Below is an image that speaks about different strategies to protect your data.
Once the students have looked at one of these up an..
In the future I believe there will be more issues when it comes to personal data being hacked. More and more applications and services are..
I found the idea of reviewing loyalty cards very useful. This could be done in many ways including the students having to present their fi..
I think the differences between cyber security, awareness and safety are based around how you want to use the technology. Cyber security i..
5 ethics when using technology
- Take care of technology equipment.
- Explore appropriate and safe sites for learning and research.
here is a link that students can use in class to test how strong their passwords are.
it shows how ..
We can leave traces of information in lots of ways, such as subscribing to newsletters or email chains, creating online accounts e.g. amaz..
1)Use appropriate and safe sites for internet exploring
2) Do not violate copy right laws.
3)Prevent cyberbullying by discussing, ad..
Wars of the future might be fought with computers instead of weapons.
Nations might attack each other’s financial systems, healthcare s..
The U.S Army created a code that was based on the Navajo language, during world war 2. That could make for a good history lesson.
Cyber security is about protecting computers, networks, and data from cyber attack.
Cyber awareness is the knowledge that aims to pro..
My name is Bernhard Hartl. I am a preservice teacher at James Cook University, Cairns. I am interested in learning about cyber security be..
A resource on cyberSecurity targeted to educate, empower and enrich young children, teens & adults to face..
Perfect passwords shows students how to create secure and effective passwords
Teaching children about the safety of posting online and who can see what you post
Protects computers, networks, programs and data systems through robust computer science technology and systems. Means it i..
Technology and internet are the essential things for nowadays. More applications are available to help people to solve their problem. But ..
Top 5 Code of Ethics Statements for Using Technology in the “Life Skill Class” with @rskaam..
“Scam Scenarios” Try And Spot The Tell-Tale Signs! #secondary @rskaamela
How Information Can Be Extracted From Data #secondary @rskaamela