Unit 10 Review
CSP Conceptual Framework
IOC-2 - The use of computing innovations may involve risks to your personal safety and identity.
IOC-2.A - Describe the risks to privacy from collecting and storing personal data on a computer system.
IOC-2.B - Explain how computing resources can be protected and can be misused.
IOC-2.C - Explain how unauthorized access to computing resources is gained.
CSTA K-12 Computer Science Standards (2017)
NI - Networks & the Internet
3A-NI-05 - Give examples to illustrate how sensitive data can be affected by malware and other attacks.
Students investigate three different common security risks (phishing, keylogging, malware) in a jigsaw activity. In groups, students create Public Service Announcement slides warning of the dangers of their assigned security risk. Then students are grouped with students who investigated other security risks and are instructed to share their slides and give a voice-over. The activity ends with the class coming together to discuss the security risks as a whole.
In this lesson, students are exposed to common security risks. The purpose of this lesson is to dive into the facts and learn how people are targeted. In a future lesson, students will explore how they can protect themselves from these security risks.