Want to create interactive content? It’s easy in Genially!

Get started free

Digital Citizenship Breakout Room - Grade 6

Jenni Ashley

Created on November 25, 2023

Start designing with a free template

Discover more than 1500 professional designs like these:

Transcript

GO!

Internet scams are part of being online today, but many kids might not be aware of them. In this activity you will learn how to compare and contrast identity theft with other kinds of theft, describe different ways that identity theft can occur online, and use message clues to identify examples of phishing. Can you escape the scam?

Don't Feed the Phish

04 Follow the series

03 Correct image

02 Find!

01 Quiz

Reward

Introduction

Collect all the numbers by completing each of the challenges, and enter them in order in the final section to escape the scam!

Your Challenge

Thieves use others' information to...
  1. Identity theft - A type of crime in which your private information is stolen and used for criminal activity
  2. Private information - Information that can be used to identify you because it is unique to you (e.g., your full name or your address)
  3. Internet scam - An attempt to trick someone online, usually with the intention of stealing money or private information
  4. Phishing - When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information

Key Vocabulary

INTRODUCTION

BACK TO INDEX

Complete the following quiz, and getthe first number towards beating the scam!

QUIZ

start

DON'T! Identity thieves use such "clues" to figure out people's passwords.

DO IT. The questions are silly, but it's worth it to win $10,000!

Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is also asked to enter his nickname, the names of any pets, and his mom's maiden name. Should he do it?

question 1/5

QUIZ

Explanation:Correct! Never give out personal information.

QUIZ

RIGHT!

next

QUIZ

DO IT. It's an official notice from a company, and if he waits, he could lose everything.

DON'T! Real companies don't do this. Thieves use such information to create false identities.

Lew gets a notice from Apple. Because of new security rules, he must submit his Social Security number (SSN) immediately or he'll lose all his photos. He knows where Mom keeps the SSN card. Should he do it?

question 2/5

Explanation:Companies will never ask for this type of information. If you want to double check, email the company's Customer Service.

QUIZ

RIGHT!

NEXT

QUIZ

DO IT. So long as she pays her parents back right away, it should be all right.

DON'T! Identity thieves can charge people's accounts for fake sales. Ask Mom or Dad first.

Dana sees $200 wireless headphones on sale for just $5! She doesn't recognize the website. It only takes credit cards, not PayPal, and it asks for more detail than most sites do. She could use the credit card her parents gave her for emergencies. Should she do it?

QUESTION 3/5

Explanation:If you think you may be getting scammed, always check in with an adult.

QUIZ

RIGHT!

NEXT

QUIZ

A technique for attempting to acquire sensitive data

the sport or business of catching fish

What is phishing?

QUESTION 4/5

Explanation: Phishing is when someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information.

QUIZ

RIGHT!

NEXT

QUIZ

Providing accurate and trustworthy information in online messages.

Sending official-looking emails that contain malicious links or attachments.

Requesting individuals to update their passwords through secure authentication processes.

Which of the following is a common tactic used in phishing attacks to deceive individuals?

QUESTION 5/5

Explanation:You have learned a lot about phishing!Well done.

QUIZ

RIGHT!

NEXT

QUIZ

TRY AGAIN

ERROR!

Wrong!Go back and try again.Read the options carefully.

START

Phishing Clues

  • Sense of urgency: When the sender says you only have a limited time to respond.
  • Spelling and grammar errors: A real company does not send out messages with such errors.
  • Alert! Alert!: The message sounds urgent, making you worry that something is wrong with
  • your account.
  • "Friend" in trouble: You see a photo of someone you know, but the message isn't really
  • from them.
  • Shortened URL: A web address that has been condensed and that could mislead a user into going into a risky website.
  • Too good to be true: Identity thieves often offer easy chances to win free money or prizes.
  • Generic or missing greeting: Real companies send messages that address customers by name.

Use the spotlight to find the correct answer and the next number.

FIND!

Hey! Sorry that you are sick for our play. Bummer! You can watch the livestream: https://livestream.com/accounts/13786002/events/11021271

Hi Snpchat Fan,We recently updated our login site. Please re-enter your password here. Then click Ver.fi.ed link to submit.

CONGRATULATIONS!You maybe win VIP pass to season finale of "America's Star." Click here!

Do Good. Feel Good.We will award every one of your contacts with a free pizza if you donate $1 to the world peace fun.

You can drag the light to search through the darkness

CLICK on the message that seems most legitmate (not a scam). 1/3

RIGHT!

Often phishing attempts are too good to be true.

Phishing attacks only occur through personal email communication.

Phishers often make spelling and grammar mistakes in their emails.

Phishing attacks often involve the use of deceptive emails that appear to be from trusted sources.

You can drag the light to search through the darkness

CLICK ON THE INCORRECT STATEMENT.2/3

RIGHT!

you got cash!This is to inform you that you The Bank of US has a gift from your relative. Click here to redeem.

Canva: new designs have landed. Access your account.

AweSome Video Games award the first 200 subscribers free game. Click here.

World's oddest pet!Click here and retweet: wwzw.LookNow

You can drag the light to search through the darkness

CLICK on the message that seems most legitmate (not a scam).3/3

TRY AGAIN

Wrong! Try again.

ERROR!

start

Choose the correct image to reveal the next number.

CORRECT IMAGE

Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.

Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.

RIGHT!

Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.

RIGHT!

Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.

RIGHT!

Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.

RIGHT!

TRY AGAIN

ERROR!

Test your wit and choose the correct shape in the series.

Stay Alert and Clever!

START

Option 06

Option 05

Option 04

Option 03

Option 02

Option 01

Choose the correct shape:

WHAT SHAPE GOES NEXT?

RIGHT!

Option 06

Option 05

Option 04

Option 03

Option 02

Option 01

Choose the correct shape:

WHAT SHAPE GOES NEXT?

Option 06

Option 05

Option 04

Option 03

Option 02

Option 01

Choose the correct shape:

RIGHT!

WHAT SHAPE GOES NEXT?

TRY AGAIN

ERROR!

Wrong!Keep trying! You got this.

ERROR!

BACK TO INDEX

THE FIRST NUMBER IS:

GREAT!

BACK TO INDEX

THE SECOND NUMBER IS:

GREAT!

BACK TO INDEX

THE THIRD NUMBER IS:

GREAT!

BACK TO INDEX

THE FOURTH NUMBER IS:

GREAT!

You have reached the last step... Enter the password!

Enter password