Fulfills Step 4 of GSUSA Cadette Cybersecurity Investigator badge requirements.
Info Needed for badge requirements: A Device Log is like a diary for a computer, tablet, or phone. It keeps track of who used the device, what they did, and when they did it. For example, it might show that someone sent a text at 3:00 PM or watched a video at 4:15 PM. These logs are helpful for figuring out problems or understanding how the device was used
Items Needed:
- VTK Device Logs by GSUSA
- Pens or pencils for scouts
- (Optional) VTK Log File by GSUSA
Instructions
- Explain what Log Files are. (Optional) Show them a sample Log File.
- Ask scouts to contribute to the Device Logs placed around the room. Explain that the Device Logs are pretend records for shared devices. Scouts should write down a fake activity as if they were using the device, using their own name or made-up names. Each entry should include:
- The time the activity started and stopped.
- The name of the person using the device (real or made-up).
- What they did on the device (e.g., texted a friend, watched a video).
- Example: Cell Phone: 12:13 – 12:18, Jordan called their parent.
- Example: Tablet: 12:30 – 12:41, Alex video chatted with a cousin.
- Scouts can add 1-2 entries to each Device Log, contributing to a variety of logs as they move around the room. How long can they make them?