Lesson 3: Email Cyber Threats - Carnegie Cyber Academy · Lesson 3: Email Cyber Threats ... Carlo...
Transcript of Lesson 3: Email Cyber Threats - Carnegie Cyber Academy · Lesson 3: Email Cyber Threats ... Carlo...
Copyright © 2012 Carnegie Mellon University MySecureCyberspace is a registered trademark of Carnegie Mellon University
Page 11www.carnegiecyberacademy.com
Lesson 3: Email Cyber Threats
Learning Objectives Materials You Will NeedIntroduce new terms related to cyber threats.• Increase students’ knowledge of cyber threats that can • harm a computer and the data stored on it.Emphasize the use of anti-virus software, spam filters, • anti-spyware software and firewall to protect the computers.Enhance students’ motor skills while navigating the game.•
Computers with Carnegie Cadets: The • MySecureCyberspace Game installedWorksheet for Lesson 3: Email Cyber Threats• Hint Sheet 01 (download from • http://www.carnegie cyberacademy.com/documents/hintSheet01.pdf )
Classroom Activities (Duration: 45 minutes)Timeline Teacher Instructions Student Activities
IntroduceConcepts (15 min)
Lead students into the game. Make sure that the • students have already talked to Omni and have a Cyberspace Pass as described in Lesson 1. (3 min)Direct students to the CyberPort and have them • talk to Carlo. Have students tell Carlo they have a Cyberspace Pass so he will unlock the Cyberspace Portal. (6 min)Make sure all students enter Cyberspace. Direct • them to Diagnostics and have them talk to Dr. Keen and take the tour. (6 min)
Start and log in to the game. Open PAL and click • the Inventory tab. Check to see if they have a Cyberspace Pass.Go back to the Atrium, and click on the door to • the “Cyberport.” Click Carlo and talk to him. Tell Carlo you have a Cyberspace Pass so he will unlock the Cyberspace Portal.Enter Cyberspace and click on Diagnostics to enter • the building. Click Dr. Keen and take the tour. Click on the malware to learn about them.
Develop and
Practice (20 min)
Hand out the worksheet and explain about • Malware. Let students attempt quiz #1. (Worksheet, part 1) (5 min) Share the answers to the quiz: Adware (#3), Trojan • (#5), Spyware (#2), Virus (#4) and Worm (#1). Explain the tips for using anti-virus software, anti-spyware software and firewalls to protect your computer. (3 min)Explain what spam is. (Worksheet, part 2) (2 min) • Lead students into the game again. Direct students • to the “Message Center“ and have them ask Trey to start the Level 1 training mission. Let students play the mission until they earn a gold badge. (15 min)
Make sure all students earn a gold badge and • unlock their first ReQuest with Alan.Do not let students proceed to the ReQuest.• Students who finish the mission can shop at the • Academy Store and decorate their room.
Read part 1 of the worksheet, and try quiz #1. If • you need a hint, go back to the Hall of Quarantine in Diagnostics and click on the malware.Check the answers and read the tips. Understand • what anti-virus software, anti-spyware software and firewalls can do.
Leave Diagnostics and click the door of the • Message Center. Talk to Trey and ask to start the Level 1 mission.
Play the mission until you earn a gold badge.• After earning a gold badge, buy items from • the Academy Store and decorate your dorm room.
Reinforce (10 min)
Hand out Hint Sheet 01 to students. Make sure all • students understand what spam is. (Hint Sheet 01) (5 min)
Read Hint Sheet 01.•
Learning OutcomesAt the end of this lesson, students will be able to:
Define the cyber defense terms introduced in this lesson.• Explain how cyber threats introduced in this lesson can destroy data, hardware and software.• Take simple steps to protect a computer and data from cyber threats by using a spam filter and anti-virus software.• Understand how a firewall works and the importance of installing a firewall.• Navigate The MySecureCyberspace Game with ease.• Enhance motor skills while navigating the game software.•
Copyright © 2012 Carnegie Mellon University MySecureCyberspace is a registered trademark of Carnegie Mellon University
Page 12www.carnegiecyberacademy.com
Worksheet 3: Email Cyber Threats
1. What is Malware?
Date: Name:
Malware is a software program that harms your computer. Adware, spyware, viruses, Trojan
horses and worms are all types of malware.
A destructive program that can get into computers or networks and harm them by
deleting, modifying or sending out the data.
A software program that causes advertisements to appear on your computer.
A nasty program disguised as legitimate software.
A software program that secretly tracks what you do on the Internet and sometimes gets
information about you from your computer.
A software program that can wipe out information on your computer and create major
problems.
Doctor Keen, Diagnostics Lab
TechnicianQuiz 1: Match the malware images to their definitions.
Adware
Trojan Horse
Spyware
Virus
Worm
Tip: To protect your computer from malware, install the most recent anti-spyware and anti-virus software. You also need to keep the software up-to-date to stay protected. Check with a trusted adult to see if your software is set up to automatically update itself.
Tip: A Firewall is a software program that protects your computer by acting like a security guard and monitoring and controlling the Internet traffic coming in and out of your computer. Install one and make sure it is always turned on.
2. What is Spam?
The Internet version of “junk mail,” Spam is a message sent to a large number of users, usually
to advertise something or to spread malware.Trey, Message
Center Supervisor
© 2
00
6-2
012
Ca
rne
gie
Me
llon
Uni
ve
rsit
y. A
ll R
ight
s R
ese
rve
d
If
an
em
ail
is f
rom
so
me
one
yo
u d
on’
t kn
ow
and
the
Sub
jec
t is
like
any
of
the
exa
mp
les
be
low
,
it
is p
rob
ab
ly S
pa
m:
It
soun
ds
too
go
od
to
be
tru
e
Se
nde
r: N
otM
CS
pa
mm
er
Sub
jec
t: Y
ou
just
wo
n m
illio
ns!!
It
is a
dv
ert
isin
g s
om
eth
ing
Se
nde
r: J
oe
Sc
hmo
eS
ubje
ct:
Gre
at
De
als
He
re
The
re a
re lo
ts o
f m
issp
elle
d w
ord
s
Se
nde
r: S
unsh
1n3
Sup
ers
t@r
Sub
jec
t: B
rit3
da
ts R
he
er
It
soun
ds
rea
lly s
tra
nge
Se
nde
r: M
oni
ca
Lin
dsa
yS
ubje
ct:
Re
: ma
ngo
jus
tifi
ed
The
em
ail
soun
ds
inte
rest
ing
but
yo
u w
ere
n’t
exp
ec
ting
it
Se
nde
r: b
rouh
aha
Sub
jec
t: W
in a
fre
e g
am
e c
ons
ole
!
Tip
s fo
r I
de
ntif
yin
g S
pa
m E
ma
ilsPe
rso
nal I
nfo
rma
tio
n is
info
rma
tio
n a
bo
ut y
our
OFF
LI
NE
ide
ntit
y t
hat
som
eo
ne c
oul
d u
se t
o
fig
ure
out
who
or
whe
re y
ou
are
, su
ch
as:
Wha
t sc
hoo
l yo
u g
o t
o
Your
te
ac
hers
’ na
me
s
Cre
dit
Ca
rd n
umb
ers
Lic
ens
e p
late
num
be
rs
Na
me
of
tea
m y
ou
pla
y f
or
Your
num
be
r o
n y
our
te
am
Pla
ce
s ne
ar
yo
ur h
ous
e,
like
st
ore
s, r
est
aur
ant
s, o
r p
ark
s
Pla
ce
s y
ou
vis
it r
eg
ula
rly
If
yo
u a
re h
om
e a
lone
Whe
n y
ou
are
go
ing
to
be
ho
me
alo
ne
Your
ful
l na
me
Your
Use
r na
me
or
Pass
wo
rd
Your
ag
e
Your
ID
num
be
r o
r S
oc
ial
Se
cur
ity
Num
be
r
Your
em
ail
ad
dre
ss
Your
ho
me
ad
dre
ss
Your
pho
ne n
umb
er
Wha
t c
ity
yo
u liv
e in
Wha
t ne
ighb
orh
oo
d y
ou
live
in
Your
pa
rent
s’ n
am
es
Whe
re y
our
pa
rent
s w
ork
Na
me
s o
r p
hone
num
be
rs o
f fa
mily
me
mb
ers
and
fri
end
s
Exa
mp
les
of
Pers
ona
l Inf
orm
ati
on
So
me
we
bsi
tes
co
nta
in D
ang
ers
tha
t c
an
da
ma
ge
yo
ur c
om
put
er
or
ste
al y
our
pe
rso
nal
info
rma
tio
n. W
hen
yo
u a
re e
xplo
ring
we
bsi
tes,
wa
tch
out
fo
r th
e f
ollo
win
g 4
Da
nge
rs:
Tip
s fo
r re
co
gni
zin
g W
eb
site
Da
nge
rs
Lin
ks t
hat
do
wnl
oa
d f
iles
Form
s th
at
ask
fo
r Pe
rso
nal
Inf
orm
ati
on
Ad
ve
rtis
em
ent
s a
nd P
op
ups
Thr
ea
teni
ng,
hurt
ful,
or
ad
ults
-o
nly
co
nte
nt
The
se li
nks
usua
lly a
sk if
yo
u w
ant
to
sa
ve
or
op
en
the
file
whe
n y
ou
clic
k o
n th
em
and
ca
n sa
y
som
eth
ing
like
“C
lick
to D
ow
nlo
ad
” o
r “D
ow
nlo
ad
No
w”
Ad
ve
rtis
em
ent
s ha
ve
co
nte
nt t
hat
is d
iffe
rent
tha
n th
e w
eb
site
the
y
are
on
(lik
e a
ca
r A
d o
n a
we
bsi
te
ab
out
pup
pie
s),
and
so
me
tim
es
the
y s
ay
“A
d”
or
“Ad
ve
rtis
em
ent
” o
n th
em
Form
s c
an
be
a D
ang
er
if t
hey
ask
fo
r p
ers
ona
l inf
orm
ati
on
like
yo
ur
full
nam
e o
r c
red
it c
ard
num
be
r
Co
nte
nt c
an
be
a D
ang
er
if it
m
ake
s y
ou
fee
l ic
ky o
r un
co
mfo
rta
ble
or
say
s A
dul
ts-
onl
y
or
“Yo
u m
ust
be
18
or
old
er”
on
it
Tip
s fo
r D
ea
ling
wit
h C
yb
er
Bul
lyin
gC
yb
er
bul
lyin
g is
usi
ng t
he I
nte
rne
t to
thr
ea
ten,
em
ba
rra
ss,
pic
k o
n, o
r p
ut-
do
wn
pe
op
le. T
hey
ca
n m
ake
yo
u p
rett
y m
ise
rab
le,
so if
yo
u e
ve
r ru
n in
to a
cy
be
r b
ully
, re
me
mb
er
the
se t
ips:
Whe
n a
Bul
ly a
tta
cks
, fi
rst
try
to
igno
re o
r b
loc
k th
em
.
If
the
att
ac
ks b
ec
om
e o
ve
rwhe
lmin
g o
r sc
ary
, y
ou
sho
uld
pro
ba
bly
let
a t
rust
ed
ad
ult
kno
w
ab
out
it.
The
Bul
ly is
pro
ba
bly
try
ing
to
pic
k a
fig
ht. I
f y
ou
ca
n la
ugh
it o
ff in
ste
ad
of
rea
cti
ng o
r
fig
htin
g b
ac
k, t
he B
ully
do
esn
’t g
et
wha
t th
ey
wa
nt.
Talk
wit
h y
our
tru
ste
d a
dul
t a
bo
ut s
tra
teg
ies
to d
ea
l wit
h th
e b
ully
ing
and
co
me
up
wit
h a
pla
n to
ge
the
r.
Be
pre
pa
red
to
re
po
rt t
he b
ully
.
Be
a g
oo
d c
yb
er
cit
ize
n a
nd h
elp
pre
ve
nt c
yb
er
bul
lyin
g.
Sa
ve
any
ev
ide
nce
of
the
bul
lyin
g,
suc
h a
s e
ma
il a
nd in
sta
nt m
ess
ag
es
and
sc
ree
nsho
ts o
f
we
b p
ag
es.
Se
e H
int
She
et
05
fo
r in
form
ati
on
on
how
to
re
po
rt c
yb
er
bul
lyin
g.
If
yo
u w
itne
ss c
yb
er
bul
lyin
g,
try
to
do
so
me
thin
g f
rie
ndly
to
he
lp t
he v
icti
m,
so t
hey
do
n't
fee
l
alo
ne. D
on'
t jo
in in
and
ma
ke t
hing
s w
ors
e.
Pro
tec
t y
our
self
fro
m c
yb
er
bul
lyin
g a
s m
uch
as
po
ssib
le.
Ma
ke s
ure
tha
t y
ou
wo
n’t
be
an
ea
sy t
arg
et
for
cy
be
r b
ullie
s. D
on’
t sh
are
yo
ur p
ers
ona
l
info
rma
tio
n in
Cy
be
rsp
ac
e,
esp
ec
ially
pho
tos
and
vid
eo
s, a
nd d
on’
t tr
y t
o p
ick
fig
hts
wit
h
oth
er
pe
op
le.
Tip
s fo
r R
ep
ort
ing
Cy
be
r B
ully
ing
Cy
be
r b
ully
ing
is u
sing
the
Int
ern
et
to t
hre
ate
n, e
mb
arr
ass
, p
ick
on,
or
put
-d
ow
n p
eo
ple
. R
em
em
be
r to
sa
ve
ev
ide
nce
of
cy
be
r b
ully
ing
. He
re’s
so
me
tip
s fo
r d
ec
idin
g w
hom
to
re
po
rt
cy
be
r b
ully
ing
to
:
Co
nta
ct
the
we
bm
ast
er,
site
ow
ner,
or
cus
tom
er
serv
ice
and
re
que
st t
hat
the
off
ens
ive
m
ate
ria
ls b
e r
em
ov
ed
. If
tha
t d
oe
sn’t
wo
rk,
co
nta
ct
the
We
b s
ite
ho
st a
nd a
sk t
hem
to
pul
l d
ow
n th
e s
ite
if it
vio
late
s th
e t
erm
s o
f a
gre
em
ent
.
Co
nta
ct
the
bul
ly’s
IS
P t
o s
ee
if it
qua
lifie
s a
s a
bus
e. T
hey
ma
y s
end
a w
arn
ing
or
susp
end
the
us
er’
s a
cc
oun
t. C
ont
ac
t y
our
ow
n I
SP
fo
r he
lp w
ith
blo
cki
ng a
n a
cc
oun
t.
Co
nta
ct
the
pho
ne s
erv
ice
pro
vid
er
- m
ost
ca
lls c
an
be
tra
ce
d a
nd t
hey
ma
y b
e a
ble
to
blo
ck
the
ca
lls o
r le
t y
ou
kno
w w
here
the
y a
re c
om
ing
fro
m s
o y
ou
ca
n re
po
rt t
he a
bus
e.
Co
nta
ct
the
sc
hoo
l Pri
ncip
al o
r C
oun
selo
r. I
f th
e c
yb
erb
ully
ing
ha
pp
ens
at
scho
ol o
r is
a
ffe
cti
ng t
he s
cho
ol e
nvir
onm
ent
the
y m
ay
be
ab
le t
o in
terv
ene
. If
the
sc
hoo
l do
es
not
hav
e a
c
yb
er
bul
lyin
g p
olic
y, a
sk t
hem
to
cre
ate
one
.
If
the
bul
ly g
oe
s to
sc
hoo
l wit
h y
our
chi
ld...
If
the
bul
lyin
g h
ap
pe
ns t
hro
ugh
a c
ell
pho
ne...
If
the
bul
lyin
g h
ap
pe
ns t
hro
ugh
a W
eb
sit
e...
If
the
bul
lyin
g h
ap
pe
ns t
hro
ugh
Em
ail
or
Ins
tant
Me
ssa
ge
...
If
the
re is
the
thr
ea
t o
f p
hysi
ca
l da
nge
r...
Co
nta
ct
the
loc
al l
aw
enf
orc
em
ent
if t
here
is t
he t
hre
at
of
phy
sic
al h
arm
. The
y m
ay
als
o h
av
e a
sp
ec
ial c
yb
er
cri
me
s un
it t
hat
ca
n in
ve
stig
ate
.
Ne
tiq
uett
e T
ips
Ne
tiq
uett
e is
the
eti
que
tte
of
the
Int
ern
et,
sim
ple
rul
es
for
how
yo
u sh
oul
d a
ct
in
Cy
be
rsp
ac
e t
hat
kee
p t
hing
s p
olit
e a
nd h
elp
ev
ery
one
ge
t a
long
. He
re’s
so
me
tip
s fo
r b
ein
g
a g
oo
d C
yb
er
Cit
ize
n a
nd p
rac
tic
ing
go
od
Ne
tiq
uett
e:
Che
ck
for
typ
os
or
oth
er
mis
take
s b
efo
re y
ou
po
st o
r se
nd a
me
ssa
ge
. Use
e
mo
tic
ons
like
;)
and
ac
rony
ms
like
LO
L t
o g
et
yo
ur m
ess
ag
e a
cro
ss in
the
rig
ht
spir
it.
Av
oid
usi
ng A
LL
CA
PS
, it
me
ans
yo
u a
re s
hout
ing
.
Alw
ay
s a
sk p
erm
issi
on
be
fore
po
stin
g a
bo
ut s
om
eo
ne o
r sh
ari
ng a
n e
ma
il, p
hoto
, o
r c
hat
co
nve
rsa
tio
n, a
nd m
ake
sur
e t
hat
it d
oe
s no
t c
ont
ain
any
pe
rso
nal i
nfo
rma
tio
n.
Ke
ep
me
ssa
ge
s sh
ort
, p
olit
e,
and
to
the
po
int.
Do
n't
spa
m p
eo
ple
wit
h m
ulti
ple
m
ess
ag
es
or
wa
ste
the
ir t
ime
. Try
no
t to
use
to
o m
uch
cha
t sl
ang
if y
ou
thin
k th
e
oth
er
pe
rso
n w
on'
t un
de
rsta
nd it
.
Be
a C
ham
pio
n, n
ot
a C
hum
p
Be
po
lite
and
re
spe
ctf
ul o
f o
the
rs
Pay
Att
ent
ion
to F
orm
at
Ask
Be
fore
yo
u Po
st
Be
he
lpfu
l and
co
urte
ous
to
oth
ers
and
do
n't
be
a c
yb
er
bul
ly. I
f so
me
one
is b
ein
g
rud
e t
o y
ou,
be
the
be
tte
r p
ers
on.
Ta
lk t
o a
tru
ste
d a
dul
t, b
loc
k th
em
, o
r si
mp
ly
wa
lk a
wa
y. I
f th
ey
are
bul
lyin
g s
om
eo
ne e
lse
, d
on’
t jo
in in
and
ma
ke it
wo
rse
. Be
su
pp
ort
ive
and
po
siti
ve
and
try
to
he
lp t
he v
icti
m if
yo
u c
an.
Tip
s fo
r G
row
ing
a P
osi
tiv
e O
nlin
e R
ep
uta
tio
nYo
ur o
nlin
e r
ep
uta
tio
n c
an
be
po
siti
ve
or
neg
ati
ve
, it
all
de
pe
nds
on
how
yo
u b
eha
ve
whe
n y
ou'
re in
cy
be
rsp
ac
e a
nd w
hat
oth
er
pe
op
le s
ay
ab
out
yo
u.
Do
sha
re t
hing
s th
at
wo
uld
imp
rove
yo
ur r
ep
uta
tio
n a
s a
g
oo
d s
tud
ent
, a
go
od
fri
end
, a
nd a
te
am
pla
ye
r
Do
n’t
sha
re t
hing
s th
at
wo
uld
da
ma
ge
yo
ur r
ep
uta
tio
n a
s a
g
oo
d f
rie
nd a
nd a
re
spe
cta
ble
and
tru
stw
ort
hy p
ers
on
Do
n’t
sha
re t
hing
s th
at
will
ma
ke y
ou
a t
arg
et
for
we
ird
o
stra
nge
rs o
r b
ullie
s
Be
ca
refu
l ab
out
who
m y
ou
trust
wit
h y
our
re
put
ati
on
whe
n y
ou
ad
d t
hem
to
yo
ur f
rie
nds
and
sha
re t
hing
s w
ith
the
m
Be
on
the
lo
oko
ut
for
oth
ers
da
ma
gin
g y
our
re
put
ati
on
and
a
ct
quic
kly
to
min
imiz
e t
he d
am
ag
e