Interactive Cyber Security Activities for Children

Slide Note
Embed
Share

Engage children in interactive activities to explore the importance of updating devices, identifying vulnerabilities, and improving cyber security knowledge through games like Cyber Vocab Bingo and Updating Phone Game.


Uploaded on Jul 12, 2024 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. Download presentation by click this link. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

E N D

Presentation Transcript


  1. Activities 2b & 2c: Updating devices Practitioner notes

  2. Learning outcomes In these activities children will: Explore why updating devices is important. Identify what needs updating, and why. Identify how devices can be updated. Learn why manufacturers and app developers fix weaknesses in both devices and apps. Improve their knowledge of cyber security terminology.

  3. Game instructions: Cyber Vocab Bingo Players choose any 9 terms from the vocabulary board, and arrange them in a 3 x 3 grid. One person (the caller) reads out a description from the Caller Board , and marks it on their grid. Note the caller does not call out the actual word. If player has the matching word, they mark it on their own grid. The first player who can cross off 3 words in a line (horizontal, vertical or diagonal) wins. Just as in conventional bingo, the caller then checks that the winner s card matches what has been called out.

  4. Game instructions: Updating Phone Game This is a game for two players, each of which has a phone containing coloured squares which represent vulnerabilities in the device or (or apps). To prepare, cut up the cash token cards and divide equally between the two players. Cut up the question-and- answer cards and lay them face down in one pile. Cut up all the other cards (phone cards) and shuffle them to mix them all up, and place then face down in a separate pile. Players take it in turns to pick a phone card. They will either pick a: patch card which they use this to fix vulnerabilities by laying it on the corresponding coloured square on the phone (if they already have this patch then they return the card to the bottom of the pile) a security feature card which will protect them from a cyber criminal when they next pick one of those cards (after use, the card is returned to the bottom of the phone card pile) one of the three cyber criminal cards The three cyber criminal cards are: Hacker, who takes control of their phone and prevents them from applying the next update. Trojan, who tricks them and taken control of their phone. The player either has to correctly answer a question from the question card pile (read by their opponent), or has to pay one cash token to rid themselves of the Trojan (who is returned to the pile). Clone, who has steals the player s identity. To get their identity back, the player has to correctly answer a question from the question card pile (read by their opponent) or has to pay one cash token. A player wins if they are the first player to completely secure their phone with patches, or if their opponent runs out of money. If a player manages to completely secure their phone then they get a secret code to access the Nano character.

More Related Content