Fulfills Step 5 of GSUSA Junior Cybersecurity Basics badge requirements.
GSUSA VTK Disclaimer: Permission for use of Code.org activities is provided by Code.org, a non-profit dedicated to giving every student in every school the opportunity to learn computer science. See www.code.org.
Yes, knowing the detailed cyber crime scenarios would adjust the instructions slightly to focus more on matching the malware cards to the story and enhancing the connection between the card types and the crimes described. Here’s the revised activity:
Items Needed
- VTK Cyber Crime Cases by GSUSA (one copy to read aloud)
- VTK Malware by GSUSA (pre-cut, mixed-up sets for scouts or small groups)
Instructions
- Start by reviewing the malware cards and their descriptions as a group. Ensure everyone understands the six types of malware: Ransomware, Adware, Computer Virus, Worm, Trojan Horse, and Spyware. Give each scout or small group a set of malware cards.
- Read the first cyber crime scenario aloud from the Cyber Crimes sheet.
- Scouts work together to find the malware card that matches the crime. Once they identify the correct card, they explain why it fits the scenario.
- Continue reading each cyber crime scenario and identifying the correct malware type until all six stories are solved.
- Discuss how malware can harm computers based on the stories and card descriptions. Ask: How does malware get onto computers? (Examples: email attachments, unsafe downloads, websites.) How can scouts protect their computers? (Examples: using antivirus programs, asking an adult before clicking on unknown links, avoiding unsafe websites.)