ttsonline.net  · Web view2021. 1. 4. · 1. 2. 3. Activity. 2: Keyword & Definition Match-Up...

10
E-Safety Workbook Name:

Transcript of ttsonline.net  · Web view2021. 1. 4. · 1. 2. 3. Activity. 2: Keyword & Definition Match-Up...

Page 1: ttsonline.net  · Web view2021. 1. 4. · 1. 2. 3. Activity. 2: Keyword & Definition Match-Up (5mins) Move the . grey. definition boxes to match the correct keywords. Activity. 3:

E-Safety Workbook

Name:

Page 2: ttsonline.net  · Web view2021. 1. 4. · 1. 2. 3. Activity. 2: Keyword & Definition Match-Up (5mins) Move the . grey. definition boxes to match the correct keywords. Activity. 3:

1

Lesson Objectives: E-Safety

Starter: What does E-Safety mean to you? (5mins)Fill in the list below with 5 words or phrases that you think of when you hear the word ‘E-Safety’ or see

the following images:

1.

2.

3.

4.

5.

Page 3: ttsonline.net  · Web view2021. 1. 4. · 1. 2. 3. Activity. 2: Keyword & Definition Match-Up (5mins) Move the . grey. definition boxes to match the correct keywords. Activity. 3:

2

Activity 1: E-Safety focus (5mins)From what you have heard and referring to the KS3 eSafety slides…

Write the 3 points you think were most important in the space provided below.

Points you think are most important:

1.

2.

3.

Activity 2: Keyword & Definition Match-Up (5mins)Move the grey definition boxes to match the correct keywords.

Activity 3: Poster Creation (40mins)

Create a poster, 1 slide only (start with a new blank PowerPoint presentation) that explains to another pupil how to stay safe online. Try and include a catchy phrase that will be difficult to forget! Help guide available if needed on the OLC: Computer Science, KS3 ICT, Year 7, ICT Skills (Lesson 2 Presentations PDF) or by clicking here: https://olc.ttsonline.net/Uploads/Computer%20Science/64653/YEAR%207%20PowerPoint%20guide.pdf

Page 4: ttsonline.net  · Web view2021. 1. 4. · 1. 2. 3. Activity. 2: Keyword & Definition Match-Up (5mins) Move the . grey. definition boxes to match the correct keywords. Activity. 3:

3

Activity 4: Legislation (30mins)

There are many laws that govern the use of computers today and each have a different purpose. Three of the most common laws people are aware of are listed in the table below. Complete some research on these pieces of legislation and write a brief summary, in full sentences and in your own words of what they cover and the consequences that lawbreakers could face.Click the links below or read more here: https://www.bbc.co.uk/bitesize/guides/z9nk87h/revision/1

Legislation What does the Act cover? What consequences could be faced?

The Data P r o t e c t i o n Act

Computer M i s u s e Act

Copyright, Design and Patents Act

Activity 5: The Computer Misuse Act in Real Life (30mins)Go to https://www.computerevidence.co.uk/Cases/CMA.htm

Choose a recent case, read the article linked on the right-hand side of the page.

Summarise the news story in your own words and try and find out the following information:

● Who it was?● Why did they do it?● What information did they get?/ What problems did they cause?● What punishment did they face?

Insert a summary of your story here.

Page 5: ttsonline.net  · Web view2021. 1. 4. · 1. 2. 3. Activity. 2: Keyword & Definition Match-Up (5mins) Move the . grey. definition boxes to match the correct keywords. Activity. 3:

Activity 6: Hacking & Viruses (5mins)Most of us would have heard the words ‘hacking’ and ‘viruses’ before, some may have even used them themselves. But what do they actually mean? Can you list 5 words below that come to mind when you think of the words hacking and/or viruses.

1.

2.

3.

4.

5.

Activity 7: Fill in the blanks (10mins)Fill in the blanks below to form the official definitions for both viruses and hacking (not all words will be used).

Virus:A virus is a that can attach computers, tablets, and other digital devices. A virus is a program designed to cause by gaining access to your device. It can copy your data or your device down. A virus spreads by duplicating itself and by itself to other files.

slow trouble small program phones attaching personal

Hacking:

Hacking describes the action of trying to gain to computer files, often to steal, modify or the data that a

system contains. Hacking is not always and sometimes companies who store large amounts of information will pay an experienced to try and access their files to identify security .

access hacker damage confidential illegal weaknesses cracking

Page 6: ttsonline.net  · Web view2021. 1. 4. · 1. 2. 3. Activity. 2: Keyword & Definition Match-Up (5mins) Move the . grey. definition boxes to match the correct keywords. Activity. 3:

Activity 8: Types of Viruses (5mins)Viruses are often known as ‘Malware’. The term malware is short for malicious software. Now we know what a

virus is, we can start to look at different types of viruses. There are four common types of viruses we should be aware of and these are listed in the blue boxes below. Match up the virus name to the definition you

think best describes it.

Activity 9: Poster creation (40mins)

Create a poster, 1 slide only (start with a new blank PowerPoint presentation) that explains to another pupil the most common viruses. This poster should include what the virus could do to their device if they got it. Further reading: https://www.bbc.co.uk/bitesize/topics/zd92fg8/articles/zcmbgk7

Activity 10: Common Cyber Security Threats (5mins)Hacking is one of three common Cyber Security Threats. The other two are called Phishing and Trolling. Match

the terms to their definitions below:

Page 7: ttsonline.net  · Web view2021. 1. 4. · 1. 2. 3. Activity. 2: Keyword & Definition Match-Up (5mins) Move the . grey. definition boxes to match the correct keywords. Activity. 3:

Activity 11: Identify the threat (5mins)Identify whether the below scenarios are describing Hacking, Phishing or Trolling: