013: phishing tales: spotting the fake in your inbox (ks3)
Become a cyber detective and learn how to spot fake emails and scams to protect your digital identity.
Operation: Inbox Defender
The Scenario
A wave of fraudulent emails has hit the school network! As a junior analyst for the Cyber Defence Team, your mission is to identify the common tricks used by these scammers and create a survival guide to help students and teachers spot them before they click.
The Persona
You are The Digital Protector. You focus on Digital Security and Safety. You don't just use technology; you defend it. You look for threats, understand the tricks criminals use, and help others stay safe online.
A wave of fraudulent emails has hit the school network! As a junior analyst for the Cyber Defence Team, your mission is to identify the common tricks used by these scammers and create a survival guide to help students and teachers spot them before they click.

You are The Digital Protector. You focus on Digital Security and Safety. You don't just use technology; you defend it. You look for threats, understand the tricks criminals use, and help others stay safe online.
1
Phase 1: The Investigation
Open a web browser and search for the following terms to build your knowledge:
Phishing email signs
Social Engineering techniques
How to spot a fake URL
Look for images of "Phishing Email Examples". Can you spot the errors? Look for spelling mistakes, generic greetings (e.g., "Dear Customer"), and urgent demands.
2
Phase 2: The Analysis
Open your presentation software (e.g., PowerPoint, Google Slides) or DTP software.
Find three different examples of phishing emails online (images).
Paste them into your document.
Use arrows and text boxes to annotate the suspicious parts. Label the "Red Flags" (e.g., "Suspicious Link", "Typos", "Threatening Language").
3
Phase 3: The Defence Guide
Create a "Top 5 Tips to Spot a Phish" poster or slide.
Make it visual and catchy. It needs to grab attention!
Include a section on What to do if you spot one (e.g., Report it, Don't click, Delete it).
Challenge: Explain what "Social Engineering" means in your own words on the poster.
Outcome
I have explained what Phishing and Social Engineering are.
I have annotated real examples to show I can spot the "Red Flags".
I have created a clear, visual guide to help others protect themselves.
Last modified: January 8th, 2026
