Lesson 3: Email Cyber Threats - Carnegie Cyber Academy · Lesson 3: Email Cyber Threats ... Carlo...

3
Copyright © 2012 Carnegie Mellon University MySecureCyberspace is a registered trademark of Carnegie Mellon University Page 11 www.carnegiecyberacademy.com Lesson 3: Email Cyber Threats Learning Objectives Materials You Will Need Introduce new terms related to cyber threats. Increase students’ knowledge of cyber threats that can harm a computer and the data stored on it. Emphasize the use of anti-virus software, spam filters, anti-spyware software and firewall to protect the computers. Enhance students’ motor skills while navigating the game. Computers with Carnegie Cadets: The MySecureCyberspace Game installed Worksheet for Lesson 3: Email Cyber Threats Hint Sheet 01 (download from http://www.carnegie cyberacademy.com/documents/hintSheet01.pdf ) Classroom Activities (Duration: 45 minutes) Timeline Teacher Instructions Student Activities Introduce Concepts (15 min) Lead students into the game. Make sure that the students have already talked to Omni and have a Cyberspace Pass as described in Lesson 1. (3 min) Direct students to the CyberPort and have them talk to Carlo. Have students tell Carlo they have a Cyberspace Pass so he will unlock the Cyberspace Portal. (6 min) Make sure all students enter Cyberspace. Direct them to Diagnostics and have them talk to Dr. Keen and take the tour. (6 min) Start and log in to the game. Open PAL and click the Inventory tab. Check to see if they have a Cyberspace Pass. Go back to the Atrium, and click on the door to the “Cyberport.” Click Carlo and talk to him. Tell Carlo you have a Cyberspace Pass so he will unlock the Cyberspace Portal. Enter Cyberspace and click on Diagnostics to enter the building. Click Dr. Keen and take the tour. Click on the malware to learn about them. Develop and Practice (20 min) Hand out the worksheet and explain about Malware. Let students attempt quiz #1. (Worksheet, part 1) (5 min) Share the answers to the quiz: Adware (#3), Trojan (#5), Spyware (#2), Virus (#4) and Worm (#1). Explain the tips for using anti-virus software, anti- spyware software and firewalls to protect your computer. (3 min) Explain what spam is. (Worksheet, part 2) (2 min) Lead students into the game again. Direct students to the “Message Center“ and have them ask Trey to start the Level 1 training mission. Let students play the mission until they earn a gold badge. (15 min) Make sure all students earn a gold badge and unlock their first ReQuest with Alan. Do not let students proceed to the ReQuest. Students who finish the mission can shop at the Academy Store and decorate their room. Read part 1 of the worksheet, and try quiz #1. If you need a hint, go back to the Hall of Quarantine in Diagnostics and click on the malware. Check the answers and read the tips. Understand what anti-virus software, anti-spyware software and firewalls can do. Leave Diagnostics and click the door of the Message Center. Talk to Trey and ask to start the Level 1 mission. Play the mission until you earn a gold badge. After earning a gold badge, buy items from the Academy Store and decorate your dorm room. Reinforce (10 min) Hand out Hint Sheet 01 to students. Make sure all students understand what spam is. (Hint Sheet 01) (5 min) Read Hint Sheet 01. Learning Outcomes At the end of this lesson, students will be able to: Define the cyber defense terms introduced in this lesson. Explain how cyber threats introduced in this lesson can destroy data, hardware and software. Take simple steps to protect a computer and data from cyber threats by using a spam filter and anti-virus software. Understand how a firewall works and the importance of installing a firewall. Navigate The MySecureCyberspace Game with ease. Enhance motor skills while navigating the game software.

Transcript of Lesson 3: Email Cyber Threats - Carnegie Cyber Academy · Lesson 3: Email Cyber Threats ... Carlo...

Copyright © 2012 Carnegie Mellon University MySecureCyberspace is a registered trademark of Carnegie Mellon University

Page 11www.carnegiecyberacademy.com

Lesson 3: Email Cyber Threats

Learning Objectives Materials You Will NeedIntroduce new terms related to cyber threats.• Increase students’ knowledge of cyber threats that can • harm a computer and the data stored on it.Emphasize the use of anti-virus software, spam filters, • anti-spyware software and firewall to protect the computers.Enhance students’ motor skills while navigating the game.•

Computers with Carnegie Cadets: The • MySecureCyberspace Game installedWorksheet for Lesson 3: Email Cyber Threats• Hint Sheet 01 (download from • http://www.carnegie cyberacademy.com/documents/hintSheet01.pdf )

Classroom Activities (Duration: 45 minutes)Timeline Teacher Instructions Student Activities

IntroduceConcepts (15 min)

Lead students into the game. Make sure that the • students have already talked to Omni and have a Cyberspace Pass as described in Lesson 1. (3 min)Direct students to the CyberPort and have them • talk to Carlo. Have students tell Carlo they have a Cyberspace Pass so he will unlock the Cyberspace Portal. (6 min)Make sure all students enter Cyberspace. Direct • them to Diagnostics and have them talk to Dr. Keen and take the tour. (6 min)

Start and log in to the game. Open PAL and click • the Inventory tab. Check to see if they have a Cyberspace Pass.Go back to the Atrium, and click on the door to • the “Cyberport.” Click Carlo and talk to him. Tell Carlo you have a Cyberspace Pass so he will unlock the Cyberspace Portal.Enter Cyberspace and click on Diagnostics to enter • the building. Click Dr. Keen and take the tour. Click on the malware to learn about them.

Develop and

Practice (20 min)

Hand out the worksheet and explain about • Malware. Let students attempt quiz #1. (Worksheet, part 1) (5 min) Share the answers to the quiz: Adware (#3), Trojan • (#5), Spyware (#2), Virus (#4) and Worm (#1). Explain the tips for using anti-virus software, anti-spyware software and firewalls to protect your computer. (3 min)Explain what spam is. (Worksheet, part 2) (2 min) • Lead students into the game again. Direct students • to the “Message Center“ and have them ask Trey to start the Level 1 training mission. Let students play the mission until they earn a gold badge. (15 min)

Make sure all students earn a gold badge and • unlock their first ReQuest with Alan.Do not let students proceed to the ReQuest.• Students who finish the mission can shop at the • Academy Store and decorate their room.

Read part 1 of the worksheet, and try quiz #1. If • you need a hint, go back to the Hall of Quarantine in Diagnostics and click on the malware.Check the answers and read the tips. Understand • what anti-virus software, anti-spyware software and firewalls can do.

Leave Diagnostics and click the door of the • Message Center. Talk to Trey and ask to start the Level 1 mission.

Play the mission until you earn a gold badge.• After earning a gold badge, buy items from • the Academy Store and decorate your dorm room.

Reinforce (10 min)

Hand out Hint Sheet 01 to students. Make sure all • students understand what spam is. (Hint Sheet 01) (5 min)

Read Hint Sheet 01.•

Learning OutcomesAt the end of this lesson, students will be able to:

Define the cyber defense terms introduced in this lesson.• Explain how cyber threats introduced in this lesson can destroy data, hardware and software.• Take simple steps to protect a computer and data from cyber threats by using a spam filter and anti-virus software.• Understand how a firewall works and the importance of installing a firewall.• Navigate The MySecureCyberspace Game with ease.• Enhance motor skills while navigating the game software.•

Copyright © 2012 Carnegie Mellon University MySecureCyberspace is a registered trademark of Carnegie Mellon University

Page 12www.carnegiecyberacademy.com

Worksheet 3: Email Cyber Threats

1. What is Malware?

Date: Name:

Malware is a software program that harms your computer. Adware, spyware, viruses, Trojan

horses and worms are all types of malware.

A destructive program that can get into computers or networks and harm them by

deleting, modifying or sending out the data.

A software program that causes advertisements to appear on your computer.

A nasty program disguised as legitimate software.

A software program that secretly tracks what you do on the Internet and sometimes gets

information about you from your computer.

A software program that can wipe out information on your computer and create major

problems.

Doctor Keen, Diagnostics Lab

TechnicianQuiz 1: Match the malware images to their definitions.

Adware

Trojan Horse

Spyware

Virus

Worm

Tip: To protect your computer from malware, install the most recent anti-spyware and anti-virus software. You also need to keep the software up-to-date to stay protected. Check with a trusted adult to see if your software is set up to automatically update itself.

Tip: A Firewall is a software program that protects your computer by acting like a security guard and monitoring and controlling the Internet traffic coming in and out of your computer. Install one and make sure it is always turned on.

2. What is Spam?

The Internet version of “junk mail,” Spam is a message sent to a large number of users, usually

to advertise something or to spread malware.Trey, Message

Center Supervisor

© 2

00

6-2

012

Ca

rne

gie

Me

llon

Uni

ve

rsit

y. A

ll R

ight

s R

ese

rve

d

If

an

em

ail

is f

rom

so

me

one

yo

u d

on’

t kn

ow

and

the

Sub

jec

t is

like

any

of

the

exa

mp

les

be

low

,

it

is p

rob

ab

ly S

pa

m:

It

soun

ds

too

go

od

to

be

tru

e

Se

nde

r: N

otM

CS

pa

mm

er

Sub

jec

t: Y

ou

just

wo

n m

illio

ns!!

It

is a

dv

ert

isin

g s

om

eth

ing

Se

nde

r: J

oe

Sc

hmo

eS

ubje

ct:

Gre

at

De

als

He

re

The

re a

re lo

ts o

f m

issp

elle

d w

ord

s

Se

nde

r: S

unsh

1n3

Sup

ers

t@r

Sub

jec

t: B

rit3

da

ts R

he

er

It

soun

ds

rea

lly s

tra

nge

Se

nde

r: M

oni

ca

Lin

dsa

yS

ubje

ct:

Re

: ma

ngo

jus

tifi

ed

The

em

ail

soun

ds

inte

rest

ing

but

yo

u w

ere

n’t

exp

ec

ting

it

Se

nde

r: b

rouh

aha

Sub

jec

t: W

in a

fre

e g

am

e c

ons

ole

!

Tip

s fo

r I

de

ntif

yin

g S

pa

m E

ma

ilsPe

rso

nal I

nfo

rma

tio

n is

info

rma

tio

n a

bo

ut y

our

OFF

LI

NE

ide

ntit

y t

hat

som

eo

ne c

oul

d u

se t

o

fig

ure

out

who

or

whe

re y

ou

are

, su

ch

as:

Wha

t sc

hoo

l yo

u g

o t

o

Your

te

ac

hers

’ na

me

s

Cre

dit

Ca

rd n

umb

ers

Lic

ens

e p

late

num

be

rs

Na

me

of

tea

m y

ou

pla

y f

or

Your

num

be

r o

n y

our

te

am

Pla

ce

s ne

ar

yo

ur h

ous

e,

like

st

ore

s, r

est

aur

ant

s, o

r p

ark

s

Pla

ce

s y

ou

vis

it r

eg

ula

rly

If

yo

u a

re h

om

e a

lone

Whe

n y

ou

are

go

ing

to

be

ho

me

alo

ne

Your

ful

l na

me

Your

Use

r na

me

or

Pass

wo

rd

Your

ag

e

Your

ID

num

be

r o

r S

oc

ial

Se

cur

ity

Num

be

r

Your

em

ail

ad

dre

ss

Your

ho

me

ad

dre

ss

Your

pho

ne n

umb

er

Wha

t c

ity

yo

u liv

e in

Wha

t ne

ighb

orh

oo

d y

ou

live

in

Your

pa

rent

s’ n

am

es

Whe

re y

our

pa

rent

s w

ork

Na

me

s o

r p

hone

num

be

rs o

f fa

mily

me

mb

ers

and

fri

end

s

Exa

mp

les

of

Pers

ona

l Inf

orm

ati

on

So

me

we

bsi

tes

co

nta

in D

ang

ers

tha

t c

an

da

ma

ge

yo

ur c

om

put

er

or

ste

al y

our

pe

rso

nal

info

rma

tio

n. W

hen

yo

u a

re e

xplo

ring

we

bsi

tes,

wa

tch

out

fo

r th

e f

ollo

win

g 4

Da

nge

rs:

Tip

s fo

r re

co

gni

zin

g W

eb

site

Da

nge

rs

Lin

ks t

hat

do

wnl

oa

d f

iles

Form

s th

at

ask

fo

r Pe

rso

nal

Inf

orm

ati

on

Ad

ve

rtis

em

ent

s a

nd P

op

ups

Thr

ea

teni

ng,

hurt

ful,

or

ad

ults

-o

nly

co

nte

nt

The

se li

nks

usua

lly a

sk if

yo

u w

ant

to

sa

ve

or

op

en

the

file

whe

n y

ou

clic

k o

n th

em

and

ca

n sa

y

som

eth

ing

like

“C

lick

to D

ow

nlo

ad

” o

r “D

ow

nlo

ad

No

w”

Ad

ve

rtis

em

ent

s ha

ve

co

nte

nt t

hat

is d

iffe

rent

tha

n th

e w

eb

site

the

y

are

on

(lik

e a

ca

r A

d o

n a

we

bsi

te

ab

out

pup

pie

s),

and

so

me

tim

es

the

y s

ay

“A

d”

or

“Ad

ve

rtis

em

ent

” o

n th

em

Form

s c

an

be

a D

ang

er

if t

hey

ask

fo

r p

ers

ona

l inf

orm

ati

on

like

yo

ur

full

nam

e o

r c

red

it c

ard

num

be

r

Co

nte

nt c

an

be

a D

ang

er

if it

m

ake

s y

ou

fee

l ic

ky o

r un

co

mfo

rta

ble

or

say

s A

dul

ts-

onl

y

or

“Yo

u m

ust

be

18

or

old

er”

on

it

Tip

s fo

r D

ea

ling

wit

h C

yb

er

Bul

lyin

gC

yb

er

bul

lyin

g is

usi

ng t

he I

nte

rne

t to

thr

ea

ten,

em

ba

rra

ss,

pic

k o

n, o

r p

ut-

do

wn

pe

op

le. T

hey

ca

n m

ake

yo

u p

rett

y m

ise

rab

le,

so if

yo

u e

ve

r ru

n in

to a

cy

be

r b

ully

, re

me

mb

er

the

se t

ips:

Whe

n a

Bul

ly a

tta

cks

, fi

rst

try

to

igno

re o

r b

loc

k th

em

.

If

the

att

ac

ks b

ec

om

e o

ve

rwhe

lmin

g o

r sc

ary

, y

ou

sho

uld

pro

ba

bly

let

a t

rust

ed

ad

ult

kno

w

ab

out

it.

The

Bul

ly is

pro

ba

bly

try

ing

to

pic

k a

fig

ht. I

f y

ou

ca

n la

ugh

it o

ff in

ste

ad

of

rea

cti

ng o

r

fig

htin

g b

ac

k, t

he B

ully

do

esn

’t g

et

wha

t th

ey

wa

nt.

Talk

wit

h y

our

tru

ste

d a

dul

t a

bo

ut s

tra

teg

ies

to d

ea

l wit

h th

e b

ully

ing

and

co

me

up

wit

h a

pla

n to

ge

the

r.

Be

pre

pa

red

to

re

po

rt t

he b

ully

.

Be

a g

oo

d c

yb

er

cit

ize

n a

nd h

elp

pre

ve

nt c

yb

er

bul

lyin

g.

Sa

ve

any

ev

ide

nce

of

the

bul

lyin

g,

suc

h a

s e

ma

il a

nd in

sta

nt m

ess

ag

es

and

sc

ree

nsho

ts o

f

we

b p

ag

es.

Se

e H

int

She

et

05

fo

r in

form

ati

on

on

how

to

re

po

rt c

yb

er

bul

lyin

g.

If

yo

u w

itne

ss c

yb

er

bul

lyin

g,

try

to

do

so

me

thin

g f

rie

ndly

to

he

lp t

he v

icti

m,

so t

hey

do

n't

fee

l

alo

ne. D

on'

t jo

in in

and

ma

ke t

hing

s w

ors

e.

Pro

tec

t y

our

self

fro

m c

yb

er

bul

lyin

g a

s m

uch

as

po

ssib

le.

Ma

ke s

ure

tha

t y

ou

wo

n’t

be

an

ea

sy t

arg

et

for

cy

be

r b

ullie

s. D

on’

t sh

are

yo

ur p

ers

ona

l

info

rma

tio

n in

Cy

be

rsp

ac

e,

esp

ec

ially

pho

tos

and

vid

eo

s, a

nd d

on’

t tr

y t

o p

ick

fig

hts

wit

h

oth

er

pe

op

le.

Tip

s fo

r R

ep

ort

ing

Cy

be

r B

ully

ing

Cy

be

r b

ully

ing

is u

sing

the

Int

ern

et

to t

hre

ate

n, e

mb

arr

ass

, p

ick

on,

or

put

-d

ow

n p

eo

ple

. R

em

em

be

r to

sa

ve

ev

ide

nce

of

cy

be

r b

ully

ing

. He

re’s

so

me

tip

s fo

r d

ec

idin

g w

hom

to

re

po

rt

cy

be

r b

ully

ing

to

:

Co

nta

ct

the

we

bm

ast

er,

site

ow

ner,

or

cus

tom

er

serv

ice

and

re

que

st t

hat

the

off

ens

ive

m

ate

ria

ls b

e r

em

ov

ed

. If

tha

t d

oe

sn’t

wo

rk,

co

nta

ct

the

We

b s

ite

ho

st a

nd a

sk t

hem

to

pul

l d

ow

n th

e s

ite

if it

vio

late

s th

e t

erm

s o

f a

gre

em

ent

.

Co

nta

ct

the

bul

ly’s

IS

P t

o s

ee

if it

qua

lifie

s a

s a

bus

e. T

hey

ma

y s

end

a w

arn

ing

or

susp

end

the

us

er’

s a

cc

oun

t. C

ont

ac

t y

our

ow

n I

SP

fo

r he

lp w

ith

blo

cki

ng a

n a

cc

oun

t.

Co

nta

ct

the

pho

ne s

erv

ice

pro

vid

er

- m

ost

ca

lls c

an

be

tra

ce

d a

nd t

hey

ma

y b

e a

ble

to

blo

ck

the

ca

lls o

r le

t y

ou

kno

w w

here

the

y a

re c

om

ing

fro

m s

o y

ou

ca

n re

po

rt t

he a

bus

e.

Co

nta

ct

the

sc

hoo

l Pri

ncip

al o

r C

oun

selo

r. I

f th

e c

yb

erb

ully

ing

ha

pp

ens

at

scho

ol o

r is

a

ffe

cti

ng t

he s

cho

ol e

nvir

onm

ent

the

y m

ay

be

ab

le t

o in

terv

ene

. If

the

sc

hoo

l do

es

not

hav

e a

c

yb

er

bul

lyin

g p

olic

y, a

sk t

hem

to

cre

ate

one

.

If

the

bul

ly g

oe

s to

sc

hoo

l wit

h y

our

chi

ld...

If

the

bul

lyin

g h

ap

pe

ns t

hro

ugh

a c

ell

pho

ne...

If

the

bul

lyin

g h

ap

pe

ns t

hro

ugh

a W

eb

sit

e...

If

the

bul

lyin

g h

ap

pe

ns t

hro

ugh

Em

ail

or

Ins

tant

Me

ssa

ge

...

If

the

re is

the

thr

ea

t o

f p

hysi

ca

l da

nge

r...

Co

nta

ct

the

loc

al l

aw

enf

orc

em

ent

if t

here

is t

he t

hre

at

of

phy

sic

al h

arm

. The

y m

ay

als

o h

av

e a

sp

ec

ial c

yb

er

cri

me

s un

it t

hat

ca

n in

ve

stig

ate

.

Ne

tiq

uett

e T

ips

Ne

tiq

uett

e is

the

eti

que

tte

of

the

Int

ern

et,

sim

ple

rul

es

for

how

yo

u sh

oul

d a

ct

in

Cy

be

rsp

ac

e t

hat

kee

p t

hing

s p

olit

e a

nd h

elp

ev

ery

one

ge

t a

long

. He

re’s

so

me

tip

s fo

r b

ein

g

a g

oo

d C

yb

er

Cit

ize

n a

nd p

rac

tic

ing

go

od

Ne

tiq

uett

e:

Che

ck

for

typ

os

or

oth

er

mis

take

s b

efo

re y

ou

po

st o

r se

nd a

me

ssa

ge

. Use

e

mo

tic

ons

like

;)

and

ac

rony

ms

like

LO

L t

o g

et

yo

ur m

ess

ag

e a

cro

ss in

the

rig

ht

spir

it.

Av

oid

usi

ng A

LL

CA

PS

, it

me

ans

yo

u a

re s

hout

ing

.

Alw

ay

s a

sk p

erm

issi

on

be

fore

po

stin

g a

bo

ut s

om

eo

ne o

r sh

ari

ng a

n e

ma

il, p

hoto

, o

r c

hat

co

nve

rsa

tio

n, a

nd m

ake

sur

e t

hat

it d

oe

s no

t c

ont

ain

any

pe

rso

nal i

nfo

rma

tio

n.

Ke

ep

me

ssa

ge

s sh

ort

, p

olit

e,

and

to

the

po

int.

Do

n't

spa

m p

eo

ple

wit

h m

ulti

ple

m

ess

ag

es

or

wa

ste

the

ir t

ime

. Try

no

t to

use

to

o m

uch

cha

t sl

ang

if y

ou

thin

k th

e

oth

er

pe

rso

n w

on'

t un

de

rsta

nd it

.

Be

a C

ham

pio

n, n

ot

a C

hum

p

Be

po

lite

and

re

spe

ctf

ul o

f o

the

rs

Pay

Att

ent

ion

to F

orm

at

Ask

Be

fore

yo

u Po

st

Be

he

lpfu

l and

co

urte

ous

to

oth

ers

and

do

n't

be

a c

yb

er

bul

ly. I

f so

me

one

is b

ein

g

rud

e t

o y

ou,

be

the

be

tte

r p

ers

on.

Ta

lk t

o a

tru

ste

d a

dul

t, b

loc

k th

em

, o

r si

mp

ly

wa

lk a

wa

y. I

f th

ey

are

bul

lyin

g s

om

eo

ne e

lse

, d

on’

t jo

in in

and

ma

ke it

wo

rse

. Be

su

pp

ort

ive

and

po

siti

ve

and

try

to

he

lp t

he v

icti

m if

yo

u c

an.

Tip

s fo

r G

row

ing

a P

osi

tiv

e O

nlin

e R

ep

uta

tio

nYo

ur o

nlin

e r

ep

uta

tio

n c

an

be

po

siti

ve

or

neg

ati

ve

, it

all

de

pe

nds

on

how

yo

u b

eha

ve

whe

n y

ou'

re in

cy

be

rsp

ac

e a

nd w

hat

oth

er

pe

op

le s

ay

ab

out

yo

u.

Do

sha

re t

hing

s th

at

wo

uld

imp

rove

yo

ur r

ep

uta

tio

n a

s a

g

oo

d s

tud

ent

, a

go

od

fri

end

, a

nd a

te

am

pla

ye

r

Do

n’t

sha

re t

hing

s th

at

wo

uld

da

ma

ge

yo

ur r

ep

uta

tio

n a

s a

g

oo

d f

rie

nd a

nd a

re

spe

cta

ble

and

tru

stw

ort

hy p

ers

on

Do

n’t

sha

re t

hing

s th

at

will

ma

ke y

ou

a t

arg

et

for

we

ird

o

stra

nge

rs o

r b

ullie

s

Be

ca

refu

l ab

out

who

m y

ou

trust

wit

h y

our

re

put

ati

on

whe

n y

ou

ad

d t

hem

to

yo

ur f

rie

nds

and

sha

re t

hing

s w

ith

the

m

Be

on

the

lo

oko

ut

for

oth

ers

da

ma

gin

g y

our

re

put

ati

on

and

a

ct

quic

kly

to

min

imiz

e t

he d

am

ag

e