Activity Sheet: Secret Box
π― General Objective
Raise awareness among participants about data breaches and hacking and emphasize the importance of protecting personal data.
π― Operational Objective
Create a Secret Box using Scratch.
β³ Activity Duration
1 hour 30 minutes
π₯ Number of Participants
- Minimum: 2 participants with 2 computers.
- Depends on available computers (participants can work in pairs on a single computer).
π« Recommended Age
- Participants must be able to read, write and count (approximately 7 years and older).
π₯οΈ Required Materials
- One computer per participant.
- The explanatory sheet for the Scratch program under redevelopment in opensource format*.
- The scratch softwar (available online scratch MIT live editor)
ποΈ Activity Flow
1οΈβ£ Creating the Secret Box: Programming
- The facilitator distributes the explanatory sheets.
- Participants use the provided Scratch program to create their Secret Box.
- Once completed, participants test their program.
- When everyone has tested their Secret Box, the facilitator asks them to reset their program and put it in full-screen mode.
2οΈβ£ Hacker Phase
- Participants switch places to test someone elseβs Secret Box.
- The facilitator asks participants to orally discuss ways to βbreakβ the program.
- The facilitator introduces the concept of hacking and explains that participants will now play the role of hackers.
- Participants attempt to bypass security by exiting full-screen mode and reading the stored password inside the Scratch program.
3οΈβ£ Discussion Round #1
- Participants reflect on their experience.
- The facilitator asks guiding questions, such as:
- How do you feel about this experience?
- Do you think your secret is safe?
4οΈβ£ Data Protection
- Participants realize that their secret is not secure, so they are introduced to a more secure version of the program.
- The facilitator distributes updated explanatory sheets.
- Participants create their Secret Box 2.0 using the improved program.
- They test their new program and, once completed, reset it and put it in full-screen mode.
5οΈβ£ Discussion Round #2
- Participants compare the first and second versions of their Secret Box.
- The facilitator asks:
- Do you feel your secret is safer now?
- What would happen if private information is exposed on the internet?
- How do online games and websites store secrets?
π§ Debriefing
π Key Definitions
- Computer Program: A set of instructions written by a human and translated into binary code (0s and 1s) that a computer understands.
- Hacking: Exploiting vulnerabilities in a system to access or modify data.
- Security Flaws & Vulnerabilities: Weaknesses in a program that can be exploited by an attacker.
π Key Takeaways
- When you store something on a computer, a program (written by humans) keeps it.
- Humans make errors in their programs, which can create security vulnerabilities.
- These vulnerabilities can be exploited by others to steal or modify your data.
- Sensitive information stored on a computer can be stolen.
- Always be cautious about what you share or write on a computer.
- Anyone can be a victim of hacking, so protecting your data is crucial.
π‘ Example: The KidiSecrets electronic diary
π KidiSecrets Manual
π Recommended Cybersecurity Practices
Category |
Ref |
Ludigeeks |
Best Practices |
Passwords |
MDP-01 |
β
|
Use a different password for each service. |
Passwords |
MDP-02 |
β
|
Use long and complex passwords. |
Passwords |
MDP-03 |
β
|
Use a password that is impossible to guess. |
Passwords |
MDP-05 |
β
|
Change your password at the slightest suspicion of a breach. |
Passwords |
MDP-06 |
β
|
Never share your password with anyone. |
Passwords |
MDP-07 |
β
|
Do not use your passwords on public/shared computers. |
Passwords |
MDP-09 |
β
|
Change default passwords on online services. |
Mobile Security |
SM-08 |
β
|
Do not leave your device unattended. |
Mobile Security |
SM-10 |
β
|
Do not store confidential information without encryption. |
Backups |
SV-01 |
β
|
Regularly back up your data. |
π Check participant feedback & security awareness:
π WOCSA Contact Form
π Summary
- Create a Secret Box program using Scratch.
- Simulate hacking to understand security vulnerabilities.
- Discuss data protection and digital risks.
- Improve security measures by modifying the program.
- Reflect on cybersecurity best practices.
This workshop teaches participants why data protection matters and how to secure their digital secrets! π
π― Learn More & Get Involved!
π GitHub Repository β github.com/wocsa/ludigeeks
π© Contact us β WOCSA Contact Form
π Join Ludigeeks and help spread cybersecurity awareness!
WOCSA Contact Form