PRIVACY & INFORMATION SECURITY
The Ransomed Files
Empty space, drag to resize
This lesson plan is designed to teach 15-year-old students about cybersecurity, cybercrimes, and ransomware, imparting knowledge of the concepts, potential consequences of falling victim to these types of attacks, and equipping them with the knowledge and skills needed to protect themselves and their personal information from online threats as they navigate the increasingly complex and interconnected online world.
- Suitable for age 15
- 60 minutes + project work
What's in this lesson?
Students will be able to:
- Demonstrate an understanding of how cybersecurity works and the impact when security is breached.
- Identify the cybercrime attacks and describe the motivations behind why cybercrimes occur.
- Examine the basic characteristics of ransomware and evaluate strategies for protecting devices from ransomware attacks.
Click to expand
Cybersecurity refers to the practices and technologies used to protect devices, networks, and data from unauthorised access, theft, or damage. It involves measures like antivirus software, firewalls, and password protection to prevent cyber attacks.
Cybercrime refers to criminal activities committed using the internet or other digital technologies. It can include online identity theft, hacking, fraud, and cyberstalking, among others.
Ransomware is like a digital "kidnapping" of your files. It is a type of malicious software that is designed to block access to a computer system or data until a ransom is paid. It can be installed through malicious email attachments or links, and once installed, it encrypts files on the victim's computer, making them inaccessible until the ransom is paid.
Introduction (5 min)
Define the Keywords (15 min)
Investigate the Scenario (30 min)
Project Work (duration as needed)
Key Takeaways (10 min)
Included in this Lesson
- Presentation slides available in Powerpoint (.pptx) or in the Online Player
- Lesson plan for teachers
- Printable handouts for students
- Assessment rubric for project based learning
Download Lesson Materials
Access the Presentation Online
Sorry, this page is only available to enrolled users only!
Subscribe to Internet Independent to get access!