Impacts of Tech 5 (Privacy)

Impacts of Tech 5
Privacy
1 / 18
next
Slide 1: Slide
ComputingLower Secondary (Key Stage 3)

This lesson contains 18 slides, with interactive quizzes and text slides.

time-iconLesson duration is: 50 min

Items in this lesson

Impacts of Tech 5
Privacy

Slide 1 - Slide

This item has no instructions

Last week: Name and explain the 2 laws we discussed last week .

This week: What methods do social media apps use to gather your data?

Slide 2 - Open question

This item has no instructions

How does technology impact us?
In this lesson, you will:

Strengthening: Identify the difference between data and information

Excelling: Assess the information you give out and how it can be used. 

Slide 3 - Slide

This item has no instructions

Impacts 
There are a range of ways that technology can impact our daily lives.


Slide 4 - Slide

This item has no instructions

Data and information

Data is raw facts and figures:

  • Information is created when that data has been processed and becomes meaningful:

  • These are scores from a test where the pass mark was 35.

  • John needs to resit the test.

Slide 5 - Slide

This item has no instructions

Why is your data valuable to businesses?
This data is the contents of a shopping basket for an online customer.

What assumptions can you reasonably make about this customer?

 

Slide 6 - Slide

This item has no instructions

Why is your data valuable to businesses?
My 3 assumptions
  1. User likes camping or is an outdoorsman!
  2. User has a pet, most likely a dog
  3. User is into fitness and again being outdoors.

  • Now that we have our 3 assumptions about our user we can begin to advertise more specific products.






Slide 7 - Slide

This item has no instructions

State if you would advertise the following products to the user and why!

Slide 8 - Open question

This item has no instructions

Data collection
Companies collect a range of information about you every day. From your browsing habits, your purchases and the content you view. 

Think about the information you give out.

Slide 9 - Slide

This item has no instructions

Your privacy 
Every day their are millions of attacks that could give a criminal access to your data. 

This could range from you passwords, your medical information, banking info or even your shopping 

Slide 10 - Slide

This item has no instructions

Can you find the most common sectors that are attacked?


Threat map

Slide 11 - Open question

This item has no instructions

Data theft
  • So far we have only spoken about data that companies legally obtain.

  • However your personal details can be stolen or intercepted. 

  • This could be accomplished in many different ways from hacking, data leaks or brute force attacks.

  • You are going to perform a brute force attack. 

Slide 12 - Slide

This item has no instructions

George posts daily about his hobbies and interests, can you figure out what his password may be? 






Guess his password (Hint on next slide) 

Slide 13 - Slide

Give student a couple of minutes to make some guesses, then move onto the hint slide.

Slide 14 - Slide

This item has no instructions

Slide 15 - Slide

This item has no instructions

So what is a brute force attack?

Slide 16 - Open question

This item has no instructions

Brute force attacks
This is a form of attack that makes multiple attempts to discover something (such as a password).

Slide 17 - Slide

This item has no instructions

Step 1: Create a poster on one of the following

  • How to prevent brute force attacks

  • How to companies use your data. 




Brute force attacks
Help

Slide 18 - Slide

This item has no instructions