A ‘primary friendly’ phishing scenario is creating an ad or email that would say “x amount of in-game currency for x game (fortnite or som..
Another way people can extract data that can reveal information about you is writing a bio for your social media accounts. Adding your age..
Cyber security is the software and sometimes hardware protection used to secure your devices.
Cyber awareness is the user being aware o..
Several years ago the Australian Association of Maths Teachers, AAMT, had a focus on codes and cyphers. AAMT published two documents for ..
Hi my name is Georgia and I’m in my third year of a primary school teaching degree at Flinders Uni South Australia.
My top 5 code of ethics statements for using technology are:
- Use strong passwords for all devices (but don’t use the s..
Example scam scenario:
HURRY!!!!! YOU HAVE 24 HOURS LEFT TO CLAIM YOUR FREE IPHONE!!!!
ALL YOU HAVE TO DO IS FOLLOW ..
1. Do not use computers or the internet to harm other people
2. Think before you post! What you upload can stay on the internet forever ..
This website provides information and a video teaching students ..
There are numerous ways that humans can leave traces of information online. These include but are not limited to:
– online websites often..