Lesson
Don't Feed the Phish
How can you protect yourself from phishing?
Grade
6Time
45 mins.
Objectives
- Compare and contrast identity theft with other kinds of theft.
- Describe different ways that identity theft can occur online.
- Use message clues to identify examples of phishing.
Vocabulary
identity theft .
internet scam .
phishing .
private information .
shortened URL
identity theft – a type of crime in which your private information is stolen and used for criminal activity
internet scam – an attempt to trick someone, usually with the intention of stealing money or private information
phishing – when someone poses as an institution, like a bank or school, and sends you a personalized message asking you to provide private information
private information – information about you that can be used to identify you because it is unique to you (e.g. your full name or your address)
shortened URL – a web address that has been condensed and which could mislead an user into going into a risky website
Standards
This lesson meets standards for Common Core ELA, ISTE, CASEL and AASL.
Extend the Lesson
Common Sense Education has partnered with CYBER.ORG to support cybersecurity education. If you want to build on the themes from this lesson, we recommend the following resources from CYBER.ORG's content library:
- Malware Attacks (Grades 6–8): Students use real-life scenarios to practice recognizing different types of malware.
- Multi-Factor Authentication (Grades 6–8): Students will learn how multi-factor authentication prevents unauthorized users, such as threat actors, from gaining access to devices and accounts.
Our collaboration with CYBER.ORG was made possible with the generous support of Craig Newmark Philanthropies.
What You’ll Need
Supplies
Colored markers or highlighters ·
Pencils ·
Blank paper