Don't Feed the Phish
Grade
6Time
Compare and contrast identity theft with other kinds of theft.
Describe different ways that identity theft can occur online.
Use message clues to identify examples of phishing.
Key Standards Supported
Common Core ELA
L.6.1, L.6.2, L.6.3, L.6.4, L.6.6, RI.6.1, RI.6.10, RI.6.4, RI.6.5, RI.6.6, SL.6.1, SL.6.1a, SL.6.1b, SL.6.1c, SL.6.1d, SL.6.2, SL.6.3, SL.6.4, SL.6.6, W.6.10, W.6.4, W.6.8, W.6.9, L.6.2.B, L.6.3.A, L.6.3.B
ISTE
2a, 2b, 2d
CASEL
1a, 1b, 1c, 1d, 1e, 2a, 2c, 2d, 3a, 3b, 3c, 3d, 4a, 4b, 4c, 4d, 5a, 5b, 5c, 5d, 5e, 5f
AASL
I.A.1, I.A.2, II.A.1, II.A.2, III.A.1, III.A.2, V.A.2, V.A.3, VI.A.1, VI.A.2, I.B.1, I.B.2, I.B.3, II.B.1, II.B.2, III.B.1, III.B.2, IV.B.2, I.C.1, II.C.1, II.C.2, III.C.1, III.C.2, V.C.1, V.C.3, I.D.1, I.D.2, I.D.3, I.D.4, II.D.1, II.D.2, II.D.3, III.D.1, III.D.2, V.D.1, V.D.2, VI.D.1, VI.D.2, VI.D.3, II.B.3
Lesson Plan
Warm Up: Safe or Unsafe?
10 mins.Explore: How Identity Theft Happens
15 mins.Analyze: How to Catch a Phish
15 mins.Wrap Up: Stay Safe from Scams
5 mins.Additional Resources
Extend the Lesson
Common Sense Education has partnered with CYBER.ORG to support cybersecurity education. If you want to build on the themes from this lesson, we recommend the following resources from CYBER.ORG's content library:
- Malware Attacks (Grades 6–8): Students use real-life scenarios to practice recognizing different types of malware.
- Multi-Factor Authentication (Grades 6–8): Students will learn how multi-factor authentication prevents unauthorized users, such as threat actors, from gaining access to devices and accounts.
Our collaboration with CYBER.ORG was made possible with the generous support of Craig Newmark Philanthropies.