Professional Documents
Culture Documents
Cyberaces 1 3 Communication
Cyberaces 1 3 Communication
At Palo Alto Networks, we believe protecting our digital way of life is a privilege, and with that privilege, we
strive to educate the world on all aspects of cybersecurity.
That’s why we’ve created the Cyber A.C.E.S. (Activities in Cybersecurity Education for Students) Program. Our
goal is to demystify cybersecurity through interactive learning and equip youth ages 5–16 with resources to
have safer online experiences, become good digital citizens, and maybe even pursue careers in cybersecurity.
By participating in Cyber A.C.E.S., students will learn cybersecurity basics like how and why they should
physically secure their technology, whom they’re talking to online, and the permanence of information on
the internet.
Each tailored lesson offers instructors, facilitators, and parents:
Thank you for taking the time to help our youth understand the value of protecting their digital future—
a future where every day is safer and more secure than the one before.
Sincerely,
Palo Alto Networks
Page 2
AGE BAND 5–7
INSTRUCTIONAL GUIDE
Lesson 3: Communication | Who Are You Talking To?
Devices can easily connect people all around the world. Children cannot be
sure who they’re talking to online. It’s important for children to understand
the types of information that are acceptable to share and types of information
that can make them personally identifiable. We also know that non-identifiable
information can sometimes be compiled to become identifiable information.
In this lesson, children will learn the importance of keeping their identities secure and private when they’re
online. They will make a mask to demonstrate how people can hide their identities online. They will play a
game to figure out what kinds of information are unique and identifying to them. Finally, they will apply what
they have learned by classifying different types of information as “okay to share” or “not okay to share” online.
As with other Cyber A.C.E.S. lessons, this lesson refers to the Cyber A.C.E.S. Online Safety Rules, which are:
3. Tell a trusted adult if you see anything that makes you feel uncomfortable.
VOCABULARY
□ Email: A message sent to a specific email address
□ Instant messaging/text chat: A type of online chat that offers real-time transmission of messages,
images, and files
□ Network: A group or system of interconnected people or devices
□ Online: Connected to another computer or to a network
□ Personally identifiable information: Details about you that can tell someone who you are
□ Private: Belonging to you and not usually meant to be shared
□ Social media: Websites and applications where people can post thoughts, opinions, or images
(e.g., Instagram, Facebook, Twitter, Snapchat)
□ Texting: Sending messages or images from one mobile phone, or other mobile device, to another
□ Video calls: A call where participants can see one another, (e.g., FaceTime, WhatsApp)
□ Voice chat: An audio function via the internet, present in many online games
Page 3
AGE B AN D 5 –7
MATERIALS
ICON KEY
Activity 1: Make a Mask
▪▪ Handout: Mask Template (one copy per student; cut these out ahead of Activities
Page 4
AGE B AN D 5 –7
LESSON WALKTHROUGH
To initiate this lesson, the facilitator can begin by saying:
▪▪ Welcome back to the training program for the Cyber A.C.E.S. team! The goal of Cyber A.C.E.S. is to make
sure everyone is safe and secure as they get involved with the world of technology all around us.
▪▪ Do you want to be a part of the Cyber A.C.E.S. team? (Students: Yes!)
▪▪ [If applicable] So far, you’ve learned how to keep devices safe and how devices are connected to each other.
▪▪ Today, you’ll be learning about how to stay safe when you’re talking online.
Activity Debrief
▪▪ How difficult would it be for you to guess who’s hiding behind each mask? (Children will probably say: “easy!”)
▪▪ (Note) You may want to demonstrate by picking one child and saying, “Do you think this is really [whatev-
er their mask is]? Who do you think this is? How do you know?”
▪▪ How can you tell? (Children might say: “I can see his/her clothes and hair,” “He/she is my friend, so I know
what he/she looks like.”)
▪▪ What does it mean to be online? (To be connected to other devices through the internet.)
▪▪ When you talk to someone online, you can’t always see who they are in real life, and the same goes for
them. It is as if you are both wearing masks.
▪▪ For example, an adult could pretend to be a kid, a boy could pretend to be a girl, and so on. It’s difficult to
know for sure that someone is who they say they are.
▪▪ That’s why it’s so important for the Cyber A.C.E.S. to be safe online! Cyber A.C.E.S. always keep their
identities secure and private.
Page 5
AGE B AN D 5 –7
ACTIVITY 2: GUESS WHO?
ROUND 1
▪▪ Have the children sit in a circle.
▪▪ Once the children are sitting, issue a series of prompts, and ask them to sit back down between prompts.
▫▫ Stand up if you like apples.
▫▫ Stand up if you like the color blue.
▫▫ Stand up if your name is [name of one child in the circle].
▫▫ Stand up if you have a brother.
▫▫ Stand up if you have a sister.
▫▫ Stand up if your birthday is in January.
▫▫ Stand up if you are wearing a [choose a color] shirt.
▫▫ Stand up if you like to read.
▫▫ Stand up if your name is [name of another child].
▫▫ Stand up if you like [choose a popular TV show].
▫▫ Stand up if you go to [school name].
▫▫ Stand up if you have a pet dog.
INSTRUCTOR TIP
Activity Debrief
▪▪ When did a lot of people stand up? What do they have in common?
▪▪ When did just a few people stand up?
▪▪ What kind of information makes you unique? Are there any questions that ONLY you could stand up for?
▪▪ Information that can help someone figure out who you are is called personally identifiable information.
This information is private, which means it belongs to you and should not be shared.
▪▪ What kind of information could you share with someone online and still keep your identity private?
▪▪ If you shared that you like apples, could someone figure out who you are? (Not necessarily.) Then that
would be safe to share!
▪▪ What about if you share your name? (Yes!) Then someone could figure out who you are, so it would not
be safe to share!
Page 6
AGE B AN D 5 –7
ROUND 2
Play the “Guess Who” game one more time. This time, after each statement, ask children to “remain standing
if ….” Continue until only one child is standing. Then say:
One piece of information by itself doesn’t always identify someone, but sometimes we can put several pieces
of information together to figure out who someone is.
Remember!
Cyber A.C.E.S. try to protect their identities online. We have to be careful about what kinds of information—
and how much information—we share online!
Anchor Chart
On the whiteboard or poster paper, draw an anchor chart, as shown below:
Activity Cards
Pass out the Anchor Chart activity cards (Handout 2).
Next, ask the children to decide whether what’s on their cards is Okay to Share Online or Not Okay to Share
Online. Help them tape their cards to the appropriate side of the Anchor Chart. Give them the chance to
explain why they chose their answers.
INSTRUCTOR TIP
Point out that, since everyone online is “wearing a mask,” they all fall into the “Don’t Know” category,
which is why it is not okay to share any personally identifiable information with them.
Page 7
AGE B AN D 5 –7
Answers
▪▪ It’s okay to share information about items or traits that Extension Activity
don’t belong to just you: foods you like, your favorite
Activity 3: Circles of Trust
color, favorite activity, pets, etc.
Have children draw pictures of
(Note: If a child puts one of these cards into the wrong
people in their lives (e.g., parents,
category, you may want to say, “You can choose not to
siblings, friends, teachers, doctors,
share this information with anyone online, but it is safe
grandparents, mail carriers, etc.) on
to if you decide you want to.”)
sticky notes. Ask them to catego-
▪▪ It’s not okay to share items that identify you, such as rize each person as someone they
your name, passwords, telephone number, birthday, “Know,” “Somewhat Know,” or
address, where you are right now, parents’ names, or “Don’t Know.” Then, ask them to
school name. decide what kinds of information
(Note: If a child puts one of these cards into the wrong would be okay to share with that
category, take a moment to explain why this type of person and why, and put the sticky
information could be unsafe to share online, then invite note on the anchor chart next to
the child to move it to the correct column.) that information.
LESSON REFLECTION
Let’s put your cyber skills to the test! Think about a conversation you might have, either online or in person.
What might you do if:
▪▪ Someone online asks where you live? (Don’t tell them—but tell an adult about it.)
▪▪ Someone online asks if you go to the same school they do? (Don’t tell them! You could change the sub-
ject, tell them it’s unsafe to share that information online, or stop talking to them altogether! Remember
to always tell an adult when someone starts asking for this kind of information.)
▪▪ Someone online asks when your birthday is? (Don’t tell them!)
▪▪ Someone online says they’re your friend, so it’s okay to tell them? (Remember, you can never be sure who
someone is online, so private information is never okay to share online.)
Why is it important to keep this information private? (To keep strangers from being able to figure out who you are.)
Remember, whenever you’re online, it’s like you’re wearing a mask! You get to protect your identity, and you
are in control of what information you give out—but it’s important to remember that everyone else is wearing
a mask, too. Just because someone says they’re a 10-year-old girl, that doesn’t mean they actually are—that
might be the mask they’re wearing, instead.
What kind of information is safe to share online? (Give everyone a chance to share one fact about themselves
that would be safe to share online.)
Congratulations! You’ve completed the Communication lesson in the Cyber A.C.E.S. training program!
Page 8
Name Date
AGE B AN D 5 –7
Activity 1
Handout
Page 9
Name Date
AGE B AN D 5 –7
Activity 3
Handout
People Address
Telephone Parents’
Number Names
Favorite School
Color Name
Page 10
Name Date
AGE B AN D 5 –7
Activity 3
Handout
Pets Password
Page 11