Download presentation
Presentation is loading. Please wait.
1
Digital Divide, Privacy, and Cyber Security
Component 1.5 Digital Divide, Privacy, and Cyber Security
2
Starter: Entry Ticket Complete the Entry Ticket for your Privacy and Cyber Security Extension: Define the following keywords: Cyber Security Cyber Crime Ethical Issues Legal Issues Explain the difference between Legal and Ethical Issues
3
Learning Intentions and Outcomes
Learning Intention To develop an understanding of the ethical issues of privacy and cyber security
4
Assessment Outcomes Describe the ethical impacts of digital technology, including issues of privacy and cybersecurity.
5
Pre-Reading Recap What is an ‘ethical’ issue?
How is it currently being closed? What is a ‘legal’ issue? What does the term ‘professional standard’ mean? What is the difference between ethical and legal issues? What is a code of conduct? What is Privacy? Why do you think a code of conduct is important in computing? How can Privacy be lost? What is the digital divide?
6
The Digital Divide The digital divide is a term that refers to the gap between populations that have full access to modern information and communications technology, and those who have restricted access. It is used mainly to describe the split between those with and those without broadband Internet access.
7
Causes of the Digital Divide
The divide traditionally exists between: Cities and rural areas Educated and uneducated socioeconomic groups Globally, between the more and less industrially developed nations. Even among populations with some access to technology, the digital divide can be evident: lower-performance computers and lower- speed connections. Reasons for the divide include: Money - people need money to access the internet and buy the latest devices, such as computers, smartphones and tablets. Location - access to network coverage and high-speed broadband can vary greatly depending on where you live. Most large towns and cities have good network coverage and access, but rural areas can have limited or no coverage. Without these connections, the internet can be slow or non-existent. IT literacy - knowing how to use technology empowers people to make the most of it. People who don't know how to use computers and the internet do not have the opportunities that IT-literate people do. Internet access - the internet provides many opportunities for people who want to access online shopping, banking and job adverts. Students with internet access at home can research or revise with online help.
8
Bridging the Digital Divide
Many technologies are being developed that will help to bridge the digital divide. These include: Drones Self-Driving Cars AI (Artificial Intelligence) Balloon Wifi In your books you should put the title: ‘The Digital Divide’
9
Digital Divide Grade 4 Exercises
Put the subheading ‘Digital Divide’ in your books and complete the Grade 4 Exercises. Explain what the digital divide is Explain 3 causes Explain 2 different methods of how the divide is being bridged.
10
Privacy Privacy is an ethical issue. Digital Privacy is defined as “the protection of information from private citizens who use digital media” But what does this mean? For more help on privacy issues visit: es/zkhykqt/revision/1 Discussion Topic: What information can we consider to be private and who owns data? For example, photographs that are uploaded to social networks often legally become the property of the website. At what stage can private information like this be used and for what purposes?
11
Causes for the loss of privacy
The monitoring of online activity, including browsing histories and use of social media. The interception and reading of messages. Distribution of databases storing personal information. Theft of private information by hackers. To safeguard personal information companies must first decide what to do with it. This brings up an ethical problem that the company must decide upon: Deciding the scope of personal and private information they can gather. The confidential treatment of such information. The accuracy of information – who checks that the information is correct. The purposes for which various categories of information may be used. The rights of a person - question of consent
12
Grade 4 Exercises Put the sub-heading “Privacy” in your book and answer the Grade 4 Exercises You will need to use your research learning habit to answer these questions. For more help on privacy issues visit: uides/zkhykqt/revision/1 What does the term ‘Digital Privacy’ mean? Explain 3 different causes for the loss of privacy – providing examples Explain the ethical issues that companies have when creating their privacy policies – use examples from real companies to back this up (you will need to research these independently)
13
Cyber Security Computer networks have many benefits but they also create security risks. By connecting computers it is possible to share personal data easily. However, it makes computers more vulnerable to interference from other people. Online networks are vital to many business operations, but they are liable to attacks targeted to access confidential data, such as customers’ details or technical information about products etc. This level of data is very expensive to gather and its loss could result in loss of reputation and even business failure.
14
Computer security There are 3 types of computer security:
Preventive Corrective Detective Preventive security Access rights Firewalls Physical security Passwords Encryption Acceptable use policies Corrective Backup and restore procedures Redundant hardware Disaster recovery procedures Detective Virus checking software Firewall software Fire alarms Audit trails
15
Access rights Set access rights on disks, folders and even individual files How are access rights used in school?
16
Firewall Acts as a filter or barrier between your own trusted network and another Only allows certain data packets across that meet set filtering rules
17
Physical security and biometrics
Locks on doors Security guards Biometric security: Fingerprint recognition Retina scanner Iris recognition Voice recognition
18
Setting secure passwords
Minimum of eight characters Mixture of numbers with lower and uppercase characters Include symbols Do not include your name, DOB or personal details Create a password based on a memorable phrase and exchange letters for numbers or symbols e.g. Brdu8#Jw Modern automated hacking tool can quickly guess passwords of up to 10 characters!
19
Security HTTP / HTTPS Why do online banking and shopping websites have a padlock symbol? What data is sensitive? How can you keep it secure?
20
Encryption terminology
Plaintext: the original message to be encrypted Ciphertext: the encrypted message Encryption: the process of converting plaintext into ciphertext Key: a sequence of numbers used to encrypt or decrypt data using a mathematical formula Encryption algorithm: the formula for encrypting the plaintext Two inputs: plaintext and a secret key
21
Encryption Encryption is the encoding of data so that it can no longer be easily understood A simple shift cipher might encode “Box345” as follows: “Box345” “Dqz567” Encryption algorithm
22
Caesar shift cipher The earliest known substitution cipher was invented by Julius Caesar Each letter is replaced by the letter n positions further on in the alphabet
23
Caesar Cipher: How it works
Key = Shift 2 Decode “ECDDCLG” A B C D E F G H I J K L M N O P Q
24
Encryption techniques
Private key (Symmetric encryption) A single key is used to encrypt and decrypt a message and must be given to the recipient of your message to decrypt the data Public key (Asymmetric encryption) Two keys are used - one to encrypt and the other to decrypt data This is more secure as it means that you never have to send or reveal your decryption key
25
Private key encryption
One key used to encrypt and decrypt a message Plaintext Key Key sent to recipient separately Ciphertext produced Message deciphered Message Ciphertext sent to recipient
26
Public key encryption Two keys! A public key for encrypting and a private key for decrypting Message encoded Recipient’s public key (made publicly available) Message deciphered Message Recipient’s own private key Plaintext Ciphertext sent to recipient
27
Acceptable use policies
Read the school’s Acceptable use policy What stands out? How does it protect you? Does it seem fair? Is it against the law to breach it?
28
Audit trails and logs Every time a user accesses the system, the time and date are logged along with their actions Can help detect security violations and resolve technical issues
29
Antivirus software Is updated with known code patterns found in viruses Checks programs and files for matching patterns Quarantines anything with matching sections for deletion
30
Disaster recovery Backups and archiving Failover systems
Hardware sourcing/plans
31
Backups and archiving A backup is a copy for using and editing again if your system fails An archive is a copy of a file that is kept for historic reference and is not meant to be edited again
32
Backups Where should they be stored?
What might happen to require a backup? Flood or fire damage Theft Corruption Loss Accidental damage or deletion
33
Failover systems Companies have replica redundant hardware systems on standby, in case their primary system fails In the event of failure, everything automatically switches over to the new system Data can also be edited and updated in two places at once in case one disk fails
34
Grade 4 Exercises Put the sub-heading ‘Cyber Security’ in your book and complete the Grade 4 exercises You can use the information in the following slides to help you answer the questions. What is ‘Cyber Security’? List and explain 3 causes of cyber security breaches Use the table below to create a shift cipher of your own. Write your favourite pastime in an encrypted message – I will decode them! Put the following security measures into categories of either Preventative, Corrective or Detective security: Explain 3 preventive measures of cyber security Explain 3 corrective measures of cyber security Explain 3 detective measures of cyber security
35
Grade 5-6 Exam Questions Pick them up from the front Complete them
Self Assess them Stick them in Bring them to me
36
Grade 7 Extension Write a Data Privacy policy for Facebook. This should explain: What data will be collected How it will be stored What it will be used for You should consider researching the Data Protection Act (1998) to support you in writing this. When you have written it compare it to Facebook’s own Data Privacy Policy and list the differences!
37
Exit Ticket Complete the Exit Ticket and Stick it in your books.
38
Homework: Pre-Reading
Make notes to explain what the following laws do: Data Protection Act (1998) Computer Misuse Act 1990 Freedom of Information Act 2000 Define the term Environmental Impact Explain the causes and solutions for the following environmental impacts: Carbon emissions Landfills Increases in Populations Repair or Recycle? Paper and Packaging Waste List and explain the positive impacts of technology on the environment
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.