* Explain what you think are some of the key differences between cyber security, cyber awareness and cyber safety:
Network security consists of the policies and practices adopted to prevent and monitor unauthorised access of a computer network, routers and other network-related resources. Network security includes protection of data and application in the network from cyber attacks (e.g. anti-malware), virtual private networks, firewall protection and network access control policies.
A building might have a digital password system or a security guard as a first point of defence and our computers are protected from intruders with ‘firewalls’.
Firewalls act to protect computer networks in the same way as a wall stops the spread of a fire. A firewall can be a software or hardware. It monitors the network traffic and maintains a set of rules to decide whether the data packets (e.g. files, email) can pass through the firewall into the network (e.g. LAN) computer system from another network (e.g. Internet) or whether they should be blocked or discarded.
In cyber security and awareness we need to be mindful of how we collect, store and share data as we can open ourselves and others to online scams, cyber attacks or dangerous situations as others can piece together or collect this information about us.
A computer network is a web of interconnected devices including computers, printers, mobiles, tablets and modems that use communication protocols over digital networks to communicate with each other.
There are different types of computer networks we encounter in the digital world and some are found in our school environment or home.
Virtual Private Networks (VPN) are another popular secure way to access the internet, adding an additional layer of privacy to protect your identity. VPN creates a virtual encrypted tunnel that extends from your device to the internet. The VPN accesses the internet on your behalf and masks your location.
Much of our data today is stored and sent in the Cloud. The ‘Cloud’ are software and services that run on the Internet, instead of locally on our computer. Companies such as Google, Facebook, Instagram and Microsoft use layers of digital infrastructure and digital security measures to protect our data being sent via the Cloud.
* To what extent are you teaching these in the classroom or do you think they should be taught?
In the Years 10-12 High School:
The curriculum understanding with students, becoming familiar using network terminology (WiFi, Bluetooth, etc) and developing understandings of how hardware and peripheral devices are connected to form a network. Students analyse and evaluate risks associated with devices using wireless and Bluetooth networks.
Digital Technologies, students investigate and analyse both data and networks. They investigate how data is transmitted and secured in various types of networks, and the role of hardware and software in managing, controlling and securing the movement of and access to data in networked digital systems.
Students analyse the properties of networked systems and their suitability and use for the transmission of data types. They acquire, analyse, validate and evaluate various types of data, and appreciate the complexities of storing and transmitting that data in digital systems.
Investigate how data is transmitted and secured in wired, wireless and mobile networks, and how the specifications affect performance.
You must log in to post a comment.