#QTSRound3
TagUnit 3
I choose: Find and share a resource to support teaching students in secondary years about security in apps
Information System Secu..
Unit 3
I choose: Find and share a resource to support teaching students in secondary years about security in apps
Information System Secu..
QTS_Unit 4 _Question 3
Three types of cyber – attacks should be aware of include: malware, ransomware and distributed denial of service (DDoS) attacks.
Malwar..
Unit 3 – Question 1
A few examples of how information can be extracted from data, such as our website history, emails, information we submit online. Specifica..
Unit 5 – Question 1
Top 5 code of ethics statements for using technology in my workplace.
Ethical use of technology entails a behavior which consists ..
Unit 4 – Question 2
Generating strong passwords, pass codes or passphrases is one of the most essential and secure ways to protect our cyber safety. To be mor..
Unit 3 – Question 3
Persistent cookies are placed and stay in our computer. They use primarily by marking ..
Unit 2 – Question 1
Although the lesson has clearly described massive differences between cyber security, cyber awareness and cyber safety, there are 2 key di..
UNIT 5_QUESTION 2
Find a resource (a website, video or storybook) for teaching a topic related to cyber ethics and share this with the community. Provide a ..
QTS_UNIT 4_QUESTION 2
https://howsecureismypassword.net/
https://www.howtogeek.com/
According to the traditional advice—which is still good—a strong passw..
You must be logged in to post a comment.