An example of sharing data is listening to music in an online platform, or turn on our geolocalisation in our devices. Even though we don’..
Cyber security refers to protecting computers and hardwares from digital attacks, such as virus and hacking. Cyber awareness is creating k..
Hi, I’m Sarah, a pre-service teacher from Queensland. From this course I hope to be able to gain a better understanding of how to keep mys..
Unit 5 task option 2
A recent clip from a Joe Rogan podcast (warning: swearing) that can be used as a bouncing o..
Unit 4 Task option 3
Attackers in the future, if they aren’t already, will use deepfake technology to simulate your appearance via amalgamation of self-uploade..
- Be kind and respectful of others.
- Be careful what you share online.
- Check your privacy settings and make sure you are in control..
This lesson plan focusses on educating students about secure passwords:
One interesting example of a historical code include the Enigma machine, which was decrypted by code-breakers from Bletchley Park during W..
Cyber security refers to the measures we use to protect computers from digital attacks, for example, secure system design and implementati..
Unit 3 Task option 1
Geolocation data such as by using google maps, or generally having your location services on. Any activity you make on the internet, for i..
You must be logged in to post a comment.