Skip to content

Verifying Online Identity and TrustActivities & Teaching Strategies

Active learning works because verifying online identity demands practical judgment, not just memorization. Students need to test their skills in realistic situations to build lasting caution and critical habits. Hands-on activities make abstract security concepts concrete and memorable for teenagers navigating digital spaces daily.

Secondary 3Computing4 activities25 min45 min

Learning Objectives

  1. 1Identify visual cues (HTTPS, padlock icon) that indicate a secure website connection.
  2. 2Explain the function of HTTPS in encrypting data transmitted between a user and a website.
  3. 3Analyze potential risks associated with entering personal information on websites lacking security indicators.
  4. 4Compare the security features of a verified website with those of a suspicious one.
  5. 5Demonstrate a method for verifying a website's legitimacy before submitting sensitive data.

Want a complete lesson plan with these objectives? Generate a Mission

30 min·Pairs

Browser Hunt: Secure Site Check

Provide students with a list of 10 websites, some secure and some not. In pairs, they open each in browsers, note HTTPS status and padlock icons, then verify URLs. Pairs report findings and justify security ratings to the class.

Prepare & details

Explain the significance of 'HTTPS' and the padlock icon in a web browser.

Facilitation Tip: During Browser Hunt: Secure Site Check, have students work in pairs to compare results and argue their findings before revealing the answer key to encourage discussion.

Setup: Groups at tables with document sets

Materials: Document packet (5-8 sources), Analysis worksheet, Theory-building template

AnalyzeEvaluateSelf-ManagementDecision-Making
45 min·Small Groups

Phishing Simulation Stations

Set up stations with printed fake emails and websites. Small groups rotate, identifying red flags like urgent language or odd URLs, then check for HTTPS using mock browsers. Groups create posters summarizing verification steps.

Prepare & details

Describe how to check if a website is secure before entering personal information.

Facilitation Tip: For Phishing Simulation Stations, assign roles so some students play scammers to heighten awareness of manipulative tactics.

Setup: Groups at tables with document sets

Materials: Document packet (5-8 sources), Analysis worksheet, Theory-building template

AnalyzeEvaluateSelf-ManagementDecision-Making
40 min·Small Groups

Source Verification Debate

Divide class into teams with controversial online articles. Teams verify sources by checking HTTPS, author credentials, and cross-references. Hold a debate on trustworthiness, voting with evidence.

Prepare & details

Analyze the risks of interacting with unverified or suspicious online sources.

Facilitation Tip: In Source Verification Debate, limit each side to two strong arguments to keep focus on evidence rather than overwhelming debate.

Setup: Groups at tables with document sets

Materials: Document packet (5-8 sources), Analysis worksheet, Theory-building template

AnalyzeEvaluateSelf-ManagementDecision-Making
25 min·Individual

Personal Audit Challenge

Students individually audit their favorite sites for security features. They screenshot indicators and note risks, then share one improvement in a whole-class gallery walk.

Prepare & details

Explain the significance of 'HTTPS' and the padlock icon in a web browser.

Facilitation Tip: During Personal Audit Challenge, ask students to explain one verification step aloud as they work to reinforce metacognition.

Setup: Groups at tables with document sets

Materials: Document packet (5-8 sources), Analysis worksheet, Theory-building template

AnalyzeEvaluateSelf-ManagementDecision-Making

Teaching This Topic

Teach verification as a process, not a single check. Research shows that students trust visual cues too quickly, so teachers should model skepticism even with familiar sites. Avoid presenting HTTPS and padlocks as guarantees; instead, frame them as necessary but insufficient proofs. Use real-world examples, like a bank’s actual URL versus a spoofed version, to anchor lessons in students’ lived experiences.

What to Expect

Successful learning shows when students confidently identify secure sites, question suspicious links, and explain verification steps to peers. They should transfer these skills to personal decisions, like noticing subtle URL tricks or insisting on source checks before sharing details online.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring Browser Hunt: Secure Site Check, watch for students assuming that every padlock icon means a website is trustworthy.

What to Teach Instead

Use the mixed-site audit list to have students compare URLs and domains side by side. Point out how scammers obtain certificates for fake sites, then ask groups to present one fake site they spotted and how they knew.

Common MisconceptionDuring Phishing Simulation Stations, watch for students believing that HTTPS alone prevents data theft.

What to Teach Instead

Include two 'secure' fake sites in the simulations. After the activity, facilitate a debrief where students explain why HTTPS did not protect them from phishing, linking it to the limits of encryption.

Common MisconceptionDuring Browser Hunt: Secure Site Check, watch for students trusting sites simply because the name looks familiar.

What to Teach Instead

Add typo-squatting examples to the audit list, like 'Amaz0n-delivery.com.' Have students type each URL manually to notice subtle misspellings before discussing how these tricks manipulate trust.

Assessment Ideas

Quick Check

After Browser Hunt: Secure Site Check, collect student worksheets and grade them for accuracy in identifying HTTPS, padlock icons, and URL anomalies. Use the results to regroup students for targeted review.

Discussion Prompt

During Source Verification Debate, circulate and listen for students referencing specific verification steps, such as domain ownership checks or cross-source comparisons, as evidence in their arguments.

Exit Ticket

After Personal Audit Challenge, have students submit a 3-sentence reflection describing one secure site they audited and two risks they identified with unverified sites based on their checklist.

Extensions & Scaffolding

  • Challenge: Ask students to design a phishing email convincing enough to fool a classmate, then swap and test each other's designs for authenticity during Phishing Simulation Stations.
  • Scaffolding: Provide a checklist with five verification steps on a card for Personal Audit Challenge, reducing cognitive load while building routine.
  • Deeper exploration: Invite a local cybersecurity professional to share tactics used in their work, connecting classroom exercises to real careers after Source Verification Debate.

Key Vocabulary

HTTPSHypertext Transfer Protocol Secure. A protocol that encrypts communication between your browser and a website, ensuring data privacy.
Padlock IconA visual indicator in a web browser's address bar signifying that the connection to the website is secure and encrypted.
URLUniform Resource Locator. The web address of a website, which can be examined for suspicious patterns or misspellings.
EncryptionThe process of converting information or data into a code to prevent unauthorized access, making it unreadable without a key.
PhishingA fraudulent attempt to obtain sensitive information such as usernames, passwords, and credit card details by disguising oneself as a trustworthy entity in an electronic communication.

Ready to teach Verifying Online Identity and Trust?

Generate a full mission with everything you need

Generate a Mission