task5


Below is an image that speaks about different strategies to protect your data.

 

Once the students have looked at one of these up and answered questions on why it is important to do this ect. Get them to answer the question of what they would do if they where able to get passed someone’s password or protection.

 

How would they use that persons informaiton?

 

Then report both back to the class.

image-for-cyber-ethics.jpg

+ There are no comments

Add yours

This site uses Akismet to reduce spam. Learn how your comment data is processed.