Cyber Security Awareness Volunteer Education Program (C-SAVE): Grades 3-5

Equipment /
  • Projector (or something you can use to display a web-based video)
  • Laptop/Computer with internet access (to access the web-based video) and download video before class
  • Clock/Watch (Timers)
  • Optional: Paper and Crayons for making posters

Preparation /
  • Place three signs on different bright colored paper (or write them on available whiteboard or chalkboard) in front of the room
  • First Sign: Stop
  • Second Sign: Think
  • Third Sign: Connect
  • Place three signs on different bright colored paper (or write them on available whiteboard or chalkboard) in front of the room
  • Cybersafety
  • Cybersecurity
  • Cyberethics
  • Photocopy Gaming Tips Handout
  • Download all videos from YouTube
  • Designate students in teams as the teams will be used in the third activity

Agenda
Total Time: 45 Minutes
Learning Objectives
  • Students will understand the three key components of the C3 Concepts and how their online activities fit into these categories.
  • Students should understand the need to protect their passwords.
  • Students should understand what constitutes personal information and the need to protect it.
/
  • Introductions
  • Agenda
  • Kick off - Introduce the program and the 3Cs: Cybersafety, Cybersecurity, Cyberethics
  • Watch – The STOP. THINK. CONNECT. video
  • Table Talk (in small groups) – Discuss the video. Solicit input. Ask questions.
  • Why Stop?
  • Think about what?
  • When to Connect?
  • Situations – Cover at least two situations.
  • Watch – As a group watch the STOP. THINK. CONNECT. - Tips for Gaming video
  • End session – Ask the group: “What did you learn?” Replay the STOP. THINK. CONNECT video to end the session.

Activity 1: Introduction & the 3Cs (5 minutes)

Introductions /
  • Provide your name
  • Explain that you are going to help make sure that students at every grade level understand how to stay safe and act responsible while using the internet.

Agenda /
  • Review the agenda
  • Discussion of 3Cs
  • Video
  • Table Talk Discussion and Situations
  • Video
  • Review

Opening Questions /
  • Ask the students the following questions:
  • How do you use the internet?
  • How do you get online?
  • What devices do you use?

3Cs
Cybersafety
Cybersecurity
Cyberethics /
  • Ask the students to define the following:
  • Cybersafety: The things we do to keep ourselves and others safe when using the Internet.
  • Cybersecurity: How we protect our computer and networks and the information they contain.
  • Cyberethics: Responsible behavior. Treat others online as you would like to be treated.

Personal Information & Passwords /
  • Ask the students to define what personal information is.
  • Call off the following items that are personal information and see if they agree that it is personal information: name, birthday, mom’s name, address, and password.
  • Ask the students who they can share specific types of personal information with, including passwords.
  • The Main Answer is trusted adult, parent, guardian (at times students are required to share a password with a teacher).

Activity 2: Stop – Think – Connect (10 minutes)

Stop. Think. Connect. Video
Make it interactive. Encourage students to dance with the video. /
  • Tell the students to watch the video closely and take note what advice the students have for others who go online
  • Watch the Classroom Video from Stop – Think – Connect
  • Ask the below questions. Some possible answers are provided to help you with the discussion.

STOP
Identifying Potential Problems / Why do they tell us to STOP?
  • Because we need to understand that there are dangers and risks with going online.
  • We need to know how to make good decisions about what we share online and what we do online.
  • We need to know how to spot and avoid potential problems.
Ask the students “What are some of the potential problems we need to spot?”
(Have the students define the problems as they are named.)
  • Bullying (online bullying is just as bad as bullying someone in person)
  • Bad websites
  • Virus (program that causes harm to files and programs)
  • Spam (unwanted email, sent to a large number of people, mostly advertising)
  • Scams (dishonest scheme, fraud)

THINK
Protecting Oneself
Protecting the Computer / So – That must be why they tell us to THINK
(Think - to use our head and think about what we are doing and how it might impact others.)
What are some of the things you can do to protect yourself and the computer while you’re online?
  • Keep your password private. Your password is your key! Do not share with anyone but a trusted adult (e.g. mom, dad, guardian).
  • Do not communicate with people you do not know. (Ask the students to define “friend” – a friend is someone you’ve met, know and trust.)
  • Do not open emails from someone you do not know.
  • Keep personal information private (Ask the students to define personal information – name, telephone number, birthday, address, birthplace, login name)
  • Do not post photos or videos that could reveal too much information about yourself.
  • Ask before visiting websites, clicking on links, downloading anything (games, music, videos, pictures, software updates)
  • Use the golden rule: Post only about others as you would have them post about you.
  • Do not click on ads.
  • Ask mom/dad, guardian or trusted adult if the computer security software is up-to-date
  • Ask a trusted adult (mom, dad, guardian, teacher, school officer) if you think something is wrong or you feel uncomfortable about something that has happened.

CONNECT / Then – if I’m sure I’m safe – I can CONNECT. That is – go online with confidence.

Activity 3: It Seemed Like a Good Idea!?! – Situations

(25 minutes – 6 minutes per situation – Or if discussion is going well you may only get through 2 situations)

Introduce Situations / Tell the students you are going to review situations that had serious consequences for students and their families. Tell them that after each scenario you will discuss the following questions:
  • What was the bad choice or decision that the student made in the situation? What happened because of it? (STOP)
  • What would have been a better choice or decision for the situation? What advice would they give a student in the situation? (THINK)
  • What are some tips that we can use to help ourselves when we are online? (CONNECT)

Situation 1 / Tommy loves playing video games and wanted more points. He gave out his password to a “friend,” who used it to access his email and sent mean messages to his other friends.
Question & Answer
Key Concepts
  • Keep passwords safe.
  • Treat others how we want to be treated.
  • Ask a trusted adult if you do not know what to do.
  • A friend is a person you know and trust.
/ Question: What was the bad choice or decision that Tommy made in this situation?
Answer: He gave someone other than his parents his password
Question: And what happened because of this?
Answer: The friend used the password to access his email account. (Cybersecurity & Cyberethics issue)
Answer:He sent mean messages to his other friends. (Cybersafety issue)
Question: What would have been a better choice or decision for this situation?
Answer: Tell his friend that he never shares his password with anyone.
Question: What advice did the student have for us in this situation?
Advice: Never tell anyone your password except your parents/guardian/trusted adult.
Question: What are some tips that we can use to help ourselves when we are online?
Answer: Treat others as we’d like to be treated.
Answer:Never share our passwords.
Answer: If we are unsure what to do or something doesn’t seem right ask an adult for help.
Situation 2 / Keisha saw a pop up ad for a contest – with a prize that she wanted. She played the contest and “won.” She then used her parents’ credit card number to cover shipping. Her parents’ credit card was used for fraudulent charges.
Question & Answer
Discussion: Phishing
Discussion: Trusted Adults
Key Concepts
  • Close pop-up ads.
  • Keep personal information safe.
  • Ask a trusted adult if you do not know what to do.
  • If it sounds too good to be true it usually is (you do not pay for things you win).
/ Question: What was the bad choice or decision that the student made in this situation?
Answer: She fell for a trick called phishing.
Answer: She used her parents’ credit card number to cover shipping. (Cyberethics issue)
Discussion: Ask the students if any of them had ever been fishing. Generally, they have. Then explain that this type of “Phishing” is spelled with a “PH”. That instead of you being the one holding the phishing pole, you’re the fish. The pop-up add is the bait.Explain to them that essentially it’s like a trick. Ask them to explain what a trick is.
Question: And what happened because of this?
Answer: Her parents’ credit card was used for fraudulent charges. (Cybersecurity issue)
Question: What would have been a better choice or decision for this situation?
Answer: Always close pop-up ads (*Tell students there is usually an “x” in the upper right hand corner
to allow them to close an ad.
Answer: Ask an adult for help if you’re unsure.
Question: What advice did the student have for us in this situation?
Advice: Don’t give out personal information to anyone online or in an email.
Question: What are some tips that we can use to help ourselves when we are online?
Answer: If something seems too good to be true, it usually is.
Answer: We don’t ever give out personal information online.
Answer: Ask a trusted adult.
Discussion: Ask the kids for examples of trusted adults.
Give students some examples of trusted adults they could turn to - school officer, principal, grandparent, etc.
Situation 3 / Angel used a peer to peer program. Someone in his group of friends downloaded free music and a virus. It spread to everyone’s computer. They lost photos and other important family documents.
Question & Answer
Discussion: Virus
Key Concepts
  • Be careful what you download.
/ Question: What was the bad choice or decision that the student made in this situation?
Answer: Someone downloaded free music which very often comes with a virus – including this time.
Discussion:Ask the kids if they know what a virus is. Explain that a computer virus is an infection for a computer. And just like when we have a cold, which is a virus, it can be spread to other computers if we’re not careful. A computer virus can cause a lot of damage to your computer (and be spread to others) causing the loss of important and valuable information.
Question:And what happened because of this?
Answer:It spread to everyone’s computer. (Cybersecurity issue)
Answer:They lost photos and other important family documents.
Question:What would have been a better choice or decision for this situation?
Answer:Before getting on a peer to peer network (give some specific examples – like Kazaa, Limewire, Gnutella), where you share files with other people, always ask an adult.
Question:What advice did the student have for us in this situation?
Advice: Be very careful what you download.
Advice:You should ask an adult to check to make sure files are ok to download.
Question:What are some tips that we can use to help ourselves when we are online?
Answer:Ask an adult for permission before downloading files. They can help you spot potential danger and save everyone the pain of dealing with a virus.
Situation 4 / Susana is a new student at Deep Creek Elementary School. She joined Zoe’s fifth grade class a few weeks ago. She is very nice to everyone, but a group of girls have started talking behind her back and excluding her from all activities.
One evening Susana sends Zoe an email, and she is clearly upset. It turns out the other girls were not trying to be her friends at all. They posted mean messages to Susana’s social network and sent out nasty emails to everyone at school saying mean things about her.
Question & Answer
Discussion: Upstander
Key Concepts
  • Stop communicating with bullies.
  • Tell trusted adults when bullying is taking place.
  • Be an upstander not a bystander.
/ Question:What was the bad choice or decision that Susana made in this situation?
Answer:She didnot make any bad decisions.
Question:What advice do you have for Susana?
Advice:Immediately stop responding to anyone online who makes her feel uncomfortable or who she doesn’t trust and know well in person.
Advice:Block the bullies from ever contacting her again.
Advice:Tell her parents. In this case, because it involves classmates at school, she should also tell her teacher.
Question:What should Zoe do?
Answer:Zoe should let her parents and teacher know about the bullying as well.
Discussion:It’s important to be an “upstander” not a bystander. Being an upstander is someone who stands up for what is right, even when it’s hard. Part of being a friend is standing up for them when others aren’t nice.

Activity 4: Gaming Tips, Replay Stop – Think – Connect video and Close (5 minutes)

Gaming Tips Video /
  • Watch the Gaming Tips Video
  • (
  • Hand out Gaming Tips

Lessons Learned /
  • Ask the students to recap what they have learned.

Stop. Think. Connect. Video
Encourage students to dance with the video. /
  • Watch the Classroom Video again from Stop. Think. Connect.

Conclusion /
  • Reinforce some of the same key messages before you leave.

Optional Activity:
Create a Poster /
  • Have students visit the STOP.THINK.CONNECT. website at for tips about how to stay safe and secure online.
  • Have the students pick a tip and create a poster for the classroom.

1