Digital Defence: Cybersecurity & MisinformationActivities & Teaching Strategies
Active learning works for this topic because cybersecurity and misinformation are dynamic threats that students must recognize in real time. Simulations and debates mirror how these issues unfold in everyday digital life, making abstract concepts tangible and memorable.
Learning Objectives
- 1Analyze the methods used in cyberattacks such as phishing and malware to compromise digital security.
- 2Evaluate the credibility of online information by identifying common tactics used in misinformation and disinformation campaigns.
- 3Design a public awareness poster illustrating at least three cybersecurity best practices for individuals.
- 4Compare and contrast the impact of misinformation on individual users versus national security.
- 5Explain the role of organizations like the Cyber Security Agency of Singapore in combating digital threats.
Want a complete lesson plan with these objectives? Generate a Mission →
Jigsaw: Fake News Tactics
Divide class into expert groups on tactics like biased headlines, fabricated images, or unverified claims. Each group researches one tactic using provided articles, then jigsaws to teach peers. Conclude with a class gallery walk to share posters.
Prepare & details
Explain the dangers of misinformation and disinformation in a digital age.
Facilitation Tip: During the Jigsaw Protocol, assign each group a specific type of fake news tactic to research and teach the class, ensuring accountability and collaboration.
Setup: Flexible seating for regrouping
Materials: Expert group reading packets, Note-taking template, Summary graphic organizer
Phishing Hunt: Email Analysis
Display sample phishing emails on slides. In pairs, students highlight red flags like urgent language or suspicious links, then vote class-wide on safest responses. Follow with debrief on real Singapore scam stats.
Prepare & details
Analyze strategies for identifying and combating fake news.
Facilitation Tip: When running the Phishing Hunt, use real-looking but fake emails so students practice close reading without ethical concerns.
Setup: Flexible space for group stations
Materials: Role cards with goals/resources, Game currency or tokens, Round tracker
Campaign Lab: Cyber Posters
Pairs design posters promoting practices like strong passwords and two-factor authentication. Use templates with Total Defence themes. Present to class for feedback and vote on most persuasive.
Prepare & details
Design a public awareness campaign on cybersecurity best practices.
Facilitation Tip: For the Campaign Lab, provide graphic design templates so students focus on messaging rather than technical skills.
Setup: Flexible space for group stations
Materials: Role cards with goals/resources, Game currency or tokens, Round tracker
Scenario Debate: Response Drills
Small groups draw defence scenarios like a viral hoax outbreak. Debate and propose strategies, citing agency guidelines. Rotate roles for facilitator and note-taker.
Prepare & details
Explain the dangers of misinformation and disinformation in a digital age.
Facilitation Tip: In the Scenario Debate, assign roles such as news reporter, government official, and affected citizen to deepen perspective-taking.
Setup: Flexible space for group stations
Materials: Role cards with goals/resources, Game currency or tokens, Round tracker
Teaching This Topic
Teachers should start with relatable examples, like viral family scam stories or classroom gossip, to connect cyber threats to students' daily lives. Avoid overwhelming students with technical jargon; use guided questions to scaffold analysis instead. Research shows that role-playing consequences of misinformation builds stronger ethical reasoning than lectures alone.
What to Expect
Successful learning looks like students confidently identifying red flags in digital content and proposing practical defences. They should articulate personal and national risks, using clear examples from the activities to justify their reasoning.
These activities are a starting point. A full mission is the experience.
- Complete facilitation script with teacher dialogue
- Printable student materials, ready for class
- Differentiation strategies for every learner
Watch Out for These Misconceptions
Common MisconceptionDuring the Jigsaw Protocol, watch for students who assume only IT professionals can detect fake news. Redirect them by asking each group to explain how their assigned tactic targets emotional triggers or biases in everyday readers.
What to Teach Instead
Use the Phishing Hunt to redirect this misconception by having students analyze how even simple email tricks rely on human error, not just technical skills.
Common MisconceptionDuring the Phishing Hunt, watch for students who trust messages just because they appear to come from known senders. Redirect them by comparing how scammers mimic real contacts to bypass trust.
What to Teach Instead
During the Jigsaw Protocol, have students analyze viral hoaxes shared by friends to show how peer pressure amplifies misinformation faster than official sources.
Common MisconceptionDuring the Campaign Lab, watch for students who dismiss fake news as harmless pranks. Redirect them by asking them to research a real event where misinformation caused public harm in Singapore.
What to Teach Instead
Use the Scenario Debate to redirect this by assigning groups to role-play the ripple effects of a deepfake video on national trust or public safety.
Assessment Ideas
After the Jigsaw Protocol, present students with three short social media posts. Ask them to identify which post is most likely misinformation and explain their reasoning, citing at least two red flags they observed during their analysis.
During the Scenario Debate, pose the question: 'Imagine a friend shares a sensational news article online that seems too good to be true. What are the first three steps you would advise them to take before believing or sharing it?' Facilitate a class discussion on their responses, referencing strategies from the Phishing Hunt.
After the Phishing Hunt, ask students to list one type of cyberattack and one strategy to protect themselves from it. Then, ask them to define 'disinformation' in their own words, using examples from the Jigsaw Protocol.
Extensions & Scaffolding
- Challenge: Ask students to design a short video or infomercial teaching peers how to spot phishing emails, using examples from the Phishing Hunt activity.
- Scaffolding: Provide a checklist of red flags for students to reference while analyzing social media posts in the Jigsaw Protocol.
- Deeper exploration: Invite a guest speaker from the Digital and Intelligence Service or Singapore Police Force to discuss real cases of cybercrime and misinformation in Singapore.
Key Vocabulary
| Phishing | A type of online scam where attackers trick people into revealing sensitive information, like passwords or credit card numbers, often through fake emails or websites. |
| Malware | Short for malicious software, this includes viruses, worms, and spyware that can harm your computer or steal your data without you knowing. |
| Disinformation | False information that is deliberately created and spread to deceive people, often with the intent to cause harm or gain political advantage. |
| Deepfake | A video or audio recording that has been realistically altered using artificial intelligence to show someone saying or doing something they never did. |
| Cybersecurity | The practice of protecting computers, networks, and digital systems from theft, damage, or unauthorized access. |
Suggested Methodologies
Planning templates for Social Studies
5E Model
The 5E Model structures lessons through five phases (Engage, Explore, Explain, Elaborate, and Evaluate), guiding students from curiosity to deep understanding through inquiry-based learning.
Unit PlannerThematic Unit
Organize a multi-week unit around a central theme or essential question that cuts across topics, texts, and disciplines, helping students see connections and build deeper understanding.
RubricSingle-Point Rubric
Build a single-point rubric that defines only the "meets standard" level, leaving space for teachers to document what exceeded and what fell short. Simple to create, easy for students to understand.
More in Defending Our Nation
Total Defence: A Multi-faceted Approach
An overview of why Singapore needs a comprehensive strategy for national security involving every citizen across different pillars.
3 methodologies
Military Defence: Deterrence & Readiness
Exploring the roles of the Singapore Armed Forces (SAF) in protecting the nation and ensuring peace through deterrence.
3 methodologies
Civil Defence: Emergency Preparedness
Understanding the roles of the Singapore Civil Defence Force (SCDF) and community in responding to emergencies and disasters.
3 methodologies
Economic Defence: Resilience & Diversification
How a strong and diversified economy contributes to national resilience and the ability to withstand external shocks.
3 methodologies
Social Defence: Unity & Cohesion
How a united and cohesive society, regardless of race or religion, forms a crucial line of defence against internal and external threats.
3 methodologies
Ready to teach Digital Defence: Cybersecurity & Misinformation?
Generate a full mission with everything you need
Generate a Mission