0% found this document useful (0 votes)
51 views9 pages

Teacher Guide - Cybercrime and Computer Forensics Unit

Uploaded by

fatima.moreno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
51 views9 pages

Teacher Guide - Cybercrime and Computer Forensics Unit

Uploaded by

fatima.moreno
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 9

Cybercrime and Computer Forensics Unit

Teacher Guide

This unit is designed to be completed over 12 45-minute class periods. Outlined below are the daily activities and
topics covered in the unit along with any required preparation or teacher notes.

Day 1: What is Cybercrime?; Online Safety and Privacy

Materials ● Students should work through their own copy of the “Online Safety and Cybercrime”
Needed: slide deck.

● Teachers should ensure that each student gets their own copy of the “Online Safety
Teacher Prep: and Cybercrime” slide deck. If assigned on Google Classroom, students should each
be assigned their own copy.

● What is Cybercrime?
● What is Online Personal Data?
● What is a Digital Footprint?
● How to protect online data
● Scams
Topics Covered:
● Ransomware attacks
● Pop-ups
● Phishing
● Spam
● What is the Dark Web?

The “Online Safety and Cybercrime” slide deck contains a variety of student activities,
including:
● Asking students to answer the question, “How do online cyber criminals try to get your
Student data and personal information?”
Activities: ● Asking students to sort descriptions of online threats into the appropriate type (scam,
ransomware, etc.)
● Asking students to identify online safety missteps in three different scenarios
● Student reflections activity
Day 2: Famous Cybercrimes and Their Impact

Materials ● Students should work through their own copy of the “Famous Cybercrimes and Their
Needed: Impact” slide deck.

● Teachers should ensure that each student gets their own copy of the “Famous
Cybercrimes and Their Impact” slide deck. If assigned on Google Classroom, students
Teacher Prep:
should each be assigned their own copy. I’ve also provided a teacher key for this
activity.

● The Melissa Virus (What happened, how perpetrator was caught, after-effects)
● NASA Cyber Attack (What happened, how perpetrator was caught, after-effects)
Topics Covered:
● Darkode Cyber Criminal Forum (What it was, how it worked, and how it was taken
down)

The “Famous Cybercrimes and Their Impact” slide deck contains a variety of student activities,
including the following student questions:
● What impact did the Melissa Virus have on computer systems?
● How did the Melissa Virus spread so quickly?
● What advice would you have given users in 1999 to avoid being victims of the Melissa
Virus?
● What measures could have been taken by NASA to prevent James Jonathan from
hacking into their systems?
● Why do you think the Darkode Forum was created? What need did it fill?
● What role does the Dark Web play in facilitating cybercrime?

Additionally, students will be asked to research one of the following cyberattacks:


Student ● The Sony Pictures Hack (2014)
Activities:
● The DarkSide Ransomware Attack on Colonial Pipeline (2021)
● The TJX Companies Data Break (2007)
● The Stuxnet Worm (2010)
For whichever attack they choose to research, they will answer the following questions:
● Briefly explain what happened during this cyberattack. Who were the victims? What
happened during the attack (system shutdown, data leak, etc.)?
● Briefly explain the impact of this cyberattack. In other words, did companies or victims
lose money? Were any major systems disrupted? What happened as a result of this
cyberattack?
● Who was responsible for the cyberattack? Or was the perpetrator never caught?
● Identify two valuable lessons (online safety, cybersecurity, awareness, etc.) that could
be learned from this attack. Explain.
Day 3: Catfishing

Materials ● Students should work through their own copy of the “Catfishing Activity” slide deck.
Needed: ● Students should also be given access to the Catfishing Article and Article Questions.

● Teachers should ensure that each student gets their own copy of the “Catfishing
Activity” slide deck. If assigned on Google Classroom, students should each be
assigned their own copy. I’ve also provided a teacher key for this activity.
Teacher Prep: ● Teachers should also make the Catfishing Article and the Article Questions available to
students. There is a PDF version of the article on Google Drive, but the direct link to the
article is: https://www.irishtimes.com/life-style/people/2022/06/06/gaa-catfish-the-2-
johnnies-and-the-fake-identity-case-theyre-cracking/

● What is Catfishing?
Topics Covered: ● Notable Catfishing Cases
● Red flags to help identify catfishing attempts

Student ● Students will be asked to identify catfishing red flags in three examples
Activities: ● Students will read a Catfishing article and answer questions about its content
Day 4: Red Flag Infographic/Informational Poster

● Red Flag Infographic/Informational Poster activity directions/rubric


Materials ● Red Flag Infographic/Informational Poster example (second page of activity directions).
Needed: Note that the example is over a different topic (online safety) instead of catfishing red
flags. This is so that students don’t copy the example poster for their own work..

● Teachers should ensure that each student gets their own copy of the “Red Flag
Infographic/Informational Poster” activity directions and rubric.
● Teachers should also ensure that students are shown/given a copy of the Red Flag
Teacher Prep:
Infographic/Informational Poster example (on second page of activity directions). Note
that the example is over a different topic (online safety) instead of catfishing red flags.
This is so that students don’t copy the example poster for their own work.

Topics Covered: ● Red flags to help identify catfishing attempts

Student Students will be asked to create an informational poster/infographic detailing red flags for
Activities: catfishing attempts.
Day 5 - 6: Hacktivism

● Hacktivism slide deck


● Job Posting Example
● Job Posting Rubric
Materials ● Informational Brochure Activity Example - Note: This brochure is over Online Privacy
Needed:
instead of Hacktivism to discourage students copying information.
● Informational Brochure Activity Template
● Informational Brochure Activity Rubric

● Make sure all of the materials listed above are available to students before the lesson.
Teacher Prep: The only materials that need to be editable by students are the Hacktivism slide deck
and the Informational Brochure Activity Template.

● What is hacktivism?
● Brief history of hacktivism
● Motivations for hacktivism
● Overview of hacktivist methods
Topics Covered: ● Notable hacktivist groups - Anonymous, LulzSec, Syrian Electronic Army
● Notable hacktivist attacks
● Hacktivism trends
● Ethics surrounding hacktivism
● Future of Hacktivism in age of AI

● Students will answer the following questions throughout the slidedeck:


○ What do you think “hacktivism” is?
○ Why do you think hacktivists do what they do?
○ Which of these hacktivist motivations is most important to you? Why?
○ Have you heard of any hacktivist groups? If so, which one(s)?
○ What distinguishes hacktivism from traditional forms of activism?
○ What ethical dilemmas do hacktivists face when engaging in cyberattacks for a
cause?
○ How can hacktivism impact freedom of speech, both positively and negatively?
○ What are some potential consequences of hacktivist actions on individuals and
organizations?
Student ○ Why is anonymity important to many hacktivists, and what are the challenges
Activities: associated with maintaining it?
○ What role does hacktivism play in promoting online privacy and security?
○ What ethical responsibilities do hacktivists have toward protecting the rights and
privacy of individuals who may be affected by their actions?
● Students will create a fictional job posting for a hacktivism group that details the
title/description of the role, responsibilities and tasks, desired skills and qualifications,
and ethical considerations and commitment to the cause.
● Students will briefly research one of the attacks featured in the slide deck to determine
if the hacktivists achieved their goal.
● Students will create an informational brochure detailing whether they think hacktivism is
morally right or wrong and their reasons why
● Students will answer critical thinking questions about hacktivism
Day 7: What is Cyber Forensics?

● Intro to Cyber Forensics Slide Deck


Materials ● Collage Activity Example - Note: This example is over the topic of online privacy to
Needed:
discourage student cheating.

● Ensure that students have access to all of the above resources. They should be able to
Teacher Prep:
edit their own copy of the Intro to Cyber Forensics Slide Deck.

● What is cyber forensics?


Topics Covered: ● History of cyber forensics
● Types of cyber forensics

● Students will be asked to research the challenges that one of the following technologies
pose to the field of cyber forensics: Artificial Intelligence, Quantum Computing.They will
also be asked to suggest possible mitigations that can be used to address these
Student challenges.
Activities:
● Students will be asked to match the type of cyber forensic evidence with its description
● Students will complete a collage activity, where they are asked to compile various
images that represent different types of cyber forensics
Day 8: Notable Criminal Cases Solved with Cyber Forensics

● Timeline Template (in Google Slides)


Materials ● Timeline Example (in Google Slides)
Needed:
● High Profile Criminal Cases Solved with Cyber Forensics slide deck

Make sure all of the above resources are made available to students. Students should be able
Teacher Prep: to edit the Timeline Template and the High Profile Criminal Cases Solved with Cyber Forensics
slide decks. The BTK Timeline Example can be shared as “View Only”.

● Notable criminal cases that have been solved with digital forensic tools are profiled.
Cases include:
Topics Covered: ○ BTK
○ Golden State Killer
○ Craigslist Killer

● Students will answer the following questions:


○ In your own words, explain the role that cyber forensics played in identifying the
Craigslist Killer?
○ Why do you think BTK liked to communicate with the media? How do you think
this resulted in his downfall?
○ What would you do if you got off work and found a mysterious package in your
vehicle?
○ Why do you think BTK trusted the police to give him tech advice? What could
this indicate?
Student ○ In your own words, explain the role that cyber forensics played in finally
Activities: identifying BTK?
○ In your own words, explain the role that cyber forensics played in finally
identifying the Golden State Killer?
● Students will create a timeline of investigative events that outlines the importance cyber
forensics played in solving the case of one of the following criminals:
○ Scott Peterson
○ Oscar Pistorius
○ Stephen Allwine
Their timeline will include the date, if known, a description of the event, and an
explanation as to why that evidence was important to the investigation.
Days 9 - 10: Solve a Murder using Cyber Forensic Evidence

● Link to Cyber Forensics Website:


Materials https://sites.google.com/caseywestfield.org/cyberforensics/home
Needed: ● Evidence Tracking Sheet
● Crime Solution

● Before class begins, post the link to the Cyber Forensics Website
(https://sites.google.com/caseywestfield.org/cyberforensics/home) on Google
Classroom
● Give students access to the Evidence Tracking Sheet. You can either post this on
Google Classroom for them to have their own copy or print it out for them to write on.
Teacher Prep:
Sometimes it seems easier for students to write on the paper rather than switch
between the website and the Google Doc to track their evidence.
● DO NOT post the Crime Solution. This is for you, the teacher, to use. You can choose
to reveal who the killer is at the end of the activity, should you desire, or just leave it a
mystery to the students.

Topics Covered: The use and importance of cyber forensics in solving crimes.

Students will visit the website linked above, examine the cyber forensic evidence, and
Student determine which of the suspects is the serial killer. They will complete their evidence tracking
Activities:
sheet as they read through the descriptions of the crimes, evidence, and suspects.
Days 11 - 12: Future of Cyber Forensics in the Age of AI

● Future of Cyber Forensics Slide Deck


Materials ● Press Release Activity Sheet (includes student directions, an example, and a rubric)
Needed: ● Future of Cyber Forensics Scenarios and Discussion Questions
● Future of Cyber Forensics Ethical Dilemma Scenarios

● Students should be given their own copy of all of the materials listed above. The
“Future of Cyber Forensics” slide deck, the Ethical Scenarios, and the Future of Cyber
Teacher Prep:
Forensics Scenarios should all be able to be edited by the students. The Press Release
Activity can be set to View Only.

● Traditional vs Modern Cyber Forensics


● Artificial Intelligence in Forensics
Topics Covered: ● Deepfake Technology
● Virtual Reality Crimes
● Ethical Considerations

● Students will be asked to answer the following questions:


○ What ethical and security concerns do you think deepfakes have raised?
○ How do you think deepfake technology threats can be countered or guarded
against?
○ List and explain three ways in which AI can help streamline or improve cyber
Student forensic investigations.
Activities: ● Students will create a press release detailing the impact that a modern cyber forensic
tool/method has on combating cybercrime.
● Students will examine ethical scenarios in the use of cyber forensics. For each
scenario, they will pick a course of action and explain their reasoning.
● Students will examine future cyber forensic situations and answer discussion questions
about each situation.

You might also like