Esafety Lesson 3

Esafety: The law
1 / 23
volgende
Slide 1: Tekstslide
ComputingLower Secondary (Key Stage 3)

In deze les zitten 23 slides, met interactieve quizzen en tekstslides.

time-iconLesduur is: 50 min

Onderdelen in deze les

Esafety: The law

Slide 1 - Tekstslide

Deze slide heeft geen instructies

How can people misuse a computer ?

Slide 2 - Woordweb

Deze slide heeft geen instructies

Learning objective
Conquer: To be-able to identify the different Computer Laws.

Aspire: To be-able to explain what the Copyright Act, Computer Misuse Act and GDPR do.



Slide 3 - Tekstslide

Deze slide heeft geen instructies

Examples of Computer Misuse
  1. Logging in as someone else (without permission)
  2. Deleting, changing files (without permission)
  3. Deploying Malware of any kind
  4. Hacking

  • These are all examples of Computer Misuse

Slide 4 - Tekstslide

Ask student what malware is (Covered in lesson 1) 
Computer Misuse Act
The Computer Misuse act: States it is illegal to perform :

  • Unauthorised access to computer material
  • Unauthorised access with the intent to modify or damage
  • Unauthorised access with the intent to commit further crime

Slide 5 - Tekstslide

Deze slide heeft geen instructies

What do you think the punishment might be for this crime?

Slide 6 - Open vraag

Deze slide heeft geen instructies

Punishment
Up to 10 years in prison 

 Unlimited fine (Decided by the court)

Slide 7 - Tekstslide

Deze slide heeft geen instructies

Malware
Mal = Malicious
ware = software

One of the key rules of the computer misuse act handles the creation and spreading of malware. 

What is malware? 

Slide 8 - Tekstslide

Malware is software designed to steal information of damage computers. 
MALWARE
NOT MALWARE
Firewall
Spyware
Virus
CPU
Trojan
Worm
Cell
Python
Ransomware

Slide 9 - Sleepvraag

This is to test students knowledge as to what they may have heard of. 
Did you know?
  • 39% of UK businesses reported suffering a cyber attack in 2023.

  • In 2021 NUSA was a victim to a cyber attack... this attack meant that computers, phones and in school systems we not working. 

Slide 10 - Tekstslide

Deze slide heeft geen instructies

Impacts 

Slide 11 - Tekstslide

Deze slide heeft geen instructies

State the impact this attack may have had on the NHS and people.

Slide 12 - Open vraag

Operations cancelled
Patient data lost
Treatments delayed. 
Manipulating the person
Not all computer law is around the device and equipment
Many attacks are on the individual

  • This attack is known as SOCIAL ENGINEERING

Slide 13 - Tekstslide

Deze slide heeft geen instructies

Phishing - What is it and how to spot it?

Slide 14 - Tekstslide

Deze slide heeft geen instructies

Do you know what the word 'Copyright' means?

Slide 15 - Tekstslide

Deze slide heeft geen instructies

Copyright
You have a few minutes to read THIS LINK
Consider the following questions:
  • What is copyright
  • How do you follow this law
You will then be asked to answer without the site

Slide 16 - Tekstslide

Deze slide heeft geen instructies

What is copyright?
What does copyright cover?

Slide 17 - Open vraag

Deze slide heeft geen instructies

Copyright, Designs and Patents Act 1988
  • It provides legal protection on intellectual property :
  1. original creative works, 
  2. designs, 
  3. and inventions.

  •  It gives creators exclusive rights to control their intellectual property

If you intend to use someone else's intellectual property you should:
  • Get permission (which could involve a cost)

Slide 18 - Tekstslide

Deze slide heeft geen instructies

Famous Real life example

Slide 19 - Tekstslide

Deze slide heeft geen instructies

What law do you need to follow when collecting assets (e.g. pictures, videos, writing, ect.) to include on a website?
A
Copyright Law
B
Computer Misuse Act
C
Health and Safety at Work Act
D
Criminal Law

Slide 20 - Quizvraag

Deze slide heeft geen instructies

What is the purpose of the Computer Misuse Act?
A
Stops Hackers and malware
B
Makes it illegal to gain unauthorised access to computer systems
C
Protect all personal data that is stored about someone
D
Makes it illegal to make viruses

Slide 21 - Quizvraag

Deze slide heeft geen instructies

Which of these is not malware?
A
Ransomware
B
Virus
C
Worm
D
Python

Slide 22 - Quizvraag

Deze slide heeft geen instructies

Extension
Using your research skills look into these three malware threats:
  • Virus
  • Worm
  • Trojan

Create a poster that compares the three.  What do they do and how are they different?

Slide 23 - Tekstslide

Deze slide heeft geen instructies