PHISHING & SCAMS
Demystifying Social Engineering
Empty space, drag to resize
This lesson plan focuses on educating 14-year-old students about the common types of cyberattacks, namely social engineering, impersonation, and get-rich-quick schemes, and learn to take appropriate actions to safeguard themselves and their personal information against phishing and scam attacks.
- Suitable for age 14
- 60 minutes + project work
What's in this lesson?
Students will be able to:
- Explain the concept of social engineering, and demonstrate how to protect personal information by recognising common social engineering tactics used by cybercriminals.
- Identify impersonation tactics used in phishing and scamming attacks, and learn how to verify the authenticity of a message before taking action.
- Demonstrate the strategies used in "get rich quick" schemes to deceive individuals into thinking they can make easy money.
Click to expand
This refers to the psychological manipulation of people to gain access to confidential information or protected systems. Cybercriminals use social engineering tactics to trick individuals into divulging sensitive information, such as passwords or credit card numbers, or to perform certain actions, such as installing malware on their devices.
This refers to the act of pretending to be someone else in order to deceive others. Bad actors use impersonation to gain access to personal information, steal money or commit other types of fraud.
Get Rich Quick
Get Rich Quick scams offer fraudulent opportunities that promise quick money with little effort or risk. This is commonly presented as investment or job opportunities that scam people out of their money.
Introduction (5 min)
Define the Keywords (15 min)
Investigate the Scenario (30 min)
Project Work (duration as needed)
Key Takeaways (10 min)
Included in this Lesson
- Presentation slides available in Powerpoint (.pptx) or in the Online Player
- Lesson plan for teachers
- Printable handouts for students
- Assessment rubric for project based learning
Download Lesson Materials
Access the Presentation Online
Sorry, this page is only available to enrolled users only!
Subscribe to Internet Independent to get access!