Digital Citizenship Breakout Room - Grade 6
Jenni Ashley
Created on November 25, 2023
More creations to inspire you
A WORLD OF SPORTS
Escape games
CEVICHE ESCAPE GAME
Escape games
SPACE INVADERS GAME
Escape games
THUNBERG CASE. TIME SOLDIERS
Escape games
MINERALS AND ROCKS
Escape games
HARRY POTTER ESCAPE GAME
Escape games
HARRY POTTER
Escape games
Transcript
Don't Feed the Phish
Internet scams are part of being online today, but many kids might not be aware of them. In this activity you will learn how to compare and contrast identity theft with other kinds of theft, describe different ways that identity theft can occur online, and use message clues to identify examples of phishing. Can you escape the scam?
GO!
Your Challenge
Collect all the numbers by completing each of the challenges, and enter them in order in the final section to escape the scam!
Introduction
Reward
01 Quiz
02 Find!
03 Correct image
04 Follow the series
BACK TO INDEX
INTRODUCTION
Key Vocabulary
- Identity theft - A type of crime in which your private information is stolen and used for criminal activity
- Private information - Information that can be used to identify you because it is unique to you (e.g., your full name or your address)
- Internet scam - An attempt to trick someone online, usually with the intention of stealing money or private information
- Phishing - When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information
Thieves use others' information to...
start
QUIZ
Complete the following quiz, and getthe first number towards beating the scam!
QUIZ
question 1/5
Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is also asked to enter his nickname, the names of any pets, and his mom's maiden name. Should he do it?
DO IT. The questions are silly, but it's worth it to win $10,000!
DON'T! Identity thieves use such "clues" to figure out people's passwords.
next
RIGHT!
QUIZ
Explanation:Correct! Never give out personal information.
question 2/5
Lew gets a notice from Apple. Because of new security rules, he must submit his Social Security number (SSN) immediately or he'll lose all his photos. He knows where Mom keeps the SSN card. Should he do it?
DON'T! Real companies don't do this. Thieves use such information to create false identities.
DO IT. It's an official notice from a company, and if he waits, he could lose everything.
QUIZ
NEXT
RIGHT!
QUIZ
Explanation:Companies will never ask for this type of information. If you want to double check, email the company's Customer Service.
QUESTION 3/5
Dana sees $200 wireless headphones on sale for just $5! She doesn't recognize the website. It only takes credit cards, not PayPal, and it asks for more detail than most sites do. She could use the credit card her parents gave her for emergencies. Should she do it?
DON'T! Identity thieves can charge people's accounts for fake sales. Ask Mom or Dad first.
DO IT. So long as she pays her parents back right away, it should be all right.
QUIZ
NEXT
RIGHT!
QUIZ
Explanation:If you think you may be getting scammed, always check in with an adult.
QUESTION 4/5
What is phishing?
the sport or business of catching fish
A technique for attempting to acquire sensitive data
QUIZ
NEXT
RIGHT!
QUIZ
Explanation:Phishing is when someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information.
QUESTION 5/5
Which of the following is a common tactic used in phishing attacks to deceive individuals?
Requesting individuals to update their passwords through secure authentication processes.
Sending official-looking emails that contain malicious links or attachments.
Providing accurate and trustworthy information in online messages.
QUIZ
NEXT
RIGHT!
QUIZ
Explanation:You have learned a lot about phishing!Well done.
Wrong!Go back and try again.Read the options carefully.
ERROR!
TRY AGAIN
QUIZ
FIND!
Use the spotlight to find the correct answer and the next number.
- Sense of urgency: When the sender says you only have a limited time to respond.
- Spelling and grammar errors: A real company does not send out messages with such errors.
- Alert! Alert!: The message sounds urgent, making you worry that something is wrong with
- your account.
- "Friend" in trouble: You see a photo of someone you know, but the message isn't really
- from them.
- Shortened URL: A web address that has been condensed and that could mislead a user into going into a risky website.
- Too good to be true: Identity thieves often offer easy chances to win free money or prizes.
- Generic or missing greeting: Real companies send messages that address customers by name.
Phishing Clues
START
CLICK on the message that seems most legitmate (not a scam). 1/3
You can drag the light to search through the darkness
Do Good. Feel Good.We will award every one of your contacts with a free pizza if you donate $1 to the world peace fun.
CONGRATULATIONS!You maybe win VIP pass to season finale of "America's Star."Click here!
Hi Snpchat Fan,We recently updated our login site. Please re-enter your password here. Then click Ver.fi.ed link to submit.
Hey! Sorry that you are sick for our play. Bummer! You can watch the livestream: https://livestream.com/accounts/13786002/events/11021271
CLICK ON THE INCORRECT STATEMENT.2/3
You can drag the light to search through the darkness
Phishing attacks often involve the use of deceptive emails that appear to be from trusted sources.
Phishers often make spelling and grammar mistakes in their emails.
Phishing attacks only occur through personal email communication.
Often phishing attempts are too good to be true.
RIGHT!
CLICK on the message that seems most legitmate (not a scam).3/3
You can drag the light to search through the darkness
World's oddest pet!Click here and retweet: wwzw.LookNow
AweSome Video Games award the first 200 subscribers free game. Click here.
Canva: new designs have landed. Access your account.
you got cash!This is to inform you that you The Bank of US has a gift from your relative. Click here to redeem.
RIGHT!
ERROR!
Wrong!Try again.
TRY AGAIN
CORRECT IMAGE
Choose the correct image to reveal the next number.
start
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
RIGHT!
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
RIGHT!
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
RIGHT!
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
RIGHT!
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
ERROR!
TRY AGAIN
START
Stay Alert and Clever!
Test your wit and choose the correct shape in the series.
WHAT SHAPE GOES NEXT?
Choose the correct shape:
?
Option 01
Option 02
Option 03
Option 04
Option 05
Option 06
WHAT SHAPE GOES NEXT?
Choose the correct shape:
?
Option 01
Option 02
Option 03
Option 04
Option 05
Option 06
RIGHT!
WHAT SHAPE GOES NEXT?
RIGHT!
Choose the correct shape:
?
Option 01
Option 02
Option 03
Option 04
Option 05
Option 06
ERROR!
Wrong!Keep trying! You got this.
ERROR!
TRY AGAIN
7
GREAT!
THE FIRST NUMBER IS:
BACK TO INDEX
0
GREAT!
THE SECOND NUMBER IS:
BACK TO INDEX
9
GREAT!
THE THIRD NUMBER IS:
BACK TO INDEX
2
GREAT!
THE FOURTH NUMBER IS:
BACK TO INDEX
ENTER THE Verification CODE
Congratulations!
You now know how to keep yourself safe from phishers and scammers. Stay alert! And, always ask for help.