Skip to content

Digital Defence: Cybersecurity & MisinformationActivities & Teaching Strategies

Active learning works for this topic because cybersecurity and misinformation are dynamic threats that students must recognize in real time. Simulations and debates mirror how these issues unfold in everyday digital life, making abstract concepts tangible and memorable.

Primary 6Social Studies4 activities30 min45 min

Learning Objectives

  1. 1Analyze the methods used in cyberattacks such as phishing and malware to compromise digital security.
  2. 2Evaluate the credibility of online information by identifying common tactics used in misinformation and disinformation campaigns.
  3. 3Design a public awareness poster illustrating at least three cybersecurity best practices for individuals.
  4. 4Compare and contrast the impact of misinformation on individual users versus national security.
  5. 5Explain the role of organizations like the Cyber Security Agency of Singapore in combating digital threats.

Want a complete lesson plan with these objectives? Generate a Mission

45 min·Small Groups

Jigsaw: Fake News Tactics

Divide class into expert groups on tactics like biased headlines, fabricated images, or unverified claims. Each group researches one tactic using provided articles, then jigsaws to teach peers. Conclude with a class gallery walk to share posters.

Prepare & details

Explain the dangers of misinformation and disinformation in a digital age.

Facilitation Tip: During the Jigsaw Protocol, assign each group a specific type of fake news tactic to research and teach the class, ensuring accountability and collaboration.

Setup: Flexible seating for regrouping

Materials: Expert group reading packets, Note-taking template, Summary graphic organizer

UnderstandAnalyzeEvaluateRelationship SkillsSelf-Management
30 min·Pairs

Phishing Hunt: Email Analysis

Display sample phishing emails on slides. In pairs, students highlight red flags like urgent language or suspicious links, then vote class-wide on safest responses. Follow with debrief on real Singapore scam stats.

Prepare & details

Analyze strategies for identifying and combating fake news.

Facilitation Tip: When running the Phishing Hunt, use real-looking but fake emails so students practice close reading without ethical concerns.

Setup: Flexible space for group stations

Materials: Role cards with goals/resources, Game currency or tokens, Round tracker

ApplyAnalyzeEvaluateCreateSocial AwarenessDecision-Making
40 min·Pairs

Campaign Lab: Cyber Posters

Pairs design posters promoting practices like strong passwords and two-factor authentication. Use templates with Total Defence themes. Present to class for feedback and vote on most persuasive.

Prepare & details

Design a public awareness campaign on cybersecurity best practices.

Facilitation Tip: For the Campaign Lab, provide graphic design templates so students focus on messaging rather than technical skills.

Setup: Flexible space for group stations

Materials: Role cards with goals/resources, Game currency or tokens, Round tracker

ApplyAnalyzeEvaluateCreateSocial AwarenessDecision-Making
35 min·Small Groups

Scenario Debate: Response Drills

Small groups draw defence scenarios like a viral hoax outbreak. Debate and propose strategies, citing agency guidelines. Rotate roles for facilitator and note-taker.

Prepare & details

Explain the dangers of misinformation and disinformation in a digital age.

Facilitation Tip: In the Scenario Debate, assign roles such as news reporter, government official, and affected citizen to deepen perspective-taking.

Setup: Flexible space for group stations

Materials: Role cards with goals/resources, Game currency or tokens, Round tracker

ApplyAnalyzeEvaluateCreateSocial AwarenessDecision-Making

Teaching This Topic

Teachers should start with relatable examples, like viral family scam stories or classroom gossip, to connect cyber threats to students' daily lives. Avoid overwhelming students with technical jargon; use guided questions to scaffold analysis instead. Research shows that role-playing consequences of misinformation builds stronger ethical reasoning than lectures alone.

What to Expect

Successful learning looks like students confidently identifying red flags in digital content and proposing practical defences. They should articulate personal and national risks, using clear examples from the activities to justify their reasoning.

These activities are a starting point. A full mission is the experience.

  • Complete facilitation script with teacher dialogue
  • Printable student materials, ready for class
  • Differentiation strategies for every learner
Generate a Mission

Watch Out for These Misconceptions

Common MisconceptionDuring the Jigsaw Protocol, watch for students who assume only IT professionals can detect fake news. Redirect them by asking each group to explain how their assigned tactic targets emotional triggers or biases in everyday readers.

What to Teach Instead

Use the Phishing Hunt to redirect this misconception by having students analyze how even simple email tricks rely on human error, not just technical skills.

Common MisconceptionDuring the Phishing Hunt, watch for students who trust messages just because they appear to come from known senders. Redirect them by comparing how scammers mimic real contacts to bypass trust.

What to Teach Instead

During the Jigsaw Protocol, have students analyze viral hoaxes shared by friends to show how peer pressure amplifies misinformation faster than official sources.

Common MisconceptionDuring the Campaign Lab, watch for students who dismiss fake news as harmless pranks. Redirect them by asking them to research a real event where misinformation caused public harm in Singapore.

What to Teach Instead

Use the Scenario Debate to redirect this by assigning groups to role-play the ripple effects of a deepfake video on national trust or public safety.

Assessment Ideas

Quick Check

After the Jigsaw Protocol, present students with three short social media posts. Ask them to identify which post is most likely misinformation and explain their reasoning, citing at least two red flags they observed during their analysis.

Discussion Prompt

During the Scenario Debate, pose the question: 'Imagine a friend shares a sensational news article online that seems too good to be true. What are the first three steps you would advise them to take before believing or sharing it?' Facilitate a class discussion on their responses, referencing strategies from the Phishing Hunt.

Exit Ticket

After the Phishing Hunt, ask students to list one type of cyberattack and one strategy to protect themselves from it. Then, ask them to define 'disinformation' in their own words, using examples from the Jigsaw Protocol.

Extensions & Scaffolding

  • Challenge: Ask students to design a short video or infomercial teaching peers how to spot phishing emails, using examples from the Phishing Hunt activity.
  • Scaffolding: Provide a checklist of red flags for students to reference while analyzing social media posts in the Jigsaw Protocol.
  • Deeper exploration: Invite a guest speaker from the Digital and Intelligence Service or Singapore Police Force to discuss real cases of cybercrime and misinformation in Singapore.

Key Vocabulary

PhishingA type of online scam where attackers trick people into revealing sensitive information, like passwords or credit card numbers, often through fake emails or websites.
MalwareShort for malicious software, this includes viruses, worms, and spyware that can harm your computer or steal your data without you knowing.
DisinformationFalse information that is deliberately created and spread to deceive people, often with the intent to cause harm or gain political advantage.
DeepfakeA video or audio recording that has been realistically altered using artificial intelligence to show someone saying or doing something they never did.
CybersecurityThe practice of protecting computers, networks, and digital systems from theft, damage, or unauthorized access.

Ready to teach Digital Defence: Cybersecurity & Misinformation?

Generate a full mission with everything you need

Generate a Mission