E-Safety Workbook Name: Lesson Objectives: E-Safety Starter: What does E-Safety mean to you? (5mins) Fill in the list below with 5 words or phrases that you think of when you hear the word ‘E-Safety’ or see the following images: 1. 2. 3. 4. 5. 1 Activity 1: E-Safety focus (5mins) From what you have heard and referring to the KS3 eSafety slides… Write the 3 points you think were most important in the space provided below. Points you think are most important: 1. 2. 3. Activity 2: Keyword & Definition Match-Up (5mins) Move the grey definition boxes to match the correct keywords. Activity 3: Poster Creation (40mins) Create a poster, 1 slide only (start with a new blank PowerPoint presentation) that explains to another pupil how to stay safe online. Try and include a catchy phrase that will be difficult to forget! Help guide available if needed on the OLC: Computer Science, KS3 ICT, Year 7, ICT Skills (Lesson 2 Presentations PDF) or by clicking here: https://olc.ttsonline.net/Uploads/Computer%20Science/64653/YEAR%207%20PowerPoint %20guide.pdf 2 Activity 4: Legislation (30mins) There are many laws that govern the use of computers today and each have a different purpose. Three of the most common laws people are aware of are listed in the table below. Complete some research on these pieces of legislation and write a brief summary, in full sentences and in your own words of what they cover and the consequences that lawbreakers could face. Click the links below or read more here: https://www.bbc.co.uk/bitesize/guides/z9nk87h/revision/1 Legislation What doe s t h e Ac t cover? What consequences could be faced? The Data Protection Act Computer Misuse Act Copyright, Design and Patents Act Activity 5: The Computer Misuse Act in Real Life (30mins) Go to https://www.computerevidence.co.uk/Cases/CMA.htm Choose a recent case, read the article linked on the right-hand side of the page. Summarise the news story in your own words and try and find out the following information: ● Who it was? ● Why did they do it? ● What information did they get?/ What problems did they cause? ● What punishment did they face? Insert a summary of your story here. 3 Activity 6: Hacking & Viruses (5mins) Most of us would have heard the words ‘hacking’ and ‘viruses’ before, some may have even used them themselves. But what do they actually mean? Can you list 5 words below that come to mind when you think of the words hacking and/or viruses. 1. 2. 3. 4. 5. Activity 7: Fill in the blanks (10mins) Fill in the blanks below to form the official definitions for both viruses and hacking (not all words will be used). Virus: A virus is a that can attach computers, tablets, and other digital devices. A virus is a program designed to cause by gaining access to your device. It can copy your data or your device down. A virus spreads by duplicating itself and by itself to other files. slow trouble small program phones attaching personal Hacking: Hacking describes the action of trying to gain system contains. Hacking is not always will pay an experienced access hacker to computer files, often to steal, modify or and sometimes companies who store large amounts of to try and access their files to identify security damage confidential illegal the data that a information . weaknesses cracking Activity 8: Types of Viruses (5mins) Viruses are often known as ‘Malware’. The term malware is short for malicious software. Now we know what a virus is, we can start to look at different types of viruses. There are four common types of viruses we should be aware of and these are listed in the blue boxes below. Match up the virus name to the definition you think best describes it. Activity 9: Poster creation (40mins) Create a poster, 1 slide only (start with a new blank PowerPoint presentation) that explains to another pupil the most common viruses. This poster should include what the virus could do to their device if they got it. Further reading: https://www.bbc.co.uk/bitesize/topics/zd92fg8/articles/zcmbgk7 Activity 10: Common Cyber Security Threats (5mins) Hacking is one of three common Cyber Security Threats. The other two are called Phishing and Trolling. Match the terms to their definitions below: Activity 11: Identify the threat (5mins) Identify whether the below scenarios are describing Hacking, Phishing or Trolling: