Want to create interactive content? It’s easy in Genially!
Digital Citizenship Breakout Room - Grade 6
Jenni Ashley
Created on November 25, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
GO!
Internet scams are part of being online today, but many kids might not be aware of them. In this activity you will learn how to compare and contrast identity theft with other kinds of theft, describe different ways that identity theft can occur online, and use message clues to identify examples of phishing. Can you escape the scam?
Don't Feed the Phish
04 Follow the series
03 Correct image
02 Find!
01 Quiz
Reward
Introduction
Collect all the numbers by completing each of the challenges, and enter them in order in the final section to escape the scam!
Your Challenge
Thieves use others' information to...
- Identity theft - A type of crime in which your private information is stolen and used for criminal activity
- Private information - Information that can be used to identify you because it is unique to you (e.g., your full name or your address)
- Internet scam - An attempt to trick someone online, usually with the intention of stealing money or private information
- Phishing - When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information
Key Vocabulary
INTRODUCTION
BACK TO INDEX
Complete the following quiz, and getthe first number towards beating the scam!
QUIZ
start
DON'T! Identity thieves use such "clues" to figure out people's passwords.
DO IT. The questions are silly, but it's worth it to win $10,000!
Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is also asked to enter his nickname, the names of any pets, and his mom's maiden name. Should he do it?
question 1/5
QUIZ
Explanation:Correct! Never give out personal information.
QUIZ
RIGHT!
next
QUIZ
DO IT. It's an official notice from a company, and if he waits, he could lose everything.
DON'T! Real companies don't do this. Thieves use such information to create false identities.
Lew gets a notice from Apple. Because of new security rules, he must submit his Social Security number (SSN) immediately or he'll lose all his photos. He knows where Mom keeps the SSN card. Should he do it?
question 2/5
Explanation:Companies will never ask for this type of information. If you want to double check, email the company's Customer Service.
QUIZ
RIGHT!
NEXT
QUIZ
DO IT. So long as she pays her parents back right away, it should be all right.
DON'T! Identity thieves can charge people's accounts for fake sales. Ask Mom or Dad first.
Dana sees $200 wireless headphones on sale for just $5! She doesn't recognize the website. It only takes credit cards, not PayPal, and it asks for more detail than most sites do. She could use the credit card her parents gave her for emergencies. Should she do it?
QUESTION 3/5
Explanation:If you think you may be getting scammed, always check in with an adult.
QUIZ
RIGHT!
NEXT
QUIZ
A technique for attempting to acquire sensitive data
the sport or business of catching fish
What is phishing?
QUESTION 4/5
Explanation: Phishing is when someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information.
QUIZ
RIGHT!
NEXT
QUIZ
Providing accurate and trustworthy information in online messages.
Sending official-looking emails that contain malicious links or attachments.
Requesting individuals to update their passwords through secure authentication processes.
Which of the following is a common tactic used in phishing attacks to deceive individuals?
QUESTION 5/5
Explanation:You have learned a lot about phishing!Well done.
QUIZ
RIGHT!
NEXT
QUIZ
TRY AGAIN
ERROR!
Wrong!Go back and try again.Read the options carefully.
START
Phishing Clues
- Sense of urgency: When the sender says you only have a limited time to respond.
- Spelling and grammar errors: A real company does not send out messages with such errors.
- Alert! Alert!: The message sounds urgent, making you worry that something is wrong with
- your account.
- "Friend" in trouble: You see a photo of someone you know, but the message isn't really
- from them.
- Shortened URL: A web address that has been condensed and that could mislead a user into going into a risky website.
- Too good to be true: Identity thieves often offer easy chances to win free money or prizes.
- Generic or missing greeting: Real companies send messages that address customers by name.
Use the spotlight to find the correct answer and the next number.
FIND!
Hey! Sorry that you are sick for our play. Bummer! You can watch the livestream: https://livestream.com/accounts/13786002/events/11021271
Hi Snpchat Fan,We recently updated our login site. Please re-enter your password here. Then click Ver.fi.ed link to submit.
CONGRATULATIONS!You maybe win VIP pass to season finale of "America's Star." Click here!
Do Good. Feel Good.We will award every one of your contacts with a free pizza if you donate $1 to the world peace fun.
You can drag the light to search through the darkness
CLICK on the message that seems most legitmate (not a scam). 1/3
RIGHT!
Often phishing attempts are too good to be true.
Phishing attacks only occur through personal email communication.
Phishers often make spelling and grammar mistakes in their emails.
Phishing attacks often involve the use of deceptive emails that appear to be from trusted sources.
You can drag the light to search through the darkness
CLICK ON THE INCORRECT STATEMENT.2/3
RIGHT!
you got cash!This is to inform you that you The Bank of US has a gift from your relative. Click here to redeem.
Canva: new designs have landed. Access your account.
AweSome Video Games award the first 200 subscribers free game. Click here.
World's oddest pet!Click here and retweet: wwzw.LookNow
You can drag the light to search through the darkness
CLICK on the message that seems most legitmate (not a scam).3/3
TRY AGAIN
Wrong! Try again.
ERROR!
start
Choose the correct image to reveal the next number.
CORRECT IMAGE
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
RIGHT!
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
RIGHT!
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
RIGHT!
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
RIGHT!
TRY AGAIN
ERROR!
Test your wit and choose the correct shape in the series.
Stay Alert and Clever!
START
Option 06
Option 05
Option 04
Option 03
Option 02
Option 01
Choose the correct shape:
WHAT SHAPE GOES NEXT?
RIGHT!
Option 06
Option 05
Option 04
Option 03
Option 02
Option 01
Choose the correct shape:
WHAT SHAPE GOES NEXT?
Option 06
Option 05
Option 04
Option 03
Option 02
Option 01
Choose the correct shape:
RIGHT!
WHAT SHAPE GOES NEXT?
TRY AGAIN
ERROR!
Wrong!Keep trying! You got this.
ERROR!
BACK TO INDEX
THE FIRST NUMBER IS:
GREAT!
BACK TO INDEX
THE SECOND NUMBER IS:
GREAT!
BACK TO INDEX
THE THIRD NUMBER IS:
GREAT!
BACK TO INDEX
THE FOURTH NUMBER IS:
GREAT!
You have reached the last step... Enter the password!
Enter password