Table of Contents
- 1.1 Pupils as a source of danger for a teacher
- 1.1.1 Internet in the classroom
- 1.1.2 Who works for your accounts?
- 1.1.3 Mobile protection
- 1.1.4 Personal privacy and impeccable online reputation
- 1.2 Internet in the classroom
- 1.3 Cyberbullying threat (Internet bullying)
- 1.3.1 A Brief Dictionary of Cyberbullying
- 1.3.2 How to understand if a student is a victim of online bullying
- 1.4 Learning as a way to solve a problem
- 1.4.1 Public Wi-Fi Access Points Precautions
- 1.4.2 Phishing protection
- 1.4.3 Malware protection
- 1.4.4 Cybersecurity and the Internet of Things
- 1.4.5 Social Networks and Security
- 220.127.116.11 Cybercriminals, online stalkers, phishing scammers, and even hackers planning to steal someone’s online identity can take advantage of all this data to the detriment of your students.
- 18.104.22.168 Yes, some teenagers think ahead of all that will concern their online reputation. Here are just the data from the Pew Research Center that they are in the minority: 2 out of 3 teenagers do not think about anything like this.
- 22.214.171.124 However,
- 126.96.36.199 If you do not disable geo-tags,
- 188.8.131.52 In order not to become a victim of thieves, online stalkers and other problems related to cybersecurity, your students can use the following tips:
- 1.4.6 Strangers from Cyberspace
- 1.5 Tips and lesson plans for teachers
- 1.5.1 Where to begin
- 1.5.2 General tips
- 184.108.40.206 Here are a few stories to recommend:
- 220.127.116.11 “How One Woman’s Digital Life Was Weaponized Against Her” – Wired (an article on cyberstalking and harassment for adults that contains descriptions of a sexual nature, obscene language, discussions about suicide and cruelty)
- 18.104.22.168 Provide students with illustrative examples of cyberthreats.
- 1.5.3 Interaction with Cyber Bullies
- 1.5.4 Safe social networking
- 1.5.5 Sample lesson plan: “Engage in phishing”
- 1.5.6 What is phishing
- 1.5.7 Phishing Definition
- 1.5.8 Let’s do phishing! Classroom exercise
- 1.5.9 Phishing: homework
- 1.5.10 Other resources and tools for teachers
- 1.5.11 Share this:
- 1.5.12 Like this:
The Internet helps you learn faster and provides instant access to the amount of information that is unlikely to fit in the entire library of your school. That’s just the online world of modern education that can be extremely dangerous, both for students and teachers. So cybersecurity is important.
Your students are much better versed in modern technology than you can imagine. Many adults have to look at reference materials from time to time to understand the intricacies of the work of programs and applications, but young people with all this on you. They intuitively understand how applications, mobile devices and online platforms work, and so well as if they had worked with them all their lives.
This means that having the appropriate motivation, your students can easily pick up the password for your accounts. For example, a student is unhappy with her assessment: if she breaks into your account, she can easily correct her marks. And if some student wants to play you, then nothing will stop him from replacing all the images in your presentation that you have worked on for so long in PowerPoint.
You need to know how to protect yourself and your students from cyberattacks.
Cybersecurity for students
There may be situations when your students will turn out to be cybercriminals, but others are possible – in which they will already be victims.
Yes, young people are quickly mastering digital programs, some even know how to hack them, but they still have little experience. They may not be insightful and wise enough to recognize all the dangers of the online world that they will encounter.
You are a teacher, and therefore you must protect your students and tell them about cybersecurity so that they can protect themselves on the Internet.
Cyber threats are a real danger, but fortunately, there is an easy way to protect you and your students: education! Knowledge is power, right?
Explore the topic of cybersecurity, the latest applications and other features of modern technology yourself, tell your students about it, and you can identify and fix problems with digital security at the very beginning.
Pupils as a source of danger for a teacher
Even if it’s completely by accident and without malicious intent, but your students and their digital habits can coolly substitute both themselves and classmates, you and even your entire school. Next, we will talk about these threats and share ways in which they could be avoided.
Internet in the classroom
As we already said, your students are much better than you are versed in modern technology. Perhaps they are well aware of all the features of popular online programs and digital devices, which gives them a huge advantage over you – for example if they want to hack your accounts.
Your first impulse may be a total ban on digital devices in the classroom. However, this is unlikely to work. Scientists from the Pew Research Center say that in 2018, “95% of adolescents had access to a smartphone, with 45% of them claiming they were“ online almost constantly. ”
In other words, you can hardly really make a classroom a territory free of smartphones, tablets and laptops. Of course, you can fight, but no one will get pleasure from it. It’s better to make your stay on the Internet more productive for your students – for example, let them prepare for lessons using the Web (read more about this in our lesson plan ).
Who works for your accounts?
You probably have a lot of accounts in various services. Personal email, social media accounts, and various school platforms are what we’re talking about.
Now imagine that your students have access to the data stored there. They will be able to read your correspondence, change their homework and grades, see the reports of other students, post something inaccurate on your school’s social network page on your behalf and organize many more other things to worry you about.
It is unlikely that students will be very difficult to hack into your accounts. The situation is aggravating by the fact that in many schools, in principle, there is nothing that would resemble a cyber defence system designed to limit access to your accounts.
To protect your data from young hackers, you need to know the five basic principles of protecting your account.
Next, we will tell you how to protect your accounts. These tips apply to online teacher portals, personal accounts, email, and social media pages. Here’s what we advise you:
- Use your “school” email address to register on educational portals. So you separate your email address from the accounts that your students can access.
- Come up with complex passwords. Passwords must use uppercase and lowercase letters, numbers, and symbols. Then guessing the password will be more difficult.
- Change your passwords often. Experts advise changing passwords every six months, but this is too long for the teacher. We recommend changing passwords every three months.
- Use different passwords for different accounts. for example, the password from the personal account on the school portal should not coincide with the password from the personal page on the social network. If someone picks up one of your passwords, they won’t be able to crack all your other accounts as well.
- Check if your password is complicated enough with the help of special services ( for example, ours ). These services show how easy or difficult it is to crack a password.
- Use the password manager to create or store them on your device or browser. Password Manager uses a special database to create and store strong passwords, and you no longer have to remember from.
- Use biometric passwords (for example, fingerprint login), if possible. This is an extremely safe solution – only you can log in.
- Use advanced or two-factor authentication systems, if possible. Here you will need to not only enter a password but also specify a special code that will be sent to you by e-mail or phone. This is the best way to protect important credentials (for example, personal mail or bank account). Many services support two-factor authentication, but if you do not know how to enable it, then contact the technical support of the corresponding service.
So you can protect your accounts from students and other potential hackers.
Perhaps you are actively using smartphones: to chat with friends, check mail, view social networks. Maybe with a smartphone, you even check students’ homework and reports and give them grades.
Smartphones are very convenient and useful, but also extremely vulnerable to hacking by students.
Your smartphone may be expensive, but the data stored on it is even more valuable. Photos, accounts in social networks and banks, personal correspondence and other confidential information – this is what is stored in the smartphone.
If you do not take appropriate precautions, then the student, colleague or even any passerby will be able to get access to all this.
There are 4 ways to protect sensitive data stored on your smartphone from potential hackers:
- Update your devices regularly. Hackers specifically look for vulnerabilities in computer systems, and they manage to find them almost as fast as specialists on the other side of the barricade – eliminate them. There is no 100% safe computer system, however, regular updating of the smartphone software was, is and remains the most reliable measure of its protection. We recommend that you enable automatic updating of the OS and applications.
- Use biometric passwords. And again: these are some of the most reliable authentication methods for mobile devices. You can protect your smartphone by setting the input or unlocking the screen with a fingerprint, if possible. There is no, then at least use a password.
- Turn off Wi-Fi and Bluetooth more often. Yes, if you are using a smartphone, then leave these networks turned on. But if you, say, went to bed or went offline, then the included Wi-Fi and Bluetooth may interest hackers. We recommend that you disconnect these networks while you are not using your smartphone. This will make your device less visible.
- Take a look at the encryption settings. Smartphone factory settings and basic application settings may not be powerful enough. If your device is not encrypted by default, enable this option. Also, configure access rights of various applications to your data.
With these measures, you protect your smartphone both from students and from potential hackers that you may encounter anywhere if you have a smartphone or tablet with you.
Personal privacy and impeccable online reputation
You don’t discuss your relations, political views and the latest news from the life of idols with your students, right? But if you have not configured access to your accounts on social networks accordingly, then students will easily have access to this information.
Most teachers would like students to not have access to their social media accounts, not to mention the more private aspects of their personal lives – and for good reason. According to an article published in Inc magazine. “Confidentiality means a lot to Generation Z. They are very cautious and careful about their online reputation.” Since important for students their online reputation, do not even hesitate – for you they too will watch.
You are a teacher, and therefore you should strictly control everything that your students can find about you on the Web. If they learn that you recently experienced a breakup, or see your photos from some kind of concentration, or read some of your ambiguous statements, they may stop feeling comfortable in the same class with you or even doubt your authority. And you perfectly understand how important it is to remain the authority for students.
Many teachers are even ready to completely remove everything that they posted on the Internet about themselves, but this is not necessary. In the end, you also need Internet access – to chat with friends, express yourself, upload photos and so on.
To protect your personal information from students (and everyone else you don’t trust), you need to correctly hide your online presence.
To protect your online reputation, we recommend using the following methods recommended by our experts:
- Look for information about yourself in search engines. Everything that you can find through Google and other systems, your students will also find. This method will allow you to find everything that is about you and you on the Web. Then you can find the source and delete the data from there so that your students or someone else no longer has access to them.
- Change your privacy settings. Many default accounts … are not private enough. If you want to protect your data from students, then make all posts, tweets and other content on social networks private, visible only to you or your subscribers. So your students will be much more difficult to find something about you.
- Delete or disable accounts that you don’t use. If you have an old account on some social network that you have not used for a long time, then delete or disable it. So no one will hack it and will not write something on your behalf. If you would like to leave old accounts, then transfer them to private mode.
These tips will help you enjoy all the benefits of social networks and not be afraid at the same time for your online reputation.
Internet in the classroom
You and your students will be online even at school, so being able to defend yourself against online threats is doubly important. Next, we will tell you more about this.
Is your school network safe?
School LAN is likely to become the main way to access the Internet for you and your students. With its help, you can block access to unwanted sites and improve the cyber defence of the school. Alas, like any other school LAN is vulnerable to crackers, which could put you and your students at risk.
Again, students can circumvent network restrictions in a variety of ways and gain access to blocked sites. As you can learn more from our article, there are VPN networks, proxy services, and portable browsers at the students’ service. All of these tools allow you to bypass locks and download unwanted online content while studying – right in your classroom! This can be dangerous both for themselves and for the educational process.
Now you know that students can bypass school network access locks. Therefore, it is time to join forces with specialists and prevent them from doing this. It also makes sense to keep an eye on unwanted online content that students can bring to your classroom on their devices.
if your school’s network is not password protected, it is even more vulnerable and open to hackers who are ready to crack any public Wi-Fi access point for the sake of the personal data of its users and access to their devices. This puts you, students and school leaders at risk of cyberattacks.
Note that in September 2018, the FBI issued a special warning in connection with the fact that schools are increasingly becoming victims of cybercrime. The FBI said that school databases with confidential information “could be a unique opportunity for hackers … for social engineering, bullying, tracking, identity theft and other crimes against children.”
Of course, if your school LAN is not properly protected, then everyone is under attack – both you and the students. And if the network of your school is also open, then contact system administrators and specialists to secure it.
We recommend that you set a password to connect to the school Wi-Fi network and change it every three months. It also does not hurt to use the services of a specialist in the field of cyber defence to establish additional measures of protection against hackers.
Cyberbullying threat (Internet bullying)
Kids Health also adds that “sometimes it’s not difficult to find Internet harassment,” especially when it comes to “offensive, cruel or rude text, a tweet, or a response to a new status on a social network”. However, Kids’ specialists separately note that “sometimes cyber bullying takes more inconspicuous forms: for example, various materials are posted on behalf of the victim on the Internet; it’s also possible that someone is posting online content designed to ridicule or humiliate another person. ”
Unfortunately, in many schools, cyberbullying has taken on the scale of a real epidemic. According to a Pew Research Center study published in September 2018, 59% of teens in the U.S. experienced bullying or online bullying. Scientists also found that about 90% of adolescents believe that online bullying is a problem for people of their age.
As you can guess, cyberbullying can have a devastating effect on the development of children and adolescents, even in the long term. Like other forms of bullying, cyberbullying has very real consequences that worsen the victim’s quality of life: children may experience depression, anxiety, and low self-esteem.
They may also begin to skip school, which will prevent you from teaching them everything you need to succeed in adulthood.
As a teacher, you must pay attention to suspicious situations. Of course, it can be quite difficult to detect the fact of bullying and find the best way to solve the problem, especially when it comes to cyberbullying through some website, forum or messenger that is not available to you. However, you must know how to prevent a problem with your class – you must protect your students.
A Brief Dictionary of Cyberbullying
If you want to protect your students from online bullying in your class, then learn a few new words, namely:
- Trolling: the intentional publication of provocative and abusive messages on sensitive topics (racism, sexism) to provoke a violent reaction. The Merriam-Webster dictionary defines the verb “troll” as “provoking a hostile reaction in an online environment through the intentional publication of controversial, off-topic or offensive comments and other provocative content.”
- Flaming: sending provocative messages to spark a dispute. In Lifewire, flaming was defined as follows: “This is insult, obscurantism, the transition to personality and other verbal aggression aimed at a specific person.”
- Harassment: actions directed against a specific person or group of people, aimed at scaring or upsetting them. Harassment can flow into cyberstalking.
- Cyberstalking: Cyberbullying Research Center defines this activity as “using modern technologies (usually the Internet!) To intimidate someone or undermine this person’s confidence in their security … Cyberstalking can manifest itself in the form of tracking the victim’s public and personal information and using this data for intimidation, sending hundreds of messages during the day with disturbing text (for example, “I am watching you”), constantly monitoring the victim’s accounts on social networks (for example, to find outlet the mango and come there, even if without an invitation), as well as the constant publication of a large number of records dedicated to this person (without his / her permission). ” In many countries, cyberstalking is a crime.
theft of the victim’s online profile or the creation of fake profiles to establish online relationships with third parties. This form of cyberbullying is also used to spy on children, adolescents, and (sometimes) adults, as well as to manipulate or humiliate them.
- Frapping: gaining access to the victim’s online profile to publish inappropriate content or impersonating a victim. This is a serious crime – well, Business Insider reports that in Ireland they can be sentenced to 10 years in prison for fraud.
- Briefing: abuses designed to make people angry about online games. Dictionary Oxford Dictionaries defines a “gripper” as someone who “deliberately provokes or harasses other players or community members intending to ruin their enjoyment of the game.”
- Outing: public publication of private and confidential information (photos, videos, texts) of the victim. The consequences of outsourcing can be the most serious, especially for children and adolescents who can react far from compassionately.
- Squashing: online persecution of the victim by an individual or, as a rule, a group of persons until the victim, as they say, “breaks down”. In The Bark Blog so explain this phenomenon: “the term originated in the comic performances, where comedian kindly ridicules another person, but in this case, we are talking about a situation where man ridicule against his will.” The fact that sometimes begins with an innocent friendly joke does not always end with it.
If you notice that your students are discussing something from this list (both speaking to themselves and their classmates), then be especially vigilant. Discuss online bullying with your students to help protect them from danger.
How to understand if a student is a victim of online bullying
Perhaps you have never heard your students discuss the topic of cyberbullying. But this does not mean that you will not be able to notice that something is wrong with one of them! Children and adolescents who are victims of cyberbullying often exhibit the same symptoms that are common with victims of ordinary bullying.
Here is a shortlist of these warning signs:
- The child/teenager seems more lonely or isolated from others. Faced with online bullying, children often distance themselves from friends and begin to think that they cannot trust anyone.
- Unexpected or sudden problems with friends. Sometimes the child/teenager’s friends themselves begin to engage in cyberbullying. Of course, in such a situation, your student/student will no longer want to spend time with them.
- Unexpected changes in the emotional background. These include feelings of emptiness, anxiety, sadness and anger.
- A child/teenager is unusually often upset, including for unexpected reasons. Unbalancing a student who has been the victim of online bullying can do anything. It may also be due to the actions of other students reminding the victim of what is happening or happened on the Web.
- Deterioration in academic performance. Students who become victims of online bullying have difficulty concentrating on their studies (as a result of fear, anxiety, and stress), which is why their grades begin to deteriorate.
- Pupils begin to be distracted in the classroom or not pay attention to the teacher. The victims of cyberbullying are immersed in themselves – in their fear and excitement, and therefore pay much less attention and energy to working in the lesson.
- Frequent absenteeism. If one of your students encounters online bullying from classmates, they may start skipping classes to avoid contact with them.
- Loss of interest in extracurricular activities. Children and adolescents who are victims of cyberbullying can declare their desire to leave all their circles and sections if only to stay away from their pursuers. They may also begin to show less interest in extracurricular activities due to shame, modesty, or fear of re-encountering bullying.
- Pupils begin to suffer from increasing problems with self-esteem. Children and adolescents who are victims of online bullying feel less and less confident, as they can begin to believe in everything negative that is said about them.
- Deterioration of physical well-being. Emotional and mental stress caused by cyberbullying can also cause physical deterioration.
If, after reading this list, you thought about one of your students, you need to discuss with him or her the topic of cyberbullying. The sooner you step in and put an end to the problem, the better it will be for everyone.
Learning as a way to solve a problem
One of the best ways to prevent cyberbullying is to tell students about this phenomenon. You can teach how to avoid cyberbullying, explain when it is necessary to inform adults about certain online activities, as well as about the reasons why such activity cannot be maintained.
Your students may be advanced computer users, but this does not mean that they fully understand the dangers of the Internet.
Students can create a profile in any social network in a matter of seconds, but they do not know how to defend themselves from catfishers. They know how to win online games, but they don’t know how easy it will be for a hacker to steal their passwords from accounts. They can know how to choose a password for their friends’ accounts on social networks, but they don’t realize how unpleasant their actions can be.
An article was published in Forbes magazine, the author of which voiced the following thesis: “Just as we teach children how to use a bicycle lock, parents and teachers should teach children how to password-protect their phones and other devices. Children should know that something in life must remain a secret ”(for example, their passwords from devices and accounts).
Next, we highlighted several points that your students should also be aware of in the context of cybersecurity.
Public Wi-Fi Access Points Precautions
We are all drawn to free, and free public Wi-Fi hotspots can be especially tempting for students who would like to save mobile traffic.
Alas, such access points are especially vulnerable to hackers who especially closely monitor such networks in the hope of stealing personal data and passwords of users connected to it. You can help secure the school LAN by inviting you to enter a password to connect to it and preventing students from using various methods to bypass access locks.
However, you also need to tell your children about all the risks associated with connecting to public Wi-Fi access points outside of school. Since your students are probably almost always connected to the Network, this means that they actively use such access points in cafes, restaurants, shops and other places.
Yes, this is convenient, but we must not forget that there are many reasons to refrain from using public Wi-Fi access points. In this context, you can recall malware, worms, unencrypted sites and much more.
It’s good that you can tell your students how to defend themselves against all this, namely:
- You must connect to sites via the HTTPS protocol. As Wired correctly noted, “when you work through the HTTPS protocol, other users of your Wi-Fi network cannot access the data that you are exchanging with the remote server. But what about HTTP? In this case, finding out everything you do is not difficult. ” Your students should pay particular attention to connecting only to sites whose address starts with HTTPS (remember simply: “S” is like in the word “Safe”).
You must remove the device from the data exchange mode.
- Students need to turn off the appropriate mode on their devices before connecting to public Wi-Fi access points. According to material published in Wired, “when connecting to a public access point that strangers use, you should turn off the data exchange model.” Yes, the model is useful, with its help it is easier to exchange photos, pictures and other content, but in the context of a public access point, it is more dangerous than useful.
- You need to connect to a public Wi-Fi access point only through a VPN (virtual private network, from the English Virtual Private Network). Forbes explains: “If you want to protect yourself from hackers and completely hide your connection, be sure to use the VPN service.” Such a system “protects your data from being intercepted by third parties using encryption that cannot be cracked without the appropriate key.” VPN services will protect your students from hackers monitoring public Wi-Fi access points. It may seem to your students that setting up a VPN connection is too complicated, but it’s quite simple, especially for representatives of the Z generation, who are probably not born with gadgets in their hands. If children need help, let them honor beginner’s guide on how to choose the best VPN service based on your needs.
By telling your students about these key principles, you can help them protect their data while working on public Wi-Fi networks.
There is too much valuable information on your students’ devices to leave it all unprotected. Personal photos, bank card numbers, personal correspondence and much more – that’s what we are talking about. Also, some hackers, cybercriminals and cyber hooligans are, in principle, ready to do anything to bring chaos to the lives of their victims.
Some are convinced that only extremely naive and irresponsible people can be victims of cybercriminals.
However, according to Pacific Standard, Danish researchers found that “the victims of phishing and malware are not much different from other users. The only difference is that the more time people spend on the Web, the higher their chances of facing these threats. ”
Since “teens spend an average of 9 hours a day online” ( Quartz ), they are especially vulnerable to cyber-attacks. Understanding the mechanisms and principles underlying phishing and the spread of malware will help your students protect themselves from these threats.
According to a report by the US Department of Homeland Security, “phishing is an attempt to gain access to the personal data of unsuspecting users by an individual or group of individuals. ” The basis, of course, is deception, that is how the criminal tries to force his victims to reveal their data. That is why “phishing emails are created as similar as possible to letters sent by official organizations or friends .”
After the person opens the letter and decides that he can be trusted, “these emails will try to convince users to click on the corresponding link to a fake site that copies some well-known service. Next, the user will be asked to provide their data – for example, username and password. Of course, this will put them in even greater danger. ” Such sites can also infect user devices with malware (more on this later).
To protect your students, tell them about the signs of phishing attacks, which often include:
- Unfamiliar sources. If the student has never come across any person or company, then there is no reason for him to open the email that came from them and even more so to open attachments.
- Strange email addresses. As scientists from the University of Chicago explain, “all letters from the University, a bank, a medical institution and any other company with which you are connected should come from the mail domain of the organization concerned, and not from some strange and incomprehensible addresses.” For example, you should not trust emails received from
- Here you can be advised to check the email addresses with which normal emails came before and see if they match.
- Messages sent to multiple recipients. An e-mail should have only one addressee – the student/student himself, and not the “hidden recipient” and not a large group of unfamiliar recipients – so, again, scientists from the University of Chicago advise. Also, you need to be careful with letters where recipients are not addressed by name – for example, just “Hello!” ( CNET ).
- Messages with grammar and spelling errors. A person who is trying to trick you into revealing your data may well write with errors. In turn, a normal organization is unlikely to send you error messages (professionals work in the same place).
Requirements to provide personal information or send money.
- Typically, phishers want to access the confidential information of their victims and their money. Students need to be especially careful in all cases when it comes to transmitting personal information, even when the email looks completely safe.
- Excessively advantageous and attractive offers. The University of Chicago also advises “to beware of emails like” You won the lottery “,” You inherited millions of dollars “and so on.” Let your students know that if something seems too unbelievable, unlikely and seductive, then most likely they are trying to deceive them.
- Strange attachments. Your students should remember once and for all that, they cannot open attached files if they seem redundant or not related to the subject of the letter. You can open attachments with familiar files – Word text documents, Excel spreadsheets, PowerPoint presentations, and PDF files. In turn, open files with the extension .pif, .scr or.exe. not worth it – scammers can disguise malware as them.
If an email can be attributed to any of these categories, students should contact their parents, guardians, or teachers before replying to it. The Ministry of Homeland Security advises “checking [requests] by contacting the appropriate company directly.” Students should only open attachments from email if they are 100% sure that the email was received from a reliable source.
Since anyone can be a victim of phishing, tell your colleagues and administrators about the threats associated with this phenomenon. Again, if the data of one of the school employees fall into the hands of criminals, everyone can suffer – including students.
Malicious software and phishing go hand in hand. Fraudsters often resort to phishing to install malware on the computers of their victims, but infection can occur in other ways.
Malicious software is a collective term that describes all dangerous programs, including ransomware, viruses, rootkits, worms, adware, spyware, and much more. Malicious software disrupts the device, slowing it down and making it less secure. With the help of such programs, you can steal user data, gain control of the device or install additional dangerous applications.
Malicious software can destroy a device or make working with it extremely difficult. Such programs can steal sensitive user data and lead to more than a significant slowdown in the speed of the device.
In addition to phishing email attachments, malware can also be installed by downloading files like “screensavers, toolbars, or torrents from an unreliable source without checking them with an antivirus” ( How to Geek ). Interaction with pop-ups can also lead to a malware infection on the device.
Dangerous programs can be downloaded complete with supposedly reliable applications. As the authors of How to Geek explain, “the creators of the popular software think about sales and therefore add“ optional ”additional software that no one needs on their own” to “profit from the deception of trusting users who are poorly versed in computer technology”.
Accordingly, you need to look carefully and not be afraid to find out what exactly is installed on the device.
Microsoft Windows Security Support: “Infected removable drives can also cause malware infections.” The article says that “ many worm viruses spread by infecting removable USB drives and external hard drives .” Malicious software may automatically install on your device when you connect infected media. Some computer worms can spread by infecting PCs connected to the same local network. Students, respectively, should not use flash drives, disks, or local area networks, which they do not trust 100%.
Illegal downloading of programs, music, and movies also puts user devices at risk of malware infection ( Computer Hope ). That’s because “these files and programs (sometimes) contain not only the necessary content but also viruses, including trojan, as well as spyware and malware.”
Unfortunately, once on a user’s device, malware can begin to actively create copies of itself and even install other dangerous programs. As a result, the risk of infection becomes exponentially higher.
Students should also be aware that personal computers and devices running Android OS (unlike Apple devices) are more vulnerable to malware, as are devices without installed anti-virus protection.
Here’s what students need to tell to teach them how to defend themselves against malware:
- It is necessary to use security programs. As explained in the How to Geek article, students may accidentally “allow malware, spyware, junk, and other software to get onto the computer” if they “do not use high-quality antivirus or anti-spyware software.” These programs can protect against malware, so remind your students of the need to use antiviruses on all devices – both computers and tablets, laptops and smartphones.
- You need to block pop-ups and banner ads. The US Federal Trade Commission advises “use an ad blocker and not click on suspicious links and pop-ups.” Children may not be aware of this, so you need to explain to them that you can’t click on ads.
- You should update your devices. Software developers and technology companies are actively fighting malware and other cybersecurity threats. If you do not regularly update your device, then once obsolete programs can become more dangerous than malware. The US Federal Trade Commission recommends “enable automatic updating of the OS and browsers.”
- It is important to pay particular attention to signs specific to the installed malware. The sooner students can understand that their device is infected, the better. The infected device can be described as follows: “it works slowly, the battery runs out quickly, unexpected errors often occur, the device cannot be turned off or restarted, advertising banners appear everywhere, advertising pages open that users have never visited, the browser homepage changes, new ones appear without permission icons or toolbars. ” If students notice any of these symptoms, they should turn off the device as soon as possible and take it to specialists.
- It is advisable to use browsers with advanced security settings. According to PC Mag, Chrome and Firefox may warn users that the site they are about to go to is not secure enough.
- Finally, special care must be taken not to fall prey to phishing attacks. Use the tips above to teach students how to protect themselves from phishing and malware (these threats often go hand in hand).
If your students know all this, then they can protect themselves from really big problems.
Cybersecurity and the Internet of Things
In the digital age, not only smartphones, tablets and laptops can connect to the Internet: many other devices, including watches and even toys, can also be connected to the Network. As noted in CNBC, “The Internet of Things (IoT for professionals) is when everyday objects are connected to the Internet and exchange data with each other. For example, imagine cars or appliances connected to the Web. ”
Fridge checking your email? A watch that watches your heart rate and transfers this data to your smartphone? Convenient, very convenient! That’s just everything that is connected to the Internet can be dangerous. Many cyber threat protection measures available for smartphones, tablets, and computers are not available as such in the context of the Internet of Things.
At the end of 2018, information systems security specialist Haiyan Song told CNBC that “next year we are likely to face even more problems related to the security of Internet-connected devices.” He added that this new technology “has truly changed our lifestyle: if you have such devices, then you are on the lookout .”
Many cyber threats,
familiar to conventional digital devices with the ability to access the Web, are relevant for the Internet of things. Hackers can access and use confidential information to steal or trick other data, as well as to harass the victim. Since the Internet of things is a relatively new phenomenon, the usual precautionary measures have not yet been implemented for it, and therefore fitness trackers or fashionable toys of your students can become easy prey for attackers.
For example, a report from the InfoSec Institute reports on “cute soft toys from the Cloudpets line …” that “allow children and parents to exchange voice messages over the Internet.” It turned out that “the CloudPets development company has leaked data to more than 2 million of its customers, including their data and passwords .” Separately, “weak protection of user data” and “lack of password complexity requirements ” were noted.
InfoSec Institute experts also shared the following interesting fact: “Mnemonic, a cybersecurity company, was hired by the Norwegian Consumer Council to test the safety of various smartwatch models for children. The audit revealed that several models have critical security vulnerabilities. ”
Of course, these are amusing and fashionable devices, but it turned out that they “do not ask permission to distribute and process data, while demonstrating a complete lack of respect for confidential data, including location data.” It was also found that ” some watch models are in principle not equipped with data protection tools (for example, encryption) of users.”
You can protect your students from the threats associated with the Internet of things with the following tips:
- Create more complex and long passwords. Hacking them is much harder than the completely unreliable three-character Cloudpets passwords.
- Before you buy something, carefully study this device. So, the parents of your students should buy devices with the ability to access the Network only if they fully understand and approve of the information protection methods used in them.
- Be sure to change the security settings of devices with the ability to access the Network. As Reuters authors advise, students need to “turn off cameras and microphones until they use them.”
- Do not forget to download updates. As we said earlier, you can protect yourself from cyber threats with regular software updates. According to an article published in Reuters, “if OS updates and other software have been released for your devices, you need to install them – this will have a beneficial effect on the level of your security.”
- Connect to secure networks. Reuters authors advise “to create a separate guest network for IoT devices so that hackers cannot hack your computers and smartphones through them.” To protect data, it is also recommended to use VPN services (virtual private networks). If your students are interested in the possibility of working with a VPN, let them read our rating of the best VPN services.
All of these tips will make the Internet of Things more secure for your students.
Social Networks and Security
Teens spend more and more time on social networks. Therefore, it is extremely important to familiarize students with possible threats and teach them to defend themselves or even to stay away from everything, so that they can be associated with cybersecurity threats in the context of social networks.
Statista reports: “A study in the USA in 2018 showed that 70% of teens (13-17) access social networks several times a day, while in 2012 only 34% did. Even more surprisingly, 16% of adolescents today admit that they almost constantly follow the update feed, and 27% do it at least once an hour. ”
Given these data, we can say for sure: if you work with high school students, then they almost certainly go to social networks while they are at school.
Many teenagers even share details about their personal lives on social networks. Pew Research Center reports that 44% of teenagers post messages about their family on social networks, 34% – about their emotions and feelings, 22% – about their personal lives, 13% – about personal problems, 11% – about religious beliefs, and 9% – about their political views.
Cybercriminals, online stalkers, phishing scammers, and even hackers planning to steal someone’s online identity can take advantage of all this data to the detriment of your students.
For example, if the classmates of a student of yours or a student know that his / her parents are getting a divorce, they can take advantage of this information and, say, start bullying. And if a fraudster wants to get access to the bank card numbers or social security number of a teenager, he will be able to pretend to be a member of one of his favorite music groups and contact him or her on a social network.
As we have already said, for Generation Z, online reputation is one of the most important issues, but this does not mean at all that your students’ social media accounts are impeccable and impeccable. However, some teenagers understand that publishing personal information on the Internet does not end well.
The Pew Research Center also reports that 32% of adolescents remove or restrict “access to their records that may compromise them in the future,” and 29% of adolescents remove or restrict access to “online posts that they would not want to show to their parents”.
Yes, some teenagers think ahead of all that will concern their online reputation. Here are just the data from the Pew Research Center that they are in the minority: 2 out of 3 teenagers do not think about anything like this.
And this is extremely sad since everything that students put on the Internet can affect their future. An article in the US News and World Report, published in 2017, provides interesting and disturbing information: “More than 350 admissions officers from American colleges interviewed the Kaplan Test Prep. It turned out that 35% of the study accounts for applicants on social networks. ”
Similar results were obtained in the CareerBuilder study: “70% of employers use social networks to analyze candidates before hiring, and in 2016 the share of such companies was 60%.”
These data only say that just one tasteless or ambiguous photo or an entry left on emotions can prevent students from entering a chosen university or getting a job in a dream company. You are a teacher, and therefore you can and should advise your students to be more picky about everything that they post on social networks. Teach them to put themselves in the place of other people and ask themselves: “What will outsiders say about this?”
the Pew Research Center has more disturbing data: 42% of teenagers surveyed sometimes or rather often write about where they are and what they do. Lifewire explains how this can be dangerous: “Few people know that location information is also confidential. If attackers find out where you are, they will be able to use this information to the detriment of you. ”
Explain to your students that you should not update your location on social networks in real-time, as this is fraught with various problems with cybersecurity. And this is logical: if the thieves have long been looking at someone’s house, they will only be glad to know that the whole family has flown away to rest and will not interfere with them. An online stalker, in turn, can find out where the student is now, come there and start spoiling his or her life.
Also, geo-tags and geolocation are an ambiguous option. Lifewire: “Most smartphones track their location by default … the photos taken by the smartphone most likely have accurate GPS data (geo-tags) about exactly where the picture was taken.” Your device additionally notes on the photo where it was taken.
then hackers will be able to find out where you are, even if you have limited access to this information. To do this, it will be enough for criminals to study the so-called “meta-image data”. This process is called geolocation: Google, Yelp, and many other applications use it to determine the exact location of students and can (potentially) share this data with third parties.
- Try not to indicate in the descriptions for photos posted on social networks where you are and what you do. It makes no sense to tell your friends or subscribers about where and what you are doing right now.
- Turn off the automatic installation of geo-tags on all your devices. Hackers will not be able to steal metadata about your location if they are not.
- Do not upload photos from a vacation or other trains until you get home. This will complicate the life of thieves and crackers who have their eyes on your property.
You do not have to follow the online activity of your students on social networks. A daily check of all profiles of all students for inappropriate content is not only a very long but also a legally controversial lesson.
Instead, you need to tell them about all the risks associated with social networks. Then the students will be able to make informed decisions on how to ensure their safety when working with relevant services and platforms.
Next, we will talk about various techniques, methods and methods by which we can tell students about cybersecurity.
Strangers from Cyberspace
Be it social networks, messengers, chats, forums or games, but your students will inevitably encounter strangers and, as a result, with all the risks arising from communicating with them.
Alas, not every Internet user is guided by good intentions. Healthfully describes them as follows: “These are predators seeking to make friends with a child. They pretend to be peers or a little older children, trying to gain confidence. Having established contact with the child, the predator will try to transfer communication from the online channel [messenger, forum, social network] to a more private or even personal environment. ”
Any anonymous online dating can be really dangerous if it comes to personal communication. Also, online scammers who engage in theft of bank data or identity theft can target children and adolescents who are more naive and trusting by age.
Reporters for WBTW News (2018) said online criminals can use popular online games (such as Fortnite) to attack or rob young players. It would be appropriate to recall the data of the Crimes Against Children Research Center, according to which “one out of five children aged 10 to 17 years encountered spam messages on the Internet”.
cyberbullies can use these platforms to bully children and adolescents. Healthfully: “Chats are a place where bullies can anonymously and with impunity spoil the lives of their victims.”
Let’s not forget that anonymous users can also use “chat rooms to distribute pornographic links ”. Your students may “click on the link and get to an undesirable site (both intentionally and by mistake).”
Here’s how to protect your students from the dangers associated with it:
- Arrange an open discussion of the various types of online platforms. We advise you to pay particular attention to the potential threats of anonymous online communication by illustrating them with accessible and understandable examples. Explain that you understand how interesting it can be to meet new people online, and emphasize that you first need to think about security. Carefully let the students understand that there are people on the Web who would not mind harming them.
- Say it’s not worth talking to strangers online. Indeed, your students will be much more secure if they only communicate with friends, acquaintances, and other people they know personally and trust on the Web.
- Ask them to never share personal information or photos online. This is universally good advice, but it becomes especially relevant in the format of anonymous communication.
Encourage parents to keep an eye on who their children are talking to online.
- According to WBTW News, “Sheriff Horry County, South Carolina (USA) advises parents to ask their children to“ play [or exchange test messages] where parents can hear them. ” The sheriff also urges parents to “check the children’s phones and their social media accounts.” You can ask parents to monitor the presence of potentially dangerous applications on their smartphones: Kik, Whisper, Yik Yak, Private Photos (Calculator%), Roblox, ChaCha, WeChat, After School, Line, Shush, Snapchat and Line ( Montgomery Advertiser ).
- Tell students that they can always turn to you, their parents, or guardians for help if they encounter something alarming or dangerous on the Internet. Students need to be made aware that they can trust you and their parents/guardians. Explain that helping them is your job, and if they feel in danger while working on the Web, then let them discuss it with you.
- Have your students play Band Runner, an educational game about the rules of secure online communication. There you need to choose a character, collect stars and choose answers to questions about cybersecurity.
These tips will help your students protect themselves from threats that can be encountered in chat rooms, forums, instant messengers, games, social networks and other services and applications where people communicate anonymously with each other.
In the next chapter, we will dwell on how exactly you can tell students about cybersecurity.
Tips and lesson plans for teachers
Technologies are increasingly entering our lives, so we can safely assume that cybersecurity issues will not lose their relevance. You are a teacher, which means that you have a unique opportunity to influence the future generation and teach your students how to react to the corresponding problems.
By telling your students about the rules of safe working on the Internet, you can improve their quality of life, make them happier and more successful. Next, we will tell you how to maximize the effectiveness of telling students about everything they need to know.
Where to begin
We recommend starting with an online safety survey to find out what your students already know. We hope that this survey will interest them and encourage them to independently study the topic of cybersecurity.
Also, the results of the survey will allow you to assess the general level of knowledge of students and prepare an appropriate lesson plan . For example, if students already know how important complex passwords are, then spending time on this topic is not necessary.
We recommend using the following materials:
- Pew Research Center cybersecurity online survey
- The National Child Protection Society online survey on Safe Networking (keep in mind that this survey was created for residents of Britain)
- Online Survey for Children by the Australian Online Security Bureau
As for the lesson plan, we would like to suggest that you approach the issue more broadly:
- Divide the topic into several lessons – this is much more effective than telling about everything at once in one day. So you do not overload the students, which will allow them to better remember the material.
- Have an interactive lesson, do not give a lecture. Students will remember your lessons much better if they are actively involved in them. For example, give them the task of hacking an account on a social network. Of course, first, you need to create a fake record so that no one’s data is affected.
- Address the topic of cybersecurity in other lessons. So the topic will become more relevant and topical. For example, in English classes, you can read phishing emails that managed to fool people. You can highlight typical grammatical errors in them (one of the signs of fraud). Your students can then discuss ways to defend against such attacks.
- Assign students to read the stories of people and organizations who are victims of cyberattacks. This will help your students understand the consequences of cyberattacks, their scope and severity.
Here are a few stories to recommend:
- “Real life stories” [of cyber scams] – Australian Competition & Consumer Commission (selection of articles)
- “These are the victims of a ransomware attack” – CNN Business (video with obscene language)
- “How ransomware hackers ‘prey on people’s willingness to click’” – CBS News (article and video)
- “Cyber Bullies Drove My Daughter to Commit Suicide” – This Morning (suicide video)
- “Emma’s Story: Cyberbullied by a Best Friend” – Common Sense Media (video)
- “Cyberbully: YouTuber ClearlyChloe’s Story” – story booth (video)
- “Stacey’s Story: When Rumors Escalate” – Common Sense Media (video)
- “How Chatting with Strangers Could Ruin a Child’s Life” – Online Sense.org (articles and videos mentioning pedophiles, rape and murder)
- “The hidden danger of high-tech toys” – WCPO.com (video featuring pedophiles)
- “They Loved Your GPA Then They Saw Your Tweets” – New York Times (article)
- “The Untold Story of NotPetya, the Most Devastating Cyberattack in History” – Wired (article with obscene language)
- “Man charged with cyberstalking ex-classmate for more than a decade” – Fox News KTVU (rape and murder article)
“How One Woman’s Digital Life Was Weaponized Against Her” – Wired (an article on cyberstalking and harassment for adults that contains descriptions of a sexual nature, obscene language, discussions about suicide and cruelty)
Provide students with illustrative examples of cyberthreats.
- For example, show them suspicious advertisements, messages, and pop-ups so that students understand exactly what they are talking about and begin to beware of this. This will be especially useful for those students who better absorb new information visually.
- Engage students in class preparation by asking them to share their own experiences, and be sure to keep their stories in mind. For example, if your students already know everything about safe work on social networks, there is no point in wasting time on this. In turn, if they are very interested in the topic of malware, then be sure to take her time.
- Homework should be practical and interactive. Interactive lessons are more effective than regular lectures, and this is a fact. It is also true that interactive homework will allow students to more fully explore the topic of cybersecurity. For example, you can give them the following task: to protect their devices and accounts as much as possible. You can also ask them to write an essay about the dangers of public Wi-Fi access points and describe ways to protect against them.
Using these tips, you can give creative, interesting, and exciting lessons on cybersecurity.
Interaction with Cyber Bullies
Since your students can be both victims and instigators of online bullying, you need to discuss this topic with them in detail. This is very important if only because students who become victims of cyberbullying can keep everything in themselves.
We advise you to make sure your school has a policy of anti-bullying, including online bullying. And if so, then be sure to bring its position to your students and make sure that they fully understand. We advise students to give examples of actions that could be called cyberbullying to make sure that they understood everything.
Then tell students about the consequences of online bullying so that they fully appreciate the seriousness of this phenomenon. It will be useful to show them some videos from the list above. Also, ask class members to imagine how they would feel if they were in the place of victims of online bullying.
Often, students simply don’t see anything wrong with teasing, shaming, or insulting their classmates over the Internet. This means that they have less sympathy for the victims of cyberbullying and, as a result, are more likely to join the bullying. To avoid such a development of events, we must allow them to experience all the consequences of such behavior.
It is also necessary to teach students what to do if they become victims of cyber-bullying, namely:
- Contact an adult they trust. Teachers, parents, adult friends of the family (and so on) – this is who we mean. When an adult understands the situation, he or she will be able to analyze it and help the student find a solution to the problem: for example, hold a meeting between the victim, the bully and their parents.
- Save evidence and evidence of bullying. Screenshots, voice messages, other materials – all this is very useful if it comes to court. Again, with such evidence, a conversation with the parents of a cyberbully can be very substantive.
- Do not answer. As the saying goes, “do not feed the trolls!” Seeing a reaction to their actions, a cyberbully can enter into a rage. Again, any negative reactions can be regarded as counter online bullying.
- Report the fact of online bullying to the administrators of the platform or service. As the authors of WebWise explain, “about the inappropriate use of social networks or about bullying through text messages, you can and should be reported to administrators and providers of the respective platforms and services.”
- Think about how you could protect yourself from cyberbullying in the future. Of course, the victim is not to blame for being poisoned on the Internet. But this does not mean that you should sit back, right? Webwise recommends “giving your child advice on how to prevent future situations like this.” For example, change the password and contact details, block the profile on the social network or report the problem to administrators. ”
Of course, I wish that none of your students ever encountered online bullying. But the world is far from perfect, and these tips will help level out the consequences associated with cyberbullying.
No matter how you approach the lesson plan, we are convinced that the section on safe work on social networks is simply necessary to include. It is understandable: social networks are used most actively, while their protection from cyber threats poses big questions.
In 2018, researchers from the Pew Research Center reported that 85% of teens use YouTube, 72% Instagram, 69% Snapchat, 51% Facebook, 32% Twitter. Only 3% of teenagers do not use popular social networks! Accordingly, 97% of adolescents use them, and how.
As we explained above, social networks can be dangerous for both children and adolescents. Cyberbullies can attack your students on these platforms, scammers can try to steal their sensitive data, and online stalkers will use student records to harass them … And this, of course, is not a complete list of threats.
- Passwords It is extremely important to use strong passwords for all accounts, and especially for accounts on social networks. Why? A lot of private information is stored there, which criminals can use to the detriment of your students. Explain what a truly strong password looks like:
- It has numbers, symbols and letters (it is desirable that there were both lowercase and uppercase letters). If it’s hard for students to come up with the appropriate passwords on their own, let them take advantage of the reliable online password generator, as advised by the Chicago Tribune. By the way, they also advise using passwords “of at least 16 characters.”
- Different accounts must have different passwords. As an example, the authors of the Chicago Tribune cited the following example: “your Twitter password must be different from the password that you use to enter your bank’s account.”
- The password must be changed more often. We advise you to do this once every 3 months.
- No one should know your passwords. Sometimes children and teenagers are actively persuaded by their friends and classmates to name their passwords. It is very dangerous! Remind students that only they need to know their passwords (in extreme cases, also their parents).
- As we already said, this security feature requires users to use two “keys” to enter the application. As a rule, we are talking about a password and a code from a text message sent to the user’s phone. Instead of a code, a biometric password (fingerprint) or the answer to an additional question can also be used. Encourage students to enable two-factor authentication to log in to their social media accounts, and more, as this makes them more reliable.
- Privacy settings. Remind students that the basic privacy settings for social media profiles are no good. Accounts should be kept as confidential as possible! At a minimum, photographs and important data cannot be made publicly available.
- Personal data. Tell students that sharing personal data through social networks is not possible in principle. We are talking about the date of birth, address, full name, bank data and other data.
- Protection against computer viruses. In social networks, it is quite possible to encounter malware, phishing attacks, and online scammers. If your students are actively using the Network, let them install antivirus software on all their devices.
- “Think first, then click.” Today, when cyber fraud can be encountered at every step, students should be especially careful when they see messages on social networks that require some immediate action or the transfer of personal data. Explain that sometimes scammers promise almost golden mountains in exchange for personal data of people.
- As we explained earlier, your students’ online reputation can help or prevent them from going to college or finding a dream job. Again, a lack of a trustworthy online reputation can lead to problems with parents or increased online bullying. As explained on the Stay Safe Online website of the National Cybersecurity Alliance, “everything you put on the Internet stays there forever. Think twice before posting photos [or other content] that you don’t want to show to your parents or future employers. ”
- Report problems to social network administrators. Explain to students that if online bullying has begun against them, then it is necessary to inform authorized employees of online platforms and services as soon as possible. Cyberbullying, harassment and bullying are actions that violate the rules of working with social networks, so they can help you.
- If necessary, seek adult help. If students do not feel confident or feel in danger, then let adults turn for help. Recall that in case of problems they may come to you, their parents and other trusted adults.
Be sure to include all of these key points in your cybersecurity lesson plan.
Sample lesson plan: “Engage in phishing”
The following is a sample lesson plan on cybersecurity in general and phishing in particular. You can use it as a basis for classes.
What is phishing
To begin, show students the following email received from email@example.com :
We are sorry, but your Netflix account has been suspended due to problems with your billing information.
To restore your account and continue browsing, please open the netflixaccountinformation.exe file and enter the following data:
Your full name:
Date of birth:
Bank card number and CVV code:
Please reply to this email if you require our support.
Netflix Customer Service
Ask if students would respond to such a message or not. Ask why they decided so.
After listening to the students’ answers, explain to them that this letter is very similar to the letters that many people received from scammers engaged in online phishing. Define the term “phishing” – this is an attempt to obtain fraudulently the personal data of a person or group of persons. To trick recipients, “phishing emails are made as similar as possible to emails sent by official organizations or friends” (US Department of Homeland Security).
Explain how fraudsters can use these letters to collect personal information of users: to steal an online identity, install malware on victim computers and other illegal actions (including bullying).
Tell students about the characteristic features of a phishing email:
To protect your students, tell them about the typical features and characteristics of phishing emails (more about what we talked about earlier):
- They are obtained from unknown sources.
- Sender email address looks weird
- They are addressed to many people.
- They have the grammar and/or spelling errors
- Also, they have requirements for the transfer of personal data and/or sending money
- Moreover, they talk about extremely profitable and easy ways to make money.
- Weird files attached to them
You and your students can also watch a training video on identifying phishing emails: Spotting Phishing Emails or How to Spot a Scam Email.
Let’s do phishing! Classroom exercise
Now let the students write phishing emails themselves. Let them try to deceive the recipient of the letter and get personal data from him. The recipient, of course, will be you – analyze the work of the students, select the most compelling and read them to the class. Be sure to explain why you think these are good examples of phishing emails.
After completing this exercise, advise students to analyze all of the strange emails from a cyber fraud point of view. If it seems to them that the message is phishing, then let them in no case follow the links and open the attached files.
As homework, you can give the following task: let the students write instructions on how to protect yourself from phishing attacks (5 points will be enough). Then ask them to show this instruction to at least one person (classmate, parent, family friend) and write down the comments of this person.
Other resources and tools for teachers
If you would like to further study this topic and/or find additional sources of inspiration for making lesson plans, we advise you to pay attention to the following materials:
- “Digital Citizenship” by Common Sense Education. On this site, you will find free interactive lesson plans for students of any class.
- “Bits N Bytes Cybersecurity” by Kyla Guru. This is an award-winning cybersecurity website created by a 16-year-old high school student. There you will find a lot of useful things.
- “STOP. Think. CONNECT. ™ ”from the National Cyber Security Alliance and other organizations. On this site, you will find tips, memes, pictures, videos, posters and reports on various aspects of cybersecurity.
- “Digital Safety Resources: Tools for the classroom and home” by Google Be Internet Awesome Project. On this site, you will find lesson plans and educational games dedicated to networking.
- “The 5 Best Internet Safety Resources for Teachers” by E-Learning Industry. This article lists some of the best educational sites on cybersecurity topics and related topics.
- “4 Great Lesson Plans for Internet Safety” by Common Sense Education. Here you will find great lesson plans for students of all ages.
- “Cyber Security for Beginners” by Heimdal Security. This is a free beginner cybersecurity course. It includes self-checking checklists (in PDF format), with which you can evaluate the level of knowledge of your students.
if you want to gamify the topic of cybersecurity, then take part in a school or class competition in programming. The Australian Digital Technologies Hub holds competitions in robotics, programming and more, Grok Learning organizes courses and competitions in programming and development of artificial intelligence systems for students of all levels, and Code Chef does host a unique international programming championship. Search the Internet for similar events in your area.