You need to create a plan of a lesson for a teacher. Format it using markdown formatting (do not use html tags, only use markdown, including...
Full lessonCreate for a teacher a set of content for giving a lesson, beginning with the lesson plan. Each new block of materials must begin with an H1 heading (other subheaders must be H2, H3, etc). When you describe required pictures, write those descriptions in curly brackets, for example: {A picture of a triangle}
Which subjectComputer science
What topicSocial engineering
What length (min)30
What age groupYear or Grade 9
Class size20
What curriculum
Include full script
Check previous homework
Ask some students to presents their homework
Add a physical break
Add group activities
Include homework
Show correct answers
Prepare slide templates
Number of slides5
Create fill-in cards for students
Create creative backup tasks for unexpected moments

Lesson plan

Lesson Plan: Social Engineering in Computer Science

Subject

Computer Science

Topic

Social Engineering

Grade/Age Group

Year/Grade 9

Length

30 minutes

Class Size

20 students

Objectives

Materials

Lesson Structure

Step Number Step Title Length Details
1 Check Homework 5 minutes Collect previous homework without asking for presentations. Review answers briefly.
2 Introduction to Social Engineering 5 minutes Provide an overview of social engineering. Discuss its relevance in today's digital world.
3 Types of Social Engineering 5 minutes Present various types of social engineering techniques (e.g., phishing, pretexting).
4 Printable Cards Activity 10 minutes Distribute printable cards. Students fill in what they understand about social engineering.
5 Collect and Check Cards 3 minutes Randomly check or collect some cards for understanding and engagement.
6 Assign Homework 2 minutes Briefly explain the homework assignment without providing specifics.

Additional Notes

Lesson script

Check Homework

"Good morning, class! Before we dive into today’s lesson, let’s quickly check your homework from last time. Please hand in your assignments without any presentations. Just pass them to the front row, and I’ll review them briefly."

(Collect the homework and take a moment to give brief feedback.)

"Thank you! I appreciate your efforts. Now, let’s move on to our topic for today."

Introduction to Social Engineering

"Today, we're going to explore a very important subject in computer science: social engineering. Does anyone know what social engineering is?

(Silence waits for responses.)

"Great guesses! Social engineering is about manipulating people into divulging confidential information. In our increasingly digital world, understanding this concept is crucial to our safety and security online."

"Social engineering attacks can happen to anyone, at any time, and they're often disguised as legitimate requests. So, stay tuned because we will discuss how these techniques work and why they matter."

Types of Social Engineering

"Now that we have a basic understanding of social engineering, let's dive deeper into the different types of techniques used.

"First up, we have phishing. Who can tell me what phishing is?"

(Encourage students to respond.)

"That's correct! Phishing typically involves deceiving someone into providing sensitive information through fake emails or websites. Next, there's pretexting. This happens when someone creates a fabricated scenario to steal information. Can anyone think of a situation where pretexting might occur?"

(Encourage students to share their thoughts.)

"Good examples! There are many other methods, such as baiting and tailgating, but we don’t have time to go through all of them today. What you need to remember is that these tactics are often used to exploit human psychology rather than technical flaws."

Printable Cards Activity

"Now, let’s jump into an activity to help reinforce what we've learned. I’m going to give each of you a printable card. On this card, I want you to write down in your own words what social engineering is and give at least one type of social engineering technique we discussed today.

"Take about ten minutes to fill this out. Remember, this is your chance to express your understanding!"

(Distribute the cards and give students time to work on them.)

"Make sure you’re as thorough as possible, as we’ll be sharing and discussing them right after."

Collect and Check Cards

"Time’s up! Please pass your cards to the front. I will randomly check a few of them to get a sense of your understanding. Don't worry, this is not a grade; it’s just to see how well we grasped the concept of social engineering."

(Collect the cards and review a few, providing positive feedback and addressing any misconceptions.)

"I see some great insights here! For example, I loved how one of you explained phishing with a current event. That’s exactly the kind of thinking we need!"

Assign Homework

"Before we wrap up, I want to assign some homework. Your task is to research a real-life case of social engineering and write a short paragraph about it. Don’t worry about the length; just focus on the key points. I will provide more specifics about this in the next class."

"Let's end our session here. Remember to be vigilant online and think critically about the information you share. See you next class!"

Homework

  1. Define social engineering in your own words. Why is it important to understand this concept?

  2. Identify and describe at least three different types of social engineering techniques. Provide a real-world example for each.

  3. Conduct research on a real-life case of social engineering. Write a short paragraph that summarizes the case, including the method used and the impact it had.

  4. Explain phishing. How does it work, and what are some warning signs that someone might be a victim of phishing?

  5. What is pretexting? Describe a scenario where pretexting could be used to trick someone into providing personal information.

  6. Discuss the psychological tactics involved in social engineering. Why do these tactics make it easier for attackers to manipulate individuals?

  7. Reflect on the printable card activity. What did you learn from expressing your understanding of social engineering on the card? How did discussing with your peers enhance your learning?

  8. How can individuals protect themselves from social engineering attacks? List at least three strategies.

Printables

Question Answer
What is social engineering?
Can you give an example of a phishing attack?
What does pretexting involve?
How do social engineering techniques exploit human psychology?
What are baiting and tailgating in the context of social engineering?
Why is it important to understand social engineering in today's digital world?
What should you do if you receive a suspicious email that asks for personal information?
How can you protect yourself from social engineering attacks?
What was one insight or example shared during the card collection activity?
What is the homework task assigned for this lesson?