Interactive Presentation

Teacher's Notes

Teacher's Notes

Initial concepts

What it is: Viruses, trojans, ransomware, spyware

How it spreads: Downloads, infected attachments, compromised websites

Real impact: Stolen data, damaged devices, identity theft

Red flags: Unexpected pop-ups, slow device, unknown programs running

Activity

  • Show 2 examples of emails/messages (mix of real and phishing)

  • Students work in pairs to identify which are suspicious

  • Discuss what clues gave it away

Digital Citizenship & Your Digital Footprint

Interactive Discussion:

Your Digital Footprint:

  • "Everything you post, like, comment, or share creates a permanent record"

  • "College admissions officers and future employers check social media"

  • "Screenshots last forever, even if you delete the original"

The THINK Model (Before posting/sharing)

Is It True?

Is it Helpful?

Is it Inspiring?

Is it Necessary?

Is it Kind?

Cyberbullying & Online Harassment

  • Definition and examples

  • Why it's serious (legal consequences, emotional harm)

  • How to respond:

    • Don't engage/retaliate

    • Document evidence (screenshots)

    • Block and report

    • Tell a trusted adult

    • Support victims

Discussion:

  • "What makes someone a good digital citizen?"

  • "How can we create a positive online culture?"


Protection Tools & Strategies

Layered Security Approach

Technical Protection - CIRA Canadian Shield

  • Free tool built by Canadians for Canadians

  • Blocks malicious websites and phishing links automatically

  • Works on all your devices (phones, tablets, computers)

  • No installation needed on most devices

  • Three protection levels: Private, Protected, Family

Strong Password Practices

  • Use unique passwords for each account

  • Make them long (12+ characters) and complex

  • Consider using a password manager

  • Enable two-factor authentication (2FA) when available

  • Never share passwords

Privacy Settings

  • Review privacy settings on all social media

  • Limit who can see your posts and information

  • Be selective about friend/follow requests

  • Turn off location sharing when not needed

  • Google yourself to see what's public

Smart Browsing Habits

  • Look for HTTPS and padlock icon

  • Avoid public WiFi for sensitive activities

  • Keep software and apps updated

  • Don't click suspicious links

  • Verify before you trust

Demonstration: If possible, show students:

  • How to check a website's security certificate

  • How to set up 2FA on a common platform

  • How to adjust privacy settings on social media

  • How to install/enable CIRA Canadian Shield

Last updated

Was this helpful?