Ransomware

Alert learners to the risks posed by ransomware and help learners know what to do if they become the victims of a ransomware attack

About This Module

This curriculum module is based on takeaways from series four of NYC Digital Safety training videos. You may use this module by:

  • Including it in your pre-existing public workshops
  • Combining it with other NYC Digital Safety modules to make a longer data-privacy focused workshop
  • Sharing the handout with library users at various service points

Downloadable presentation slides, a facilitation guide, and a handout can be found below.

Learning Outcomes

By the end of this module, learners will be able to:

  • Define ransomware
  • Describe how ransomware works 
  • Identify approaches for handling and avoiding ransomware attacks

Lesson Plan

This lesson plan is also included in the downloadable facilitation guide below. You are welcome to use any and all of this, or adapt it as you see fit.

This module will take approximately 50 minutes to complete.

Introduction and welcome

Greet learners and share the plan for this lesson.

Defining ransomware

Pass out the handout now, or at any point in the lesson. Provide a brief definition of ransomware and pause to see if anyone has any questions or anything to add to the definition

Discussion: Examples of ransomware

Put your learners into small groups. Have them brainstorm about examples of ransomware they might have heard about or even experienced before. Have your learners report back on what they discussed

Ransomware attacks

Review what happens during a ransomware attack, including the infection and attack phase. Review the information on who is targeted by ransomware. Pause to see if there are any questions

Ways to manage a ransomware attack

Review the steps and suggestions for ways to manage a ransomware attack and to avoid or prevent such attacks. See if anyone has any other suggestions to add

Activity: Avoiding ransomware

Have your learners get into small groups. Have them review and discuss best practices for avoiding scams and malware, as a way to avoid ransomware

Wrap up, final tips, and final questions

Review the closing thoughts and share the suggested resources. See if anyone has any final questions

Next Steps

Download the materials below for use in your workshop or at service points throughout your library.

If you plan to create a longer privacy-focused workshop using these materials, here is a link to Google slides. Feel free to make a copy if you’d like to add these slides to any other deck.

And please let us know how it went! Use this form to share your feedback on this module. We’d love to hear from you.

Social Engineering

Alert learners to the risks posed by social engineering and empower learners to avoid and handle social engineering attacks

About This Module

This curriculum module is based on takeaways from series four of NYC Digital Safety training videos. You may use this module by:

  • Including it in your pre-existing public workshops
  • Combining it with other NYC Digital Safety modules to make a longer data-privacy focused workshop
  • Sharing the handout with library users at various service points

Downloadable presentation slides, a facilitation guide, and a handout can be found below. The handout from this module has been translated into Chinese, Haitian-Creole, Russian, and Spanish.

Learning Outcomes

By the end of this module, learners will be able to:

  • Define social engineering
  • Describe how social engineering works
  • Identify approaches for handling and avoiding social engineering

Lesson Plan

This lesson plan is also included in the downloadable facilitation guide below. You are welcome to use any and all of this, or adapt it as you see fit.

This module will take approximately 50 minutes to complete.

Introduction and welcome

Greet learners and review the plan for this module

Defining social engineering

Provide a brief definition of social engineering and see if anyone has any questions or anything to add

Discussion: Manipulation techniques

Ask your learners to consider and share manipulation techniques that are commonly used by scammers. Get a crowdsourced list going

How social engineering works

Provide an overview of how social engineering attacks work, including the steps and methods used by scammers. Review the principles of persuasion. Pause to see if learners have noticed any of these before in spam/scam messages they might have received. Review the ways in which social engineering scams target people. Pause to see if there are any questions

Types of social engineering attacks and common signs

Review some examples of common kinds of social engineering attacks. Pause to see if anyone has questions or anything else to add. Review some of the warning signs of social engineering

Ways to avoid social engineering

Review the list of ways to avoid social engineering. Pause to see if anyone has anything else to add or any questions

Discussion: Approaches for avoiding social engineering

Break your learners into small groups. Have your learners brainstorm ways to avoid social engineering and record their thoughts on their guided handouts

Wrap up, final tips, and final questions

Review the closing thoughts and share the suggested resources. See if anyone has any final questions.

Next Steps

Download the materials below for use in your workshop or at service points throughout your library.

If you plan to create a longer privacy-focused workshop using these materials, here is a link to Google slides. Feel free to make a copy if you’d like to add these slides to any other deck.

And please let us know how it went! Use this form to share your feedback on this module. We’d love to hear from you.

Security Risks on Apps and Websites

Help learners recognize and avoid different pitfalls and risks on apps and websites

About This Module

This curriculum module is based on takeaways from series three and series four of NYC Digital Safety training videos. You may use this module by:

  • Including it in your pre-existing public workshops
  • Combining it with other NYC Digital Safety modules to make a longer data-privacy focused workshop
  • Sharing the handout with library users at various service points

Downloadable presentation slides, a facilitation guide, and a handout can be found below. The handout from this module has been translated into Chinese, Haitian-Creole, Russian, and Spanish.

Learning Outcomes

By the end of this module, learners will be able to:

  • Describe different pitfalls and risks on apps and websites
  • Name strategies for avoiding security risks on apps and websites
  • Identify methods for browsing the web safely

Lesson Plan

This lesson plan is also included in the downloadable facilitation guide below. You are welcome to use any and all of this, or adapt it as you see fit.

This module will take approximately 35 to 40 minutes to complete.

Introduction and welcome

Greet learners and review the plan for this module

Defining security risks on sites and apps

Share the handout with learners at any point during this lesson. Provide a brief overview of the types of pitfalls that can exist on websites and apps. Pause to see if anyone has anything else to add

Security risks on sites and apps

Review some of the different pitfalls that exist on apps and websites, including malware, cookies, and trackers.
Next, share some signs of a risky website or app. Pause to see if anyone has a question or anything else to add

Ways to avoid risky sites and apps

Review different strategies for avoiding risky apps and for avoiding risky websites, including using tools like secure browsers and developing a greater awareness of red flags and warning signs. See if anyone has other tips to add or share

Wrap up, final tips, and final questions

Review the closing thoughts and share the suggested resources. See if anyone has any final questions

Next Steps

Download the materials below for use in your workshop or at service points throughout your library.

If you plan to create a longer privacy-focused workshop using these materials, here is a link to Google slides. Feel free to make a copy if you’d like to add these slides to any other deck.

And please let us know how it went! Use this form to share your feedback on this module. We’d love to hear from you.