1 of 11

Bad Guys Beware!!!!!

Standard 1 of the 4-6 Cybersecurity Concept Area

NYS CS & DF Learning Standards:

4-6.CY.1 Explain why different types of information might need to be protected.

2 of 11

Objectives

By the end of this lesson, you will proudly be able to state:

  • I can explain what the difference is between public and private information.
  • I can explain why different types of information need to be protected.
  • I can explain different online bad guys.
  • I can explain the positive and negative effects when sharing public or private information.

3 of 11

PRIVATE INFORMATION

PUBLIC INFORMATION

01

03

VOCABULARY

Things that should only be shared with your parents or someone you trust.

Things that can be shared with anyone.

02

04

The act of stealing another person’s personal data.

BAD GUY

A person or group that exploits or preys on others.

IDENTIFY THEFT

4 of 11

HACKER

POP UP

05

VOCABULARY

07

A person who uses electronics to gain unauthorized access

to data.

A small window or box that pops up on your computer screen.

06

CYBERBULLY

To bully through the use of electronic devices.

08

RANSOMWARE

Software that blocks access to a computer until money is paid.

5 of 11

PRIVATE INFORMATION

PUBLIC INFORMATION

01

03

VOCABULARY

02

04

BAD GUY

IDENTIFY THEFT

6 of 11

HACKER

POP UP

05

VOCABULARY

07

06

CYBERBULLY

08

RANSOMWARE

7 of 11

Activation

When we meet people in person, we like to share information about ourselves, whether it is to see if you have something in common or just to tell them about yourself. This goes for online people you meet also. Just like there are strangers in real life, there are strangers on the internet. These strangers may want to gain access to your information for bad reasons. We MUST use caution when sharing.

Why do you think we like to share information?

What is an bad guy?

What could an online bad guy want with your

information? What could they do?

Can you name a type of online bad guy?

What if you had a wallet and a stranger found it?

What could that stranger do with it?

8 of 11

LESSON VIDEO

9 of 11

APPLICATION ACTIVITY

Let’s Play Jeopardy! Or Jeopardy Labs

There are 4 categories with 4 questions each

When the teacher reads the question, the first group to raise their hand will get to answer. If they are correct, they get points. If they are wrong, the next group raises their hand and will get to answer.

The teacher will keep score on board and the group with the most points wins.

10 of 11

CLOSURE

Classroom Discussion

Why is it important to keep your private information safe in an online setting?

11 of 11

Extension Activity

Congratulations!

You and your partner are being interviewed for the new host of Jeopardy!

With your partner, write a question for each category that you are assigned.

After everyone has completed their questions, you will participate in a game of Jeopardy with all of the questions that you and your classmates have written.

Jeopardy Slide - Extension Activity (forced copy) or View