowley; Hero Images. Photo Courtesy of Haley Dickerson. Photo Courtesy of Roshan Daneshvaran
MY COOL CYBER JOB stand. In high school, I taught pillars of marketing from As long as there is a way
myself how to build a website, behavioral neuropsychology: to store, send, and receive
HALEY DICKERSON and I read books on different Why do people do what data from one device to
Marketing coding languages. From then they do? And how can you another, there will be a
director for on, I took every opportunity manipulate this behavior? high demand for talented
CyGlass to work with my new Taking information cybersecurity professionals.
skills: for local government technology (IT) courses gave With countless cyberattacks
When did you first get campaigns, restaurants, me the tools to be successful occurring across all
interested in marketing? friends and family. in digital marketing. industries and making
I was always “marketing,” daily news headlines, there
even when I was 8 and How does what you studied What would you say to kids is a major spotlight on
wrote a strategy, in crayon, in college relate to your job? thinking about getting into a cybersecurity right now that
to promote my lemonade I unintentionally learned the field like cybersecurity? is here to stay.
#CYBERSMARTS | 3
looked like the real one. control everything MY COOL CYBER JOB
40
Once teachers entered a (like what happens at
username and password, school), you can help JORDAN
the teen hacker used keep your personal info
them to log in to the real % protected. Be wary if
MCCARTHY
Infrastructure
portal. He changed his of Americans someone you know is and security
friends’ grades to better have had their suddenly acting shady team lead at Tech Impact
ones and even lowered password online, like sending
the grades of some compromised you messages asking When did you get interested in
students. Fortunately, — 2017 Norton for money or to meet computers?
Cyber Security When I was 13, I asked my
the police caught him. Insights Report up somewhere alone.
aunt if I could have her
When the phony email “Hackers trick people all broken computer to tinker
was traced back to the the time into thinking with. I tore the machine apart
16-year-old’s computer, Secret that they are someone their and rebuilt it. I still remember
Service agents broke down the victim knows and trusts,” says the feeling of euphoria when
door to his family’s home and Jordan McCarthy, infrastructure I flipped the power switch–
arrested him. He was charged and security team lead at Tech and the screen turned on!
I was hooked, and I started
with 14 felony crimes and was Impact. If you get a weird
a program at my school to
suspended from school. message, talk to a trusted adult collect dead computers,
right away. For more tips on rebuild them, and distribute
Staying Smart staying safe, check out the them to kids who didn’t have
Although you obviously can’t “Digital Dos and Don’ts” below. computers at home.
Get your apps from trusted stores like Google Play or the Apple App Store.
tech problem?
I helped my dad recover a
Do avoid public Wi-Fi if at all possible. Hackers love public Wi-Fi because bunch of critical data from a
they can easily get between you and the connection spot, and grab crashed computer by putting
every single thing you’re sending over the internet. To protect yourself, talk to the hard drive in the freezer!
your family about signing up for a VPN service if possible (VPN stands for It’s a last-resort trick used
virtual private network). A VPN uses “encryption” to change your internet to shrink “stuck” metal in
activity into code—and make it unreadable to hackers. the drive and get its parts
spinning and working again.
4 | #CYBERSMARTS