1.) I will not use web resources/platforms to bully/harass/harm others
2.) I will not use technology to deny access to or availability ..
The future of cyber attacks looks very much like the present – attackers will find and exploit any and all vulnerabilities in a system – e..
1.) Simply having autosave form details/passwords on your browser is one of the easiest but worst ways to have your data stolen – I was in..
Cyber Security is the hardware, software, and policies and procedures used to secure web usage. Awareness is understanding the types of ri..
- Find a resource (a website, video or storybook) for teaching a topic related to cyber ethics and share this with the community. Provid..
- Create or find a classroom resource that teaches students about creating strong passwords, passcodes or passphrases.
- Find and share a resource to support teaching students in secondary years about security in apps (e.g. whatsapp security). Include a b..
- Explain what you think are some of the key differences between cyber security, cyber awareness and cyber safety. To what extent are yo..
Here is the Cyber Safety Considerations for K-12 Schools and School Districts by REMS TA in US.
The REMS TA Center is operated by Syner..
As tiktok is so popular for young people, there is high risk that face recognition can take advantage from public images.
I concern tha..