Search results

Listed under:  Society  >  Citizenship  >  Law  >  Crime  >  Crime prevention  >  Security  >  Data security
Listed under:  Technologies  >  Information and communication technologies  >  Data storage  >  Data security
Text

Cyber security analysis from The Conversation

This is a collection of articles about cyber security. It includes articles on cyber-espionaage, cyber crime, data security, government policy around cyber security, and international perspectives including from US, China and UK. The articles are written in plain language and are authored by experts from universities in ...

Text

Exploring digital systems unplugged: networks: years 5-6

This PDF provides activities in which students identify features of digital systems, and create models to demonstrate their operations. Students are encouraged to demonstrate their understanding of Domain Name Servers (DNS), routing, and transmission control and internet protocols (TCP/IP).

Text

Newsletter – July 2019

This newsletter from the Digital Technologies in Focus project includes information about an On Country staff development day with Leonara District High School, cybersecurity, the Australian Curriculum, and useful resources.

Downloadable

Questacon Cyber Castle Challenge

Embark on an exhilarating virtual adventure that will ignite young minds and equip them for the digital frontier. The Questacon Cyber Castle Challenge is a FREE Minecraft: Education game and resources to engage students in cyber security concepts and skills of the future.

Video

Mighty Heroes

This resource includes four short animated video chapters and supporting educator notes. Each one features a hero and their online safety superpower. The educator notes are designed to support discussions with students about the key online safety messages in each chapter.

Text

How our class stays safe online

This resource can be used in the classroom to teach students aged 5 to 8 years about safe online behaviour. It includes discussion questions, a poster and guidelines about how to create a tech agreement.

Video

Tagged

The award-winning short film Tagged is supported by teaching resources that encourage young people to reflect on the real life consequences of cyberbullying, sharing intimate images, and a negative digital reputation.

Text

Cybersmart Challenge

This resource includes teacher-led activities using animated videos to introduce students to key online safety issues including cyberbullying, protecting personal information and sharing images. There are three modules including videos, which can be used as stand-alone lessons or as a series.

Text

Online boundaries and consent

The activities in this suite are designed to support students as they learn about online consent and permission, and how to define online boundaries.

Text

Online friends and strangers

This presentation follows the story of a young student who makes a friend online and starts to question their unusual behaviour. Students are encouraged to examine and discuss what to do when an online friendship becomes unsafe or worrying.

Text

Ask for help

This classroom activity is designed to help students recognise an unsafe situation when using digital technologies and to explore help-seeking strategies. This resource incudes a PowerPoint slide deck, educator notes and a student activity pack.

Text

Hector's World

In this resource students will identify strategies for determining who they should trust with their online personal information and ways to keep their computers safe. They will also learn about the importance of seeking help when they feel unsafe or uneasy online or if they experience cyberbullying. The resource includes ...

Image

Online safety classroom posters

These posters for lower primary students can be displayed in the classroom and used to start online safety discussions during lessons across key learning areas.

Assessment

Network infographic

Throughout the lesson sequence, students keep and maintain a reflection log with key content to inform the development of an infographic.

Online

Filter bubbles, bias, rabbit holes and nudging

This lesson focuses on the AI systems that recommend content in various applications that students use on a day-to-day basis. It draws on students’ ethical understandings during analysis of these systems. This lesson was developed by the Digital Technologies Institute in collaboration with the Digital Technologies Hub.

Text

Questions we have about the internet

This classroom activity is designed to help students understand that the internet is a digital network that connects people all over the world. This means it is important to be safe when you go online.

Text

Work sample Years 5 and 6 Digital Technologies: Explanation: School networks

This work sample demonstrates evidence of student learning in relation to aspects of the achievement standards for Years 5 and 6 Digital Technologies. The primary purpose for the work sample is to demonstrate the standard, so the focus is on what is evident in the sample not how it was created. The sample is an authentic ...

Text

Under lock and key

This classroom activity is designed to help students understand the concept of personal information and why it’s important to protect personal information that identifies you.

Text

Detecting phishing scams

In this learning sequence, students work in groups to create and analyse common phishing scams, gaining a deeper understanding of the techniques used by scammers. They then develop rules for artificial intelligence (AI) algorithms to detect these scams, promoting critical thinking about cybersecurity and online safety.

Text

Privacy and security

This classroom activity is designed to empower students to protect their online privacy and the personal information that identifies them. Students will learn about the skills required to create safer online environments. The resource includes an animated slide deck video, lesson plan, student worksheet and student follow-up ...