#secondary
TagTopic 5 – Code of Ethics
Top 5 Code of Ethics Statements:
- Work Computer/Network = Only for work.
Always assume EVERYTHING you do, search, visit, or vie..
Unit 4 – Passwords
Everything needs a password.
Everything needs a unique password.
Everything needs a secure password.
“password” is not going to cut i..
Digital Breadcrumbs
Digital Breadcrumbs
We have shared a few examples of how information can be extracted from data (such as in your images). What are other ..
Unit 2 Task – Cyber Security, Awareness, and Safety
Being safe online is the combination of a number of factors; Security, Awareness, and Safety.
Cyber Security refers to the systems that a..
Unit 5
My top 5 code of ethics rules to share with students and school are:
- Illicit, harmful or degrading content on digital devices and int..
Unit 4
The future of cyber attacks will involve public and national security. Wars will employ cyber attacks to threaten the safety of a country…
Unit 3
An example of sharing data is listening to music in an online platform, or turn on our geolocalisation in our devices. Even though we don’..
Unit 2
Cyber security refers to protecting computers and hardwares from digital attacks, such as virus and hacking. Cyber awareness is creating k..
Unit 5 task option 2
A recent clip from a Joe Rogan podcast (warning: swearing) that can be used as a bouncing o..
Unit 4 Task option 3
Attackers in the future, if they aren’t already, will use deepfake technology to simulate your appearance via amalgamation of self-uploade..
You must be logged in to post a comment.