BE CYBERSMART -HECTOR'S WORLD
"It is important to remember that this is an issue of behaviour, more than it is of technology.
We really need to get serious about behaviour and support schools to focus on building a
culture of respect and caring in addition to teaching the traditional academic subjects."
Dr Judith Slocombe CEO, The Alannah and Madeline Foundation.
Year One
Meet his friends-look at them
Talk about them
View the first video
Keep your information safe videos
The Info Gang (SWF 8.1Mb)
Tama uncovers the info gang’s evil plans to sell her friends personal information. Will Constable Solosolave save the day?
Details, Details (SWF 4Mb)
Hector and his friends learn about their personal information—what it is, who should it be shared with and how can it be used
Discuss
Meet his friends-look at them
Talk about them
View the first video
Keep your information safe videos
The Info Gang (SWF 8.1Mb)
Tama uncovers the info gang’s evil plans to sell her friends personal information. Will Constable Solosolave save the day?
Details, Details (SWF 4Mb)
Hector and his friends learn about their personal information—what it is, who should it be shared with and how can it be used
Discuss
http://www.netsmartz.org/Presentations/Kids_K_2
Years 1 & 2 Cyberbullying
My Digital Citizenship Cybersafety & Cyberbullying Pinterest Board
CYBERSAFETY k-2
|
Unit Vocabulary: Attachment (email) Backup CD ROM Computer virus Cybersecurity Data Download DVD Flash drive Infected Internet Internet-enabled device Malware Online Popup Report Scan Site USB Virus Web |
meet zippep's friendsKey issues addressed
MALWARE
Malware is any kind of bad (malicious) software. A computer virus is one type of malware. There are different types of malware, and it is a serious threat. Malware can steal your passwords or other personal information. It may also let a hacker take control of your computer, so they can pretend to be you online or use your computer to commit a crime. Malware will probably slow your computer down, and may corrupt, destroy or delete your files. Malware can also forward itself from your computer to other computers without your knowing about it. Computers can be infected from an email (attachment), a bad or dodgy download from the web, or from an infected USB (flash) drive, CD ROM or DVD. |
In this game-based activity, the
student moves a scanning beam by using the arrows on their keyboard to scan all the downloads—USB memory sticks, email attachments, DVDs, CD-ROMs and hard drives. Each of these objects contains either a piece of fruit (positive points) or a virus (negative points). The student must scan each download before it docks, in case a hidden virus eliminates all the fruit. This fun game encourages the student to scan all downloads for potentially harmful viruses. To conclude, the student chooses answers for three questions about computer viruses. If the student chooses an incorrect answer, they are prompted to choose again until the correct answer is selected. FOLLOW UP ACTIVITIES
Whole-class discussion to review learning objectives Brainstorm the different types of data that people keep on computers, and make a list of good things that may be lost if a computer is corrupted. Whole-class discussion about bad things that may have happened to computers at home. Make a list. Discuss why it’s important to report (to teachers, parents or carers) anything bad that happens online: that it helps to make the web safer and more secure for everyone. |