Malware Cards

Fulfills Step 5 of GSUSA Junior Cybersecurity Basics badge requirements.

GSUSA VTK Disclaimer: Permission for use of Code.org activities is provided by Code.org, a non-profit dedicated to giving every student in every school the opportunity to learn computer science. See www.code.org.

Items Needed

  • VTK Malware by GSUSA (one color copy per scout or small group)

Option A also needs:

  • Scissors
  • Index cards (6 per scout)
  • Tape or glue

Instructions

  1. Explain that malware is software that can harm a computer. Share that the provided pictures show different types of malware and what they can do.

Option A

  1. Scouts cut out the malware images from their sheet.
  2. Tape or glue each image onto a separate index card to create a set of six trading cards. Each card represents a type of malware, such as:
    • Spyware: Secretly gathers information.
    • Adware: Uses ads to get private information.
    • Ransomware: Blocks access unless money is paid.
    • Computer Virus: Spreads bad code and destroys data.
    • Worm: Damages emails and downloads.
    • Trojan Horse: Tricks you into allowing harm.
  3. Once all cards are cut and ready for Scouts to take home, review the matches as a group. Scouts can share what they learned about each type of malware.
  4. Discuss how malware can harm computers based on the stories and card descriptions. Ask: How does malware get onto computers? (Examples: email attachments, unsafe downloads, websites.) How can scouts protect their computers? (Examples: using antivirus programs, asking an adult before clicking on unknown links, avoiding unsafe websites.)

Option B

  1. Pre-cut malware cards (one mixed-up set per scout or small group)
  2. Give each scout or small group a mixed-up set of malware cards.
  3. Scouts work individually or in groups to match the malware names with their descriptions. The goal is to create six complete sets:
    • Spyware: Secretly gathers information.
    • Adware: Uses ads to get private information.
    • Ransomware: Blocks access unless money is paid.
    • Computer Virus: Spreads bad code and destroys data.
    • Worm: Damages emails and downloads.
    • Trojan Horse: Tricks you into allowing harm.
  4. Once all sets are matched, review the correct answers as a group. Scouts can share what they learned about each type of malware.
  5. Discuss how malware can harm computers based on the stories and card descriptions. Ask: How does malware get onto computers? (Examples: email attachments, unsafe downloads, websites.) How can scouts protect their computers? (Examples: using antivirus programs, asking an adult before clicking on unknown links, avoiding unsafe websites.)