Below is an image that speaks about different strategies to protect your data.
Once the students have looked at one of these up and answered questions on why it is important to do this ect. Get them to answer the question of what they would do if they where able to get passed someone’s password or protection.
How would they use that persons informaiton?
Then report both back to the class.
You must be logged in to post a comment.
+ There are no commentsAdd yours