Copyright © 2012 Carnegie Mellon University MySecureCyberspace is a registered trademark of Carnegie Mellon University
Page 15www.carnegiecyberacademy.com
Lesson 5: Cyber Crime (part 2)
Learning Objectives Materials You Will NeedProvide students with information on what is considered to • be a cyber crime.Raise students’ awareness of the consequences of criminal • behavior online.Reinforce safe online behavior and how to protect • themselves and their personal data from cyber criminals. Enhance students’ motor skills while navigating the game.•
Computers with Carnegie Cadets: The • MySecureCyberspace Game installedWorksheet for Lesson 5: Cyber Crime (part 2)• Hint Sheet 02 (download from • http://www.carnegie cyberacademy.com/documents/hintSheet02.pdf )
Classroom Activities (Duration: 45 minutes)Timeline Teacher Instructions Student Activities
IntroduceConcepts (15 min)
Lead students into the game and direct them to • Officer Ward’s Office at the Detention Center. Have students talk to Officer Ward to finish the tour. (5 min)
Have students click on the photos on the Wall of • Shame in Ward’s office. Have students use the PAL to learn about the rest of the cyber villains and their cyber crimes. (10 min)
M.C. Spammer: • spammingThe Dis Guys: • personal information theftCaptain Jack Plunder: • cyber piracyThe ID Bandit: • identity theftThe Phisherman: • phishing
Start and log in to the game, then go to Officer • Ward’s Office (CyberPort > Cyberspace Portal > Data Stream South > Detention Center > Cyber Forensics Lab > Officer Ward’s Office). Click on Office Ward to talk to him and finish the tour.Click on all of the photos on the Wall of Shame • to see the cyber villains. Use your PAL to find out about the ones that are not detainees (PAL > People > Cyber Criminals & Villains).
Develop and
Practice (20 min)
Hand out the worksheet to students and explain • what phishing is. Have them read the phishing cartoon and discuss what might happen if Erika had submitted her personal information. (Worksheet, part 1) (7 min)Explain what identity theft is and have the • students read the cartoon. Discuss what some other consequences might be if your identity is stolen. (Worksheet, part 2) (7 min)Explain what a cyber predator is, and have the • students read the cartoon. Discuss what Dana could have done differently to protect herself from cyber predators. (Worksheet, part 3) (7 min)
Read the definition of phishing and the cartoon. • Think about what might happen if Erika shares her bank information.
Read the definition of identity theft and the • cartoon. Think about what other things could happen if your identity was stolen.
Read the definition of a cyber predator and the • cartoon. Think about what Dana could have done differently to protect herself better.
Reinforce (10 min)
Have each student think of one example of • personal information and create a list of their examples on the classroom black/white board.Hand out Hint Sheet 02 and discuss how protecting • your personal information is an important way to protect yourself. (9 min)
Think what personal information is and come up • with an example.
Read Hint Sheet 02 and talk about why protecting • your personal information is important.
Learning OutcomesAt the end of this lesson, students will be able to:
Define the cyber defense terms introduced in this lesson.• Understand the consequences of inappropriate online behavior.• Understand what information to share and not to share online.• Take simple measures to protect their offline identity.• Understand how important it is to protect your personal information online. •
Copyright © 2012 Carnegie Mellon University MySecureCyberspace is a registered trademark of Carnegie Mellon University
Page 16www.carnegiecyberacademy.com
Worksheet 5: Cyber Crime (part 2)
1. Phishing
2. Identity Theft
3. Cyber Predator
Date: Name:
Using a message to send people to a fake website that collects their personal information, such as their bank account or credit card information.
Using somebody else’s personal information to pretend to be them, usually to steal money from someone’s bank account or to buy things with their credit cards.
Someone who uses the Internet to find young children, often because they want to meet the child in person and hurt them.
If
an
em
ail
is f
rom
so
me
one
yo
u d
on’
t kn
ow
and
the
Sub
jec
t is
like
any
of
the
exa
mp
les
be
low
,
it
is p
rob
ab
ly S
pa
m:
© 2
012
Ca
rne
gie
Me
llon
Uni
ve
rsit
y. A
ll R
ight
s R
ese
rve
d.
It
soun
ds
too
go
od
to
be
tru
e
Se
nde
r: N
otM
CS
pa
mm
er
Sub
jec
t: Y
ou
just
wo
n m
illio
ns!!
It
is a
dv
ert
isin
g s
om
eth
ing
Se
nde
r: J
oe
Sc
hmo
eS
ubje
ct:
Gre
at
De
als
He
re
The
re a
re lo
ts o
f m
issp
elle
d w
ord
s
Se
nde
r: S
unsh
1n3
Sup
ers
t@r
Sub
jec
t: B
rit3
da
ts R
he
er
It
soun
ds
rea
lly s
tra
nge
Se
nde
r: M
oni
ca
Lin
dsa
yS
ubje
ct:
Re
: ma
ngo
jus
tifi
ed
The
em
ail
soun
ds
inte
rest
ing
but
yo
u w
ere
n’t
exp
ec
ting
it
Se
nde
r: b
rouh
aha
Sub
jec
t: W
in a
fre
e g
am
e c
ons
ole
!
Tip
s fo
r I
de
ntif
yin
g S
pa
m E
ma
ilsS
om
e w
eb
site
s c
ont
ain
Da
nge
rs t
hat
ca
n d
am
ag
e y
our
co
mp
ute
r o
r st
ea
l yo
ur p
ers
ona
l
in
form
ati
on.
Whe
n y
ou
are
exp
lori
ng w
eb
site
s, w
atc
h o
ut f
or
the
fo
llow
ing
4 D
ang
ers
:
Tip
s fo
r re
co
gni
zin
g W
eb
site
Da
nge
rs
Lin
ks t
hat
do
wnl
oa
d f
iles
Form
s th
at
ask
fo
r Pe
rso
nal
Inf
orm
ati
on
Ad
ve
rtis
em
ent
s a
nd P
op
ups
Thr
ea
teni
ng,
hurt
ful,
or
ad
ults
-o
nly
co
nte
nt
The
se li
nks
usua
lly a
sk if
yo
u w
ant
to
sa
ve
or
op
en
the
file
whe
n y
ou
clic
k o
n th
em
and
ca
n sa
y
som
eth
ing
like
“C
lick
to D
ow
nlo
ad
” o
r “D
ow
nlo
ad
No
w”
Ad
ve
rtis
em
ent
s ha
ve
co
nte
nt t
hat
is d
iffe
rent
tha
n th
e w
eb
site
the
y
are
on
(lik
e a
ca
r A
d o
n a
we
bsi
te
ab
out
pup
pie
s),
and
so
me
tim
es
the
y s
ay
“A
d”
or
“Ad
ve
rtis
em
ent
” o
n th
em
Form
s c
an
be
a D
ang
er
if t
hey
ask
fo
r p
ers
ona
l inf
orm
ati
on
like
yo
ur
full
nam
e o
r c
red
it c
ard
num
be
r
Co
nte
nt c
an
be
a D
ang
er
if it
m
ake
s y
ou
fee
l ic
ky o
r un
co
mfo
rta
ble
or
say
s A
dul
ts-
onl
y
or
“Yo
u m
ust
be
18
or
old
er”
on
it
Tip
s fo
r D
ea
ling
wit
h C
yb
er
Bul
lyin
gC
yb
er
bul
lyin
g is
usi
ng t
he I
nte
rne
t to
thr
ea
ten,
em
ba
rra
ss,
pic
k o
n, o
r p
ut-
do
wn
pe
op
le. T
hey
ca
n m
ake
yo
u p
rett
y m
ise
rab
le,
so if
yo
u e
ve
r ru
n in
to a
cy
be
r b
ully
, re
me
mb
er
the
se t
ips:
Whe
n a
Bul
ly a
tta
cks
, fi
rst
try
to
igno
re o
r b
loc
k th
em
.
If
the
att
ac
ks b
ec
om
e o
ve
rwhe
lmin
g o
r sc
ary
, y
ou
sho
uld
pro
ba
bly
let
a t
rust
ed
ad
ult
kno
w
ab
out
it.
The
Bul
ly is
pro
ba
bly
try
ing
to
pic
k a
fig
ht. I
f y
ou
ca
n la
ugh
it o
ff in
ste
ad
of
rea
cti
ng o
r
fig
htin
g b
ac
k, t
he B
ully
do
esn
’t g
et
wha
t th
ey
wa
nt.
Talk
wit
h y
our
tru
ste
d a
dul
t a
bo
ut s
tra
teg
ies
to d
ea
l wit
h th
e b
ully
ing
and
co
me
up
wit
h a
pla
n to
ge
the
r.
Be
pre
pa
red
to
re
po
rt t
he b
ully
.
Be
a g
oo
d c
yb
er
cit
ize
n a
nd h
elp
pre
ve
nt c
yb
er
bul
lyin
g.
Sa
ve
any
ev
ide
nce
of
the
bul
lyin
g,
suc
h a
s e
ma
il a
nd in
sta
nt m
ess
ag
es
and
sc
ree
nsho
ts o
f
we
b p
ag
es.
Se
e H
int
She
et
05
fo
r in
form
ati
on
on
how
to
re
po
rt c
yb
er
bul
lyin
g.
If
yo
u w
itne
ss c
yb
er
bul
lyin
g,
try
to
do
so
me
thin
g f
rie
ndly
to
he
lp t
he v
icti
m,
so t
hey
do
n't
fee
l
alo
ne. D
on'
t jo
in in
and
ma
ke t
hing
s w
ors
e.
Pro
tec
t y
our
self
fro
m c
yb
er
bul
lyin
g a
s m
uch
as
po
ssib
le.
Ma
ke s
ure
tha
t y
ou
wo
n’t
be
an
ea
sy t
arg
et
for
cy
be
r b
ullie
s. D
on’
t sh
are
yo
ur p
ers
ona
l
info
rma
tio
n in
Cy
be
rsp
ac
e,
esp
ec
ially
pho
tos
and
vid
eo
s, a
nd d
on’
t tr
y t
o p
ick
fig
hts
wit
h
oth
er
pe
op
le.
Tip
s fo
r R
ep
ort
ing
Cy
be
r B
ully
ing
Cy
be
r b
ully
ing
is u
sing
the
Int
ern
et
to t
hre
ate
n, e
mb
arr
ass
, p
ick
on,
or
put
-d
ow
n p
eo
ple
. R
em
em
be
r to
sa
ve
ev
ide
nce
of
cy
be
r b
ully
ing
. He
re’s
so
me
tip
s fo
r d
ec
idin
g w
hom
to
re
po
rt
cy
be
r b
ully
ing
to
:
Co
nta
ct
the
we
bm
ast
er,
site
ow
ner,
or
cus
tom
er
serv
ice
and
re
que
st t
hat
the
off
ens
ive
m
ate
ria
ls b
e r
em
ov
ed
. If
tha
t d
oe
sn’t
wo
rk,
co
nta
ct
the
We
b s
ite
ho
st a
nd a
sk t
hem
to
pul
l d
ow
n th
e s
ite
if it
vio
late
s th
e t
erm
s o
f a
gre
em
ent
.
Co
nta
ct
the
bul
ly’s
IS
P t
o s
ee
if it
qua
lifie
s a
s a
bus
e. T
hey
ma
y s
end
a w
arn
ing
or
susp
end
the
us
er’
s a
cc
oun
t. C
ont
ac
t y
our
ow
n I
SP
fo
r he
lp w
ith
blo
cki
ng a
n a
cc
oun
t.
Co
nta
ct
the
pho
ne s
erv
ice
pro
vid
er
- m
ost
ca
lls c
an
be
tra
ce
d a
nd t
hey
ma
y b
e a
ble
to
blo
ck
the
ca
lls o
r le
t y
ou
kno
w w
here
the
y a
re c
om
ing
fro
m s
o y
ou
ca
n re
po
rt t
he a
bus
e.
Co
nta
ct
the
sc
hoo
l Pri
ncip
al o
r C
oun
selo
r. I
f th
e c
yb
erb
ully
ing
ha
pp
ens
at
scho
ol o
r is
a
ffe
cti
ng t
he s
cho
ol e
nvir
onm
ent
the
y m
ay
be
ab
le t
o in
terv
ene
. If
the
sc
hoo
l do
es
not
hav
e a
c
yb
er
bul
lyin
g p
olic
y, a
sk t
hem
to
cre
ate
one
.
If
the
bul
ly g
oe
s to
sc
hoo
l wit
h y
our
chi
ld...
If
the
bul
lyin
g h
ap
pe
ns t
hro
ugh
a c
ell
pho
ne...
If
the
bul
lyin
g h
ap
pe
ns t
hro
ugh
a W
eb
sit
e...
If
the
bul
lyin
g h
ap
pe
ns t
hro
ugh
Em
ail
or
Ins
tant
Me
ssa
ge
...
If
the
re is
the
thr
ea
t o
f p
hysi
ca
l da
nge
r...
Co
nta
ct
the
loc
al l
aw
enf
orc
em
ent
if t
here
is t
he t
hre
at
of
phy
sic
al h
arm
. The
y m
ay
als
o h
av
e a
sp
ec
ial c
yb
er
cri
me
s un
it t
hat
ca
n in
ve
stig
ate
.
Ne
tiq
uett
e T
ips
Ne
tiq
uett
e is
the
eti
que
tte
of
the
Int
ern
et,
sim
ple
rul
es
for
how
yo
u sh
oul
d a
ct
in
Cy
be
rsp
ac
e t
hat
kee
p t
hing
s p
olit
e a
nd h
elp
ev
ery
one
ge
t a
long
. He
re’s
so
me
tip
s fo
r b
ein
g
a g
oo
d C
yb
er
Cit
ize
n a
nd p
rac
tic
ing
go
od
Ne
tiq
uett
e:
Che
ck
for
typ
os
or
oth
er
mis
take
s b
efo
re y
ou
po
st o
r se
nd a
me
ssa
ge
. Use
e
mo
tic
ons
like
;)
and
ac
rony
ms
like
LO
L t
o g
et
yo
ur m
ess
ag
e a
cro
ss in
the
rig
ht
spir
it.
Av
oid
usi
ng A
LL
CA
PS
, it
me
ans
yo
u a
re s
hout
ing
.
Alw
ay
s a
sk p
erm
issi
on
be
fore
po
stin
g a
bo
ut s
om
eo
ne o
r sh
ari
ng a
n e
ma
il, p
hoto
, o
r c
hat
co
nve
rsa
tio
n, a
nd m
ake
sur
e t
hat
it d
oe
s no
t c
ont
ain
any
pe
rso
nal i
nfo
rma
tio
n.
Ke
ep
me
ssa
ge
s sh
ort
, p
olit
e,
and
to
the
po
int.
Do
n't
spa
m p
eo
ple
wit
h m
ulti
ple
m
ess
ag
es
or
wa
ste
the
ir t
ime
. Try
no
t to
use
to
o m
uch
cha
t sl
ang
if y
ou
thin
k th
e
oth
er
pe
rso
n w
on'
t un
de
rsta
nd it
.
Be
a C
ham
pio
n, n
ot
a C
hum
p
Be
po
lite
and
re
spe
ctf
ul o
f o
the
rs
Pay
Att
ent
ion
to F
orm
at
Ask
Be
fore
yo
u Po
st
Be
he
lpfu
l and
co
urte
ous
to
oth
ers
and
do
n't
be
a c
yb
er
bul
ly. I
f so
me
one
is b
ein
g
rud
e t
o y
ou,
be
the
be
tte
r p
ers
on.
Ta
lk t
o a
tru
ste
d a
dul
t, b
loc
k th
em
, o
r si
mp
ly
wa
lk a
wa
y. I
f th
ey
are
bul
lyin
g s
om
eo
ne e
lse
, d
on’
t jo
in in
and
ma
ke it
wo
rse
. Be
su
pp
ort
ive
and
po
siti
ve
and
try
to
he
lp t
he v
icti
m if
yo
u c
an.
Tip
s fo
r G
row
ing
a P
osi
tiv
e O
nlin
e R
ep
uta
tio
nYo
ur o
nlin
e r
ep
uta
tio
n c
an
be
po
siti
ve
or
neg
ati
ve
, it
all
de
pe
nds
on
how
yo
u b
eha
ve
whe
n y
ou'
re in
cy
be
rsp
ac
e a
nd w
hat
oth
er
pe
op
le s
ay
ab
out
yo
u.
Do
sha
re t
hing
s th
at
wo
uld
imp
rove
yo
ur r
ep
uta
tio
n a
s a
g
oo
d s
tud
ent
, a
go
od
fri
end
, a
nd a
te
am
pla
ye
r
Do
n’t
sha
re t
hing
s th
at
wo
uld
da
ma
ge
yo
ur r
ep
uta
tio
n a
s a
g
oo
d f
rie
nd a
nd a
re
spe
cta
ble
and
tru
stw
ort
hy p
ers
on
Do
n’t
sha
re t
hing
s th
at
will
ma
ke y
ou
a t
arg
et
for
we
ird
o
stra
nge
rs o
r b
ullie
s
Be
ca
refu
l ab
out
who
m y
ou
trust
wit
h y
our
re
put
ati
on
whe
n y
ou
ad
d t
hem
to
yo
ur f
rie
nds
and
sha
re t
hing
s w
ith
the
m
Be
on
the
lo
oko
ut
for
oth
ers
da
ma
gin
g y
our
re
put
ati
on
and
a
ct
quic
kly
to
min
imiz
e t
he d
am
ag
e