Uploaded by Palo D

eSafety Workbook (1)

advertisement
E-Safety Workbook
Name:
Lesson Objectives: E-Safety
Starter: What does E-Safety mean to you? (5mins)
Fill in the list below with 5 words or phrases that you think of when you hear the word ‘E-Safety’ or see
the following images:
1.
2.
3.
4.
5.
1
Activity 1: E-Safety focus (5mins)
From what you have heard and referring to the KS3 eSafety slides…
Write the 3 points you think were most important in the space provided below.
Points you think are most important:
1.
2.
3.
Activity 2: Keyword & Definition Match-Up (5mins)
Move the grey definition boxes to match the correct keywords.
Activity 3: Poster Creation (40mins)
Create a poster, 1 slide only (start with a new blank PowerPoint presentation) that
explains to another pupil how to stay safe online. Try and include a catchy phrase that will
be difficult to forget! Help guide available if needed on the OLC: Computer Science, KS3
ICT, Year 7, ICT Skills (Lesson 2 Presentations PDF) or by clicking here:
https://olc.ttsonline.net/Uploads/Computer%20Science/64653/YEAR%207%20PowerPoint
%20guide.pdf
2
Activity 4: Legislation (30mins)
There are many laws that govern the use of computers today and each have a different purpose. Three of
the most common laws people are aware of are listed in the table below. Complete some research on these
pieces of legislation and write a brief summary, in full sentences and in your own words of what they cover and
the consequences that lawbreakers could face.
Click the links below or read more here: https://www.bbc.co.uk/bitesize/guides/z9nk87h/revision/1
Legislation
What doe s t h e Ac t cover?
What consequences
could be faced?
The Data Protection
Act
Computer Misuse
Act
Copyright, Design
and Patents Act
Activity 5: The Computer Misuse Act in Real Life (30mins)
Go to https://www.computerevidence.co.uk/Cases/CMA.htm
Choose a recent case, read the article linked on the right-hand side of the page.
Summarise the news story in your own words and try and find out the following information:
● Who it was?
● Why did they do it?
● What information did they get?/ What problems did they cause?
● What punishment did they face?
Insert a summary of your story here.
3
Activity 6: Hacking & Viruses (5mins)
Most of us would have heard the words ‘hacking’ and ‘viruses’ before, some may have even used them
themselves. But what do they actually mean? Can you list 5 words below that come to mind when you think
of the words hacking and/or viruses.
1.
2.
3.
4.
5.
Activity 7: Fill in the blanks (10mins)
Fill in the blanks below to form the official definitions for both viruses and hacking
(not all words will be used).
Virus:
A virus is a
that can attach computers, tablets,
and other digital devices. A virus is a
program
designed to cause
by gaining access to your device. It can copy your data or
your device down. A virus
spreads by duplicating itself and by
itself to other files.
slow
trouble
small
program
phones
attaching
personal
Hacking:
Hacking describes the action of trying to gain
system contains. Hacking is not always
will pay an experienced
access
hacker
to computer files, often to steal, modify or
and sometimes companies who store large amounts of
to try and access their files to identify security
damage
confidential
illegal
the data that a
information
.
weaknesses
cracking
Activity 8: Types of Viruses (5mins)
Viruses are often known as ‘Malware’. The term malware is short for malicious software. Now we know what a
virus is, we can start to look at different types of viruses. There are four common types of viruses we should
be aware of and these are listed in the blue boxes below. Match up the virus name to the definition you
think best describes it.
Activity 9: Poster creation (40mins)
Create a poster, 1 slide only (start with a new blank PowerPoint presentation) that explains to
another pupil the most common viruses. This poster should include what the virus could do to
their device if they got it. Further reading:
https://www.bbc.co.uk/bitesize/topics/zd92fg8/articles/zcmbgk7
Activity 10: Common Cyber Security Threats (5mins)
Hacking is one of three common Cyber Security Threats. The other two are called Phishing and Trolling. Match
the terms to their definitions below:
Activity 11: Identify the threat (5mins)
Identify whether the below scenarios are describing Hacking, Phishing or Trolling:
Download