Want to create interactive content? It’s easy in Genially!
Digital Citizenship Breakout Room - Grade 6
Jenni Ashley
Created on November 25, 2023
Start designing with a free template
Discover more than 1500 professional designs like these:
Transcript
Don't Feed the Phish
Internet scams are part of being online today, but many kids might not be aware of them. In this activity you will learn how to compare and contrast identity theft with other kinds of theft, describe different ways that identity theft can occur online, and use message clues to identify examples of phishing. Can you escape the scam?
GO!
Your Challenge
Introduction
01 Quiz
02 Find!
Collect all the numbers by completing each of the challenges, and enter them in order in the final section to escape the scam!
Reward
03 Correct image
04 Follow the series
INTRODUCTION
Key Vocabulary
Thieves use others' information to...
- Identity theft - A type of crime in which your private information is stolen and used for criminal activity
- Private information - Information that can be used to identify you because it is unique to you (e.g., your full name or your address)
- Internet scam - An attempt to trick someone online, usually with the intention of stealing money or private information
- Phishing - When someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information
BACK TO INDEX
QUIZ
Complete the following quiz, and getthe first number towards beating the scam!
start
QUIZ
question 1/5
Zack sees an online contest. He could win $10,000 instantly! On the sign-up form, he enters his name and email address. He is also asked to enter his nickname, the names of any pets, and his mom's maiden name. Should he do it?
DON'T! Identity thieves use such "clues" to figure out people's passwords.
DO IT. The questions are silly, but it's worth it to win $10,000!
QUIZ
RIGHT!
Explanation:Correct! Never give out personal information.
next
QUIZ
question 2/5
Lew gets a notice from Apple. Because of new security rules, he must submit his Social Security number (SSN) immediately or he'll lose all his photos. He knows where Mom keeps the SSN card. Should he do it?
DON'T! Real companies don't do this. Thieves use such information to create false identities.
DO IT. It's an official notice from a company, and if he waits, he could lose everything.
QUIZ
RIGHT!
Explanation:Companies will never ask for this type of information. If you want to double check, email the company's Customer Service.
NEXT
QUIZ
QUESTION 3/5
Dana sees $200 wireless headphones on sale for just $5! She doesn't recognize the website. It only takes credit cards, not PayPal, and it asks for more detail than most sites do. She could use the credit card her parents gave her for emergencies. Should she do it?
DO IT. So long as she pays her parents back right away, it should be all right.
DON'T! Identity thieves can charge people's accounts for fake sales. Ask Mom or Dad first.
QUIZ
RIGHT!
Explanation:If you think you may be getting scammed, always check in with an adult.
NEXT
QUIZ
QUESTION 4/5
What is phishing?
A technique for attempting to acquire sensitive data
the sport or business of catching fish
QUIZ
RIGHT!
Explanation: Phishing is when someone poses as an institution, like a bank or a school, and sends you a personalized message asking you to provide private information.
NEXT
QUIZ
QUESTION 5/5
Which of the following is a common tactic used in phishing attacks to deceive individuals?
Requesting individuals to update their passwords through secure authentication processes.
Sending official-looking emails that contain malicious links or attachments.
Providing accurate and trustworthy information in online messages.
QUIZ
RIGHT!
Explanation:You have learned a lot about phishing!Well done.
NEXT
QUIZ
ERROR!
Wrong!Go back and try again.Read the options carefully.
TRY AGAIN
FIND!
Use the spotlight to find the correct answer and the next number.
Phishing Clues
- Sense of urgency: When the sender says you only have a limited time to respond.
- Spelling and grammar errors: A real company does not send out messages with such errors.
- Alert! Alert!: The message sounds urgent, making you worry that something is wrong with
- your account.
- "Friend" in trouble: You see a photo of someone you know, but the message isn't really
- from them.
- Shortened URL: A web address that has been condensed and that could mislead a user into going into a risky website.
- Too good to be true: Identity thieves often offer easy chances to win free money or prizes.
- Generic or missing greeting: Real companies send messages that address customers by name.
START
CLICK on the message that seems most legitmate (not a scam). 1/3
CONGRATULATIONS!You maybe win VIP pass to season finale of "America's Star." Click here!
Hey! Sorry that you are sick for our play. Bummer! You can watch the livestream: https://livestream.com/accounts/13786002/events/11021271
You can drag the light to search through the darkness
Hi Snpchat Fan,We recently updated our login site. Please re-enter your password here. Then click Ver.fi.ed link to submit.
Do Good. Feel Good.We will award every one of your contacts with a free pizza if you donate $1 to the world peace fun.
CLICK ON THE INCORRECT STATEMENT.2/3
Often phishing attempts are too good to be true.
You can drag the light to search through the darkness
Phishers often make spelling and grammar mistakes in their emails.
RIGHT!
Phishing attacks often involve the use of deceptive emails that appear to be from trusted sources.
Phishing attacks only occur through personal email communication.
CLICK on the message that seems most legitmate (not a scam).3/3
you got cash!This is to inform you that you The Bank of US has a gift from your relative. Click here to redeem.
You can drag the light to search through the darkness
Canva: new designs have landed. Access your account.
RIGHT!
World's oddest pet!Click here and retweet: wwzw.LookNow
AweSome Video Games award the first 200 subscribers free game. Click here.
ERROR!
Wrong! Try again.
TRY AGAIN
CORRECT IMAGE
Choose the correct image to reveal the next number.
start
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
RIGHT!
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
RIGHT!
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
RIGHT!
Click on the email that looks most legitimate. Be Careful of Phishing! Keep in mind the Phishing clues.
RIGHT!
ERROR!
TRY AGAIN
Stay Alert and Clever!
Test your wit and choose the correct shape in the series.
START
WHAT SHAPE GOES NEXT?
Choose the correct shape:
Option 01
Option 02
Option 03
Option 04
Option 05
Option 06
WHAT SHAPE GOES NEXT?
RIGHT!
Choose the correct shape:
Option 01
Option 02
Option 03
Option 04
Option 05
Option 06
WHAT SHAPE GOES NEXT?
RIGHT!
Choose the correct shape:
Option 01
Option 02
Option 03
Option 04
Option 05
Option 06
ERROR!
ERROR!
Wrong!Keep trying! You got this.
TRY AGAIN
GREAT!
THE FIRST NUMBER IS:
BACK TO INDEX
GREAT!
THE SECOND NUMBER IS:
BACK TO INDEX
GREAT!
THE THIRD NUMBER IS:
BACK TO INDEX
GREAT!
THE FOURTH NUMBER IS:
BACK TO INDEX
You have reached the last step... Enter the password!
Enter password