Interactive Presentation
Teacher's Notes
Teacher's Notes
Initial concepts
What it is: Viruses, trojans, ransomware, spyware
How it spreads: Downloads, infected attachments, compromised websites
Real impact: Stolen data, damaged devices, identity theft
Red flags: Unexpected pop-ups, slow device, unknown programs running
What it is: Tricks to steal your information
Common tactics:
Emails that look official (bank, school, Netflix)
Fake login pages
Urgency tactics ("Your account will be closed!")
Requests for personal information
How to spot it:
Check sender's email address carefully
Look for spelling/grammar errors
Hover over links (don't click) to see real URL
Verify through official channels
What's at risk: Passwords, photos, location, browsing history, personal messages
Who wants it: Hackers, scammers, companies, data brokers
Long-term consequences: Identity theft, embarrassment, college/job applications
Activity
Show 2 examples of emails/messages (mix of real and phishing)
Students work in pairs to identify which are suspicious
Discuss what clues gave it away
Digital Citizenship & Your Digital Footprint
Interactive Discussion:
Your Digital Footprint:
"Everything you post, like, comment, or share creates a permanent record"
"College admissions officers and future employers check social media"
"Screenshots last forever, even if you delete the original"
The THINK Model (Before posting/sharing)
Is It True?
Is it Helpful?
Is it Inspiring?
Is it Necessary?
Is it Kind?
Cyberbullying & Online Harassment
Definition and examples
Why it's serious (legal consequences, emotional harm)
How to respond:
Don't engage/retaliate
Document evidence (screenshots)
Block and report
Tell a trusted adult
Support victims
Discussion:
"What makes someone a good digital citizen?"
"How can we create a positive online culture?"
Protection Tools & Strategies
Layered Security Approach
Technical Protection - CIRA Canadian Shield
Free tool built by Canadians for Canadians
Blocks malicious websites and phishing links automatically
Works on all your devices (phones, tablets, computers)
No installation needed on most devices
Three protection levels: Private, Protected, Family
Strong Password Practices
Use unique passwords for each account
Make them long (12+ characters) and complex
Consider using a password manager
Enable two-factor authentication (2FA) when available
Never share passwords
Privacy Settings
Review privacy settings on all social media
Limit who can see your posts and information
Be selective about friend/follow requests
Turn off location sharing when not needed
Google yourself to see what's public
Smart Browsing Habits
Look for HTTPS and padlock icon
Avoid public WiFi for sensitive activities
Keep software and apps updated
Don't click suspicious links
Verify before you trust
Demonstration: If possible, show students:
How to check a website's security certificate
How to set up 2FA on a common platform
How to adjust privacy settings on social media
How to install/enable CIRA Canadian Shield
Last updated
Was this helpful?