Fulfills Step 5 of GSUSA Junior Cybersecurity Basics badge requirements.
GSUSA VTK Disclaimer: Permission for use of Code.org activities is provided by Code.org, a non-profit dedicated to giving every student in every school the opportunity to learn computer science. See www.code.org.
Items Needed
Option A also needs:
- Scissors
- Index cards (6 per scout)
- Tape or glue
Instructions
- Explain that malware is software that can harm a computer. Share that the provided pictures show different types of malware and what they can do.
Option A
- Scouts cut out the malware images from their sheet.
- Tape or glue each image onto a separate index card to create a set of six trading cards. Each card represents a type of malware, such as:
- Spyware: Secretly gathers information.
- Adware: Uses ads to get private information.
- Ransomware: Blocks access unless money is paid.
- Computer Virus: Spreads bad code and destroys data.
- Worm: Damages emails and downloads.
- Trojan Horse: Tricks you into allowing harm.
- Once all cards are cut and ready for Scouts to take home, review the matches as a group. Scouts can share what they learned about each type of malware.
- Discuss how malware can harm computers based on the stories and card descriptions. Ask: How does malware get onto computers? (Examples: email attachments, unsafe downloads, websites.) How can scouts protect their computers? (Examples: using antivirus programs, asking an adult before clicking on unknown links, avoiding unsafe websites.)
Option B
- Pre-cut malware cards (one mixed-up set per scout or small group)
- Give each scout or small group a mixed-up set of malware cards.
- Scouts work individually or in groups to match the malware names with their descriptions. The goal is to create six complete sets:
- Spyware: Secretly gathers information.
- Adware: Uses ads to get private information.
- Ransomware: Blocks access unless money is paid.
- Computer Virus: Spreads bad code and destroys data.
- Worm: Damages emails and downloads.
- Trojan Horse: Tricks you into allowing harm.
- Once all sets are matched, review the correct answers as a group. Scouts can share what they learned about each type of malware.
- Discuss how malware can harm computers based on the stories and card descriptions. Ask: How does malware get onto computers? (Examples: email attachments, unsafe downloads, websites.) How can scouts protect their computers? (Examples: using antivirus programs, asking an adult before clicking on unknown links, avoiding unsafe websites.)