| Full lesson | Create for a teacher a set of content for giving a lesson, beginning with the lesson plan. Each new block of materials must begin with an H1 heading (other subheaders must be H2, H3, etc). When you describe required pictures, write those descriptions in curly brackets, for example: {A picture of a triangle} |
| Which subject | Computer science |
| What topic | Social engineering |
| What length (min) | 30 |
| What age group | Year or Grade 9 |
| Class size | 20 |
| What curriculum | |
| Include full script | |
| Check previous homework | |
| Ask some students to presents their homework | |
| Add a physical break | |
| Add group activities | |
| Include homework | |
| Show correct answers | |
| Prepare slide templates | |
| Number of slides | 5 |
| Create fill-in cards for students | |
| Create creative backup tasks for unexpected moments |
Computer Science
Social Engineering
Year/Grade 9
30 minutes
20 students
| Step Number | Step Title | Length | Details |
|---|---|---|---|
| 1 | Check Homework | 5 minutes | Collect previous homework without asking for presentations. Review answers briefly. |
| 2 | Introduction to Social Engineering | 5 minutes | Provide an overview of social engineering. Discuss its relevance in today's digital world. |
| 3 | Types of Social Engineering | 5 minutes | Present various types of social engineering techniques (e.g., phishing, pretexting). |
| 4 | Printable Cards Activity | 10 minutes | Distribute printable cards. Students fill in what they understand about social engineering. |
| 5 | Collect and Check Cards | 3 minutes | Randomly check or collect some cards for understanding and engagement. |
| 6 | Assign Homework | 2 minutes | Briefly explain the homework assignment without providing specifics. |
"Good morning, class! Before we dive into today’s lesson, let’s quickly check your homework from last time. Please hand in your assignments without any presentations. Just pass them to the front row, and I’ll review them briefly."
(Collect the homework and take a moment to give brief feedback.)
"Thank you! I appreciate your efforts. Now, let’s move on to our topic for today."
"Today, we're going to explore a very important subject in computer science: social engineering. Does anyone know what social engineering is?
(Silence waits for responses.)
"Great guesses! Social engineering is about manipulating people into divulging confidential information. In our increasingly digital world, understanding this concept is crucial to our safety and security online."
"Social engineering attacks can happen to anyone, at any time, and they're often disguised as legitimate requests. So, stay tuned because we will discuss how these techniques work and why they matter."
"Now that we have a basic understanding of social engineering, let's dive deeper into the different types of techniques used.
"First up, we have phishing. Who can tell me what phishing is?"
(Encourage students to respond.)
"That's correct! Phishing typically involves deceiving someone into providing sensitive information through fake emails or websites. Next, there's pretexting. This happens when someone creates a fabricated scenario to steal information. Can anyone think of a situation where pretexting might occur?"
(Encourage students to share their thoughts.)
"Good examples! There are many other methods, such as baiting and tailgating, but we don’t have time to go through all of them today. What you need to remember is that these tactics are often used to exploit human psychology rather than technical flaws."
"Now, let’s jump into an activity to help reinforce what we've learned. I’m going to give each of you a printable card. On this card, I want you to write down in your own words what social engineering is and give at least one type of social engineering technique we discussed today.
"Take about ten minutes to fill this out. Remember, this is your chance to express your understanding!"
(Distribute the cards and give students time to work on them.)
"Make sure you’re as thorough as possible, as we’ll be sharing and discussing them right after."
"Time’s up! Please pass your cards to the front. I will randomly check a few of them to get a sense of your understanding. Don't worry, this is not a grade; it’s just to see how well we grasped the concept of social engineering."
(Collect the cards and review a few, providing positive feedback and addressing any misconceptions.)
"I see some great insights here! For example, I loved how one of you explained phishing with a current event. That’s exactly the kind of thinking we need!"
"Before we wrap up, I want to assign some homework. Your task is to research a real-life case of social engineering and write a short paragraph about it. Don’t worry about the length; just focus on the key points. I will provide more specifics about this in the next class."
"Let's end our session here. Remember to be vigilant online and think critically about the information you share. See you next class!"
Define social engineering in your own words. Why is it important to understand this concept?
Identify and describe at least three different types of social engineering techniques. Provide a real-world example for each.
Conduct research on a real-life case of social engineering. Write a short paragraph that summarizes the case, including the method used and the impact it had.
Explain phishing. How does it work, and what are some warning signs that someone might be a victim of phishing?
What is pretexting? Describe a scenario where pretexting could be used to trick someone into providing personal information.
Discuss the psychological tactics involved in social engineering. Why do these tactics make it easier for attackers to manipulate individuals?
Reflect on the printable card activity. What did you learn from expressing your understanding of social engineering on the card? How did discussing with your peers enhance your learning?
How can individuals protect themselves from social engineering attacks? List at least three strategies.
| Question | Answer |
|---|---|
| What is social engineering? | |
| Can you give an example of a phishing attack? | |
| What does pretexting involve? | |
| How do social engineering techniques exploit human psychology? | |
| What are baiting and tailgating in the context of social engineering? | |
| Why is it important to understand social engineering in today's digital world? | |
| What should you do if you receive a suspicious email that asks for personal information? | |
| How can you protect yourself from social engineering attacks? | |
| What was one insight or example shared during the card collection activity? | |
| What is the homework task assigned for this lesson? |