Imaginary Device Logs

Fulfills Step 4 of GSUSA Cadette Cybersecurity Investigator badge requirements.

Info Needed for badge requirements: A Device Log is like a diary for a computer, tablet, or phone. It keeps track of who used the device, what they did, and when they did it. For example, it might show that someone sent a text at 3:00 PM or watched a video at 4:15 PM. These logs are helpful for figuring out problems or understanding how the device was used

Items Needed:

Instructions

  • Explain what Log Files are. (Optional) Show them a sample Log File.
  • Ask scouts to contribute to the Device Logs placed around the room. Explain that the Device Logs are pretend records for shared devices. Scouts should write down a fake activity as if they were using the device, using their own name or made-up names. Each entry should include:
    • The time the activity started and stopped.
    • The name of the person using the device (real or made-up).
    • What they did on the device (e.g., texted a friend, watched a video).
    • Example: Cell Phone: 12:13 – 12:18, Jordan called their parent.
    • Example: Tablet: 12:30 – 12:41, Alex video chatted with a cousin.
  • Scouts can add 1-2 entries to each Device Log, contributing to a variety of logs as they move around the room. How long can they make them?