Date post: | 20-Jan-2018 |
Category: |
Documents |
Upload: | mariah-watkins |
View: | 215 times |
Download: | 0 times |
© Boardworks Ltd 20101 of 10
ICT: Good or Bad?
© Boardworks Ltd 20102 of 10
Teacher’s notes included in the Notes Page
Flash activity. These activities are not editable. Web addresses
Icons key: For more detailed instructions, see the Getting Started presentation
Functional Skills check
Student task accompanies this slide Printable activity
This lesson will cover:
Some of the different types of cybercrimes.
Cyberbullying, cyberterrorism and the potential risks of data falling into the wrong hands.
The benefits and drawbacks of using e-mail and the Internet.
© Boardworks Ltd 20103 of 10
Advantages and disadvantages
© Boardworks Ltd 20104 of 10
The Internet and e-mail
© Boardworks Ltd 20105 of 10
Cybercrimes
How can ICT be used to prevent cybercrimes?
© Boardworks Ltd 20106 of 10
Cyberbullying
© Boardworks Ltd 20107 of 10
Cyberterrorism
Cyberterrorism refers to the threat of terrorist groups attacking the computer systems of a country and causing harm.
In May 2007, websites in Estonia were targeted by hackers due to controversy after a Soviet war memorial was removed. During the attacks, the networks of government ministries and banks were bombarded with so much traffic that they could not work. This was a ‘denial-of-service’ attack.
In May 2010, the United States appointed General Keith Alexander as the head of the newly formed United States Cyber Command.
Do you think ICT is more widely used to promote or prevent acts of terrorism?
© Boardworks Ltd 20108 of 10
Data in the wrong hands
© Boardworks Ltd 20109 of 10
Different opinions
© Boardworks Ltd 201010 of 10
Class vote