๐Ÿ•ต๏ธ 4th Grade Cybersecurity

My First Pentest

Being a Digital Detective: Finding & Fixing Computer Problems

๐Ÿ“… 6 Weeks ๐ŸŽฏ Beginner โœ๏ธ Paper, Pencils & Computers
1

What is Cybersecurity?

๐ŸŽฏ Why we protect computers ๐ŸŽฏ What hackers do ๐ŸŽฏ The job of a security tester

๐Ÿ’ก The Idea

Computers hold important stuff: pictures, messages, homework, bank information. Bad people want to steal this stuff or break things.

You're going to be like a security guard for computers!

๐Ÿ  Activity: Home Security Detective

  1. Draw your home. Mark all the ways someone could get in (doors, windows, etc.)
  2. Now mark which ones have locks
  3. Circle the ones that are missing locks
  4. This is what pentesting does for computers!

๐Ÿค” Discussion Questions

2

Passwords โ€“ Your Secret Superpowers

๐ŸŽฏ Create strong passwords ๐ŸŽฏ Why passwords matter ๐ŸŽฏ Never share passwords

๐Ÿ’ก The Idea

A password is like the key to your treehouse. A bad password is like leaving the key under the doormat. A good password is complex and secret.

What Makes a BAD Password?

โŒ 12345 โ€” too easy
โŒ password โ€” everyone tries this first
โŒ doggo โ€” someone who knows your dog can guess it

What Makes a GOOD Password?

โœ… Mix of CAPITAL letters, small letters, numbers, and symbols
โœ… At least 8 characters long
โœ… NOT a word in the dictionary
โœ… Something YOU make up

Example

โŒ fluffy2020
โœ… Fl!ffy#Moon$2020

๐ŸŽฎ Activity: Password Strength Game

Type a password below and watch the strength meter!

Type a password!
โœ“ At least 8 characters
โœ“ Has an UPPERCASE letter
โœ“ Has a lowercase letter
โœ“ Has a number
โœ“ Has a symbol (!@#$...)

๐Ÿ” Rules to Remember

  • ๐Ÿ” NEVER share your password with anyone (not even friends)
  • ๐Ÿ” Different important things get different passwords
  • ๐Ÿ” If someone asks for your password, they're trying to trick you!
3

Social Engineering โ€“ The Sneaky Trick

๐ŸŽฏ How people trick you ๐ŸŽฏ Recognize phishing ๐ŸŽฏ Spot social engineering

๐Ÿ’ก The Idea

Sometimes hackers don't try to break locks. They just trick you into giving them the key! This is called social engineering.

๐ŸŽฃ Phishing (Fish-ing)

Like fishing, but for passwords and information!

๐Ÿšฉ Red Flags

๐Ÿšฉ Weird email address
๐Ÿšฉ Says URGENT or EMERGENCY
๐Ÿšฉ Asks you to click a link and enter a password
๐Ÿšฉ Bad spelling or grammar

๐ŸŽญ Pretexting

Making up a fake story to trick you!

"Hi! I'm from your internet company. I need your password to check your speed."

NOPE! Real companies never ask for passwords by phone!

๐Ÿ”Ž Activity: Spot the Fake!

Can you figure out which emails are phishing? Click your answer!

๐Ÿšจ Rules to Remember

  • ๐Ÿšจ Don't click links from strangers
  • ๐Ÿšจ Real companies never ask for passwords by email or phone
  • ๐Ÿšจ If something feels weird, ask an adult
  • ๐Ÿšจ Look at the email address carefully (is it spelled right?)
4

Finding Vulnerabilities

๐ŸŽฏ What a vulnerability is ๐ŸŽฏ Find problems in systems ๐ŸŽฏ Finding problems is GOOD

๐Ÿ’ก The Idea

A vulnerability is like a crack in a wall or a broken window. Hackers look for these problems. Good guys find them first and fix them!

Types of Vulnerabilities

๐Ÿ–ฅ๏ธ Forgotten Logins

Computers left unlocked in the school library. Anyone can use that computer!

๐Ÿ”‘ Easy Passwords

A password is "qwerty" or someone's birthday. Easy to guess!

๐Ÿ“ Sticky Notes

Passwords written on sticky notes stuck to monitors. Anyone walking by can see!

โณ Old Software

No updates installed. Hackers know old tricks that still work!

๐Ÿ’พ No Backups

Important files exist in only ONE place. If something breaks, all data is gone!

๐Ÿ“ข Sharing Too Much

A website asks for your birthday, address, and school โ€” and you tell it all!

๐Ÿ  Activity: Vulnerability Hunt at Home

Walk around your house and look for security problems! Here are some examples:

5

Responsible Disclosure

๐ŸŽฏ Report problems safely ๐ŸŽฏ When to tell adults ๐ŸŽฏ Reporting vs. breaking things

๐Ÿ’ก The Idea

If you find a problem, you don't exploit it (use it to cause harm). You report it to someone who can fix it. This is called responsible disclosure.

โŒ The Wrong Way

  • Hack into the system
  • Post about it on social media
  • Tell friends so they can hack it too
  • Delete files or change things

โœ… The Right Way

  • Write down exactly what you found
  • Tell the person in charge
  • Let them fix it
  • Wait before telling anyone else

๐Ÿ“ The Reporting Process

  1. Step 1: You find something โ€” "The school computer lab has a computer that stays logged in!"
  2. Step 2: Tell an adult โ€” "Mr. Smith, I noticed the computer in the back of the lab is still logged in."
  3. Step 3: Let them fix it โ€” "Thank you for telling me! I'll log that out right now."
  4. Step 4: Don't tell your friends to hack it!

๐Ÿ“‹ Activity: Write a Vulnerability Report

VULNERABILITY REPORT

๐Ÿ“‹ Rules to Remember

  • ๐Ÿ“‹ Always report to an adult or authority
  • ๐Ÿ“‹ Be respectful and helpful (not mean)
  • ๐Ÿ“‹ Don't tell friends to exploit the problem
  • ๐Ÿ“‹ Wait for permission before sharing publicly
6

Hacker Ethics & Protecting Yourself

๐ŸŽฏ Good hacker ethics ๐ŸŽฏ Personal cybersecurity ๐ŸŽฏ Protecting others

๐Ÿค The Hacker Code

  • โœ… Help, Don't Harm โ€” Use your skills to find problems, not cause damage
  • โœ… Permission First โ€” Only test systems YOU own or have permission to test
  • โœ… Privacy Matters โ€” If you find secrets, keep them secret
  • โœ… Tell the Truth โ€” Be honest about what you found

โœ… Personal Cybersecurity Checklist

Click each item as you complete it!

๐Ÿฆธ Activity: Create Your Hacker Identity

MY SECURITY PROFILE

๐Ÿš€ Cool Jobs You Could Do

๐Ÿ›ก๏ธ

Security Engineer

Designs systems to be safe

๐Ÿ”

Penetration Tester

Professional security tester

๐Ÿ“Š

Cybersecurity Analyst

Watches for attacks

๐Ÿ”ฌ

Security Researcher

Discovers new protections

๐Ÿ”’

Privacy Officer

Protects people's data

๐ŸŒŸ Famous Ethical Hackers

๐Ÿ“–

Glossary โ€“ Easy Words

VulnerabilityA weakness or problem that could be exploited
ExploitUsing a problem to break into something
PhishingTricking someone into revealing passwords (like fishing for fish)
HackerSomeone who tries to break into computer systems
Ethical HackerA good hacker who finds problems to help fix them
Penetration TestingTrying to find ways into a system to test if it's secure
Social EngineeringTricking people to give you information
Vulnerability DisclosureTelling someone about a security problem you found
CybersecurityProtecting computers and information from bad people