Esafety Lesson 3

Esafety: The law
1 / 23
next
Slide 1: Slide
ComputingLower Secondary (Key Stage 3)

This lesson contains 23 slides, with interactive quizzes and text slides.

time-iconLesson duration is: 50 min

Items in this lesson

Esafety: The law

Slide 1 - Slide

This item has no instructions

How can people misuse a computer ?

Slide 2 - Mind map

This item has no instructions

Learning objective
Conquer: To be-able to identify the different Computer Laws.

Aspire: To be-able to explain what the Copyright Act, Computer Misuse Act and GDPR do.



Slide 3 - Slide

This item has no instructions

Examples of Computer Misuse
  1. Logging in as someone else (without permission)
  2. Deleting, changing files (without permission)
  3. Deploying Malware of any kind
  4. Hacking

  • These are all examples of Computer Misuse

Slide 4 - Slide

Ask student what malware is (Covered in lesson 1) 
Computer Misuse Act
The Computer Misuse act: States it is illegal to perform :

  • Unauthorised access to computer material
  • Unauthorised access with the intent to modify or damage
  • Unauthorised access with the intent to commit further crime

Slide 5 - Slide

This item has no instructions

What do you think the punishment might be for this crime?

Slide 6 - Open question

This item has no instructions

Punishment
Up to 10 years in prison 

 Unlimited fine (Decided by the court)

Slide 7 - Slide

This item has no instructions

Malware
Mal = Malicious
ware = software

One of the key rules of the computer misuse act handles the creation and spreading of malware. 

What is malware? 

Slide 8 - Slide

Malware is software designed to steal information of damage computers. 
MALWARE
NOT MALWARE
Firewall
Spyware
Virus
CPU
Trojan
Worm
Cell
Python
Ransomware

Slide 9 - Drag question

This is to test students knowledge as to what they may have heard of. 
Did you know?
  • 39% of UK businesses reported suffering a cyber attack in 2023.

  • In 2021 NUSA was a victim to a cyber attack... this attack meant that computers, phones and in school systems we not working. 

Slide 10 - Slide

This item has no instructions

Impacts 

Slide 11 - Slide

This item has no instructions

State the impact this attack may have had on the NHS and people.

Slide 12 - Open question

Operations cancelled
Patient data lost
Treatments delayed. 
Manipulating the person
Not all computer law is around the device and equipment
Many attacks are on the individual

  • This attack is known as SOCIAL ENGINEERING

Slide 13 - Slide

This item has no instructions

Phishing - What is it and how to spot it?

Slide 14 - Slide

This item has no instructions

Do you know what the word 'Copyright' means?

Slide 15 - Slide

This item has no instructions

Copyright
You have a few minutes to read THIS LINK
Consider the following questions:
  • What is copyright
  • How do you follow this law
You will then be asked to answer without the site

Slide 16 - Slide

This item has no instructions

What is copyright?
What does copyright cover?

Slide 17 - Open question

This item has no instructions

Copyright, Designs and Patents Act 1988
  • It provides legal protection on intellectual property :
  1. original creative works, 
  2. designs, 
  3. and inventions.

  •  It gives creators exclusive rights to control their intellectual property

If you intend to use someone else's intellectual property you should:
  • Get permission (which could involve a cost)

Slide 18 - Slide

This item has no instructions

Famous Real life example

Slide 19 - Slide

This item has no instructions

What law do you need to follow when collecting assets (e.g. pictures, videos, writing, ect.) to include on a website?
A
Copyright Law
B
Computer Misuse Act
C
Health and Safety at Work Act
D
Criminal Law

Slide 20 - Quiz

This item has no instructions

What is the purpose of the Computer Misuse Act?
A
Stops Hackers and malware
B
Makes it illegal to gain unauthorised access to computer systems
C
Protect all personal data that is stored about someone
D
Makes it illegal to make viruses

Slide 21 - Quiz

This item has no instructions

Which of these is not malware?
A
Ransomware
B
Virus
C
Worm
D
Python

Slide 22 - Quiz

This item has no instructions

Extension
Using your research skills look into these three malware threats:
  • Virus
  • Worm
  • Trojan

Create a poster that compares the three.  What do they do and how are they different?

Slide 23 - Slide

This item has no instructions