| Lesson Plan |
| Grade: |
Date: 25/02/2026 |
| Subject: Information Communication Technology ICT |
| Lesson Topic: Know and understand phishing, pharming, smishing, vishing including the methods that can be used to help prevent them |
Learning Objective/s:
- Describe the key characteristics of phishing, pharming, smishing and vishing.
- Explain how each attack vector operates and identify common warning signs.
- Apply at least three technical or awareness‑based prevention measures to mitigate these threats.
- Analyse simulated messages to classify the type of attack and recommend appropriate actions.
- Create a personal checklist for safe digital communication.
|
Materials Needed:
- Projector and screen
- Printed handout with attack definitions and checklist
- Sample phishing email screenshots (digital)
- Smartphones for smishing demonstration
- Speakerphone or headset for vishing role‑play
- Internet access for live DNS lookup
- Worksheets for group analysis
|
Introduction:
Begin with a quick poll: “Have you ever received a message that seemed too urgent to be real?” Use a few student responses to highlight the prevalence of online scams. Connect this to prior lessons on safe internet use and set the success criteria: students will be able to recognise and counter four common social‑engineering attacks.
|
Lesson Structure:
- Do‑Now (5'): Examine a screenshot of a suspicious email; note red‑flag indicators.
- Mini‑lecture (10'): Define phishing, pharming, smishing, vishing with real‑world examples.
- Interactive demo (15'): Live DNS lookup, link‑hover inspection, short‑URL expansion, and a simulated smishing text and vishing call.
- Group analysis activity (15'): Teams receive mixed scenarios (email, SMS, phone, fake website) and identify the attack type and required preventive steps.
- Prevention strategies discussion (10'): Review technical controls (MFA, DNSSEC, spam filters) and user‑awareness tactics; students complete a checklist.
- Exit ticket (5'): Write one actionable tip they will apply immediately to stay safe online.
|
Conclusion:
Recap the four attack vectors and the key signs that differentiate them. Collect exit tickets to gauge understanding and assign a short homework: research a recent phishing incident and summarise how it could have been prevented using the strategies discussed.
|