Esafety Lesson 3

Survey
Student Voice Survey
Start Date: 11th November
End Date: 22nd November

1 / 24
suivant
Slide 1: Diapositive
ComputingLower Secondary (Key Stage 3)

Cette leçon contient 24 diapositives, avec quiz interactifs et diapositives de texte.

time-iconLa durée de la leçon est: 50 min

Éléments de cette leçon

Survey
Student Voice Survey
Start Date: 11th November
End Date: 22nd November

Slide 1 - Diapositive

Cet élément n'a pas d'instructions

Esafety: The law

Slide 2 - Diapositive

Cet élément n'a pas d'instructions

How can people misuse a computer ?

Slide 3 - Carte mentale

Cet élément n'a pas d'instructions

Learning objective
Conquer: To be-able to identify the different Computer Laws.

Aspire: To be-able to explain what the Copyright Act, Computer Misuse Act and GDPR do.



Slide 4 - Diapositive

Cet élément n'a pas d'instructions

Examples of Computer Misuse
  1. Logging in as someone else (without permission)
  2. Deleting, changing files (without permission)
  3. Deploying Malware of any kind
  4. Hacking

  • These are all examples of Computer Misuse

Slide 5 - Diapositive

Ask student what malware is (Covered in lesson 1) 
Computer Misuse Act
The Computer Misuse act: States it is illegal to perform :

  • Unauthorised access to computer material
  • Unauthorised access with the intent to modify or damage
  • Unauthorised access with the intent to commit further crime

Slide 6 - Diapositive

Cet élément n'a pas d'instructions

What do you think the punishment might be for this crime?

Slide 7 - Question ouverte

Cet élément n'a pas d'instructions

Punishment
Up to 10 years in prison 

 Unlimited fine (Decided by the court)

Slide 8 - Diapositive

Cet élément n'a pas d'instructions

Malware
Mal = Malicious
ware = software

One of the key rules of the computer misuse act handles the creation and spreading of malware. 

What is malware? 

Slide 9 - Diapositive

Malware is software designed to steal information of damage computers. 
MALWARE
NOT MALWARE
Firewall
Spyware
Virus
CPU
Trojan
Worm
Cell
Python
Ransomware

Slide 10 - Question de remorquage

This is to test students knowledge as to what they may have heard of. 
Did you know?
  • 39% of UK businesses reported suffering a cyber attack in 2023.

  • In 2021 NUSA was a victim to a cyber attack... this attack meant that computers, phones and in school systems we not working. 

Slide 11 - Diapositive

Cet élément n'a pas d'instructions

Impacts 

Slide 12 - Diapositive

Cet élément n'a pas d'instructions

State the impact this attack may have had on the NHS and people.

Slide 13 - Question ouverte

Operations cancelled
Patient data lost
Treatments delayed. 
Manipulating the person
Not all computer law is around the device and equipment
Many attacks are on the individual

  • This attack is known as SOCIAL ENGINEERING

Slide 14 - Diapositive

Cet élément n'a pas d'instructions

Phishing - What is it and how to spot it?

Slide 15 - Diapositive

Cet élément n'a pas d'instructions

Do you know what the word 'Copyright' means?

Slide 16 - Diapositive

Cet élément n'a pas d'instructions

Copyright
You have a few minutes to read THIS LINK
Consider the following questions:
  • What is copyright
  • How do you follow this law
You will then be asked to answer without the site

Slide 17 - Diapositive

Cet élément n'a pas d'instructions

What is copyright?
What does copyright cover?

Slide 18 - Question ouverte

Cet élément n'a pas d'instructions

Copyright, Designs and Patents Act 1988
  • It provides legal protection on intellectual property :
  1. original creative works, 
  2. designs, 
  3. and inventions.

  •  It gives creators exclusive rights to control their intellectual property

If you intend to use someone else's intellectual property you should:
  • Get permission (which could involve a cost)

Slide 19 - Diapositive

Cet élément n'a pas d'instructions

Famous Real life example

Slide 20 - Diapositive

Cet élément n'a pas d'instructions

What law do you need to follow when collecting assets (e.g. pictures, videos, writing, ect.) to include on a website?
A
Copyright Law
B
Computer Misuse Act
C
Health and Safety at Work Act
D
Criminal Law

Slide 21 - Quiz

Cet élément n'a pas d'instructions

What is the purpose of the Computer Misuse Act?
A
Stops Hackers and malware
B
Makes it illegal to gain unauthorised access to computer systems
C
Protect all personal data that is stored about someone
D
Makes it illegal to make viruses

Slide 22 - Quiz

Cet élément n'a pas d'instructions

Which of these is not malware?
A
Ransomware
B
Virus
C
Worm
D
Python

Slide 23 - Quiz

Cet élément n'a pas d'instructions

Extension
Using your research skills look into these three malware threats:
  • Virus
  • Worm
  • Trojan
Create a poster on Canva that compares the three.  
  1. What do they do? 
  2. How are they different?

Slide 24 - Diapositive

Cet élément n'a pas d'instructions