Uncategorized
CategoryTopic 5 Task- Code of Ethics
- Respect others online as you would in reality.
- Take responsibility for your online safety (if you’re not sure ask).
- What you put..
Unit 4 Task – Thoughts on future cyber attacks
As has been a consistent case throughout highly volatile periods of history, propaganda is an effective strategy to demoralise and erode t..
Task 5
My code of ethics statements for using technology in the classroom:
- When communicating online treat others with respect
- Respect th..
Task 4
Given the development of the war in Ukraine and how the internet is being used by both sides to fight I am concerned that cyber attacks in..
Task 3
A good way to inspire a lesson about encoding and decoding messages could relate to the breaking of the Enigma Machine during WW2. With t..
Unit 2 Task – Option 1
Cyber security relates to the practice of protecting computers, networks, programs, and data from digital attacks whereas cyber awareness ..
Unit 3 Task – Leaving Traces of Information
Although there is ample information that can be determined from digital images, including preferences, age, religious and sexual orientati..
Unit 2 – activity and classroom resource.
The resource I have found for this unit relates to the privacy and social media video produ..
Unit 3
Cybersecurity Tips for Teachers
Now that you have an understanding of the cyber threats that educators face today, you might be wondering..
Unit 2_ Task
Fundamentally, cyber safety focuses on people while cybersecurity involves information.
Cyber safety uses technology to help prote..
You must be logged in to post a comment.