The Big Hack At-Home Toolkit Twitter Icon Facebook Brand .

Transcription

The Big Hack At-Home ToolkitDeloitte, in collaboration with The Ella Project (aninitiative that was created to ensure that youngchildren have a hero with a background and passion forSTEM and entrepreneurship to identify with), is excitedto provide you with an exciting resource to engagechildren at-home. This resource features a comicstarring Ella the Engineer, the hero of the story, whohas a passion for knowledge and learning. The comic inthis free and interactive toolkit features DeborahGolden, Deloitte US Cyber and Strategic Risk leaderThis toolkit will provide you with all theresources you need to:1. Read through the comic or watch Deb'sstory time video on YouTube ( 15minutes)2. Engage in a discussion aroundcybersecurity ( 5-8 minutes)3. Complete the activities from Ella’sInnovation Lab ( 10-15 minutes)We hope you find these resources both funand educational. Please take pictures andshare them with us using#LearningwithElla!

: Steps taken to protect a computer orcomputer system against unauthorized access orattack.USB: A type of computer opening which can be usedto connect equipment to a computer.Spam link: A potentially harmful link sent in an emailor text message by a hacker.Hack: Using a computer to gain unauthorized accessto data in a system.Coding: The process of writing computer programs.Password: A secret word or phrase that allows accessto a phone, computer system or service.Firewall: Software that monitors traffic to or fromyour network. It allows or blocks traffic based on adefined set of security rules.Ransomware: A type of software designed to blockaccess to a computer system until a certain amount ofmoney is paid.Engineer: A person who designs, builds, or maintainsengines or machines.Data: Facts or information used usually to calculate,analyze, or plan something.Service dog: Dogs that are individually trained to dowork or perform tasks for people with disabilities.Tablet: A wireless, portable personal computer with atouchscreen interface.

Discussion on cybersecurity1.Begin an exchange around theimportance of cybersecurity, strongpasswords, and protecting youridentity online.2.Use the activities from Ella’sInnovation Lab to reinforce theimportance of cybersecurity. If youare unable to print out thetemplates, have your child usethem as inspiration.

Ella’s Innovation LabThe following activities are available foryour child:1. Complete the vocab crossword2. Complete the word search3. Email to Ella4. Which Doesn’t Belong Activity5. Turn yourself into a comic bookcharacter using the Voilà AI ArtistCartoon Photo app

The Big Hack crossword puzzlecluesDown2.4.5.6.10.Steps taken to protect a computer or computersystem against unauthorized access or attack.Using a computer to gain unauthorized access todata in a system.A type of computer opening which can be used toconnect equipment to a computer.A secret word or phrase that allows access to aphone, computer system or service.Facts or information used usually to calculate,analyze, or plan something.Across1.3.7.8.9.Dogs that are individually trained to do work orperform tasks for people with disabilities.Software that monitors traffic to or from yournetwork. It allows or blocks traffic based on adefined set of security rules.A potentially harmful link sent in an email or textmessage by a hacker.A type of software designed to block access to acomputer system until a certain amount ofmoney is paid.The process of writing computer programs.11.A person who designs, builds, or maintainsengines or machines.12.A wireless, portable personal computer with atouchscreen interface.

The Big Hack crossword puzzleHint: Reference vocabulary words

The Big Hack word lHackService dogEngineerDataSpam linkCodingUSB

Email to EllaElla,Sincerely,

Answer key: The Big Hackcrossword puzzleDown2.4.5.6.10.Steps taken to protect a computer or computersystem against unauthorized access or attack.(Cybersecurity)Using a computer to gain unauthorized access todata in a system. (Hack)A type of computer opening which can be used toconnect equipment to a computer. (USB)A secret word or phrase that allows access to aphone, computer system or service. (Password)Facts or information used usually to calculate,analyze, or plan something. (Data)Across1.3.7.8.9.11.12.Dogs that are individually trained to do work orperform tasks for people with disabilities.(Service dog)Software that monitors traffic to or from yournetwork. It allows or blocks traffic based on adefined set of security rules. (Firewall)A potentially harmful link sent in an email or textmessage by a hacker. (Spam link)A type of software designed to block access to acomputer system until a certain amount ofmoney is paid. (Ransomware)The process of writing computer programs.(Coding)A person who designs, builds, or maintainsengines or machines. (Engineer)A wireless, portable personal computer with atouchscreen interface. (Tablet)

Answer key: The Big Hack wordsearch

Which Doesn’t Belong ActivityDirections: Internet users must be careful to not choose links that only look correct. See if you can spot theitem that does not belong in the examples below. Circle which you think does not belong and explain why.There could be more than one correct answer. #1 has completed as an example.#1candysmoothieJuiceservice dog#1 Explain: You could say Juice doesn’t belong because it’s capitalized. You also could say service dog doesn’tbelong because it’s two words.#2#2 Explain:#3DesktopLaptopPhoneTablet#3 Explain:#4#4 Explain:

#5#5 Explain:#65 46 412 - 33x3#6 Explain:#7#7 Explain:#8HackCyberpasswordFirewall#8 Explain:

4. Hack: Using a computer to gain unauthorized access to data in a system. 5. Coding: The process of writing computer programs. 6. Password: A secret word or phrase that allows access to a phone, computer system or service. 7. Firewall: Software that monitors traffic to or