Information privacy and security-secondary
Get sleuthing and learn about cyber security.
More resources:
- Access Cyberhunt - a collection of short 5-15 min conversation starters, warm-up activities, or challenges
- Get a collection of cyber security posters
Students can boost their cyber security skills, learn how to protect from hackers and take a step toward a career in cybersecurity.
Year groups: 7 – 8
Access Information Privacy and Security v2.0
Date: On-demand
Syllabus outcomes
Information and Software Technology 7 – 10: 5.3.1, 5.2.2, 5.2.3, LS3.1, LS4.1
ACTDIP032
Applying social and ethical protocols and practices when using ICT
Students apply appropriate practices to recognise the intellectual property for digital information of themselves and others. They use appropriate practices for the physical and logical storage and security of digital information and apply appropriate protocols when using ICT to safely create, communicate or share information. Students gain an understanding of the benefits and consequences of the use of ICT by individuals, groups and communities and the impact of the use of ICT on the fabric of society. In developing and acting with ICT capability, students:
recognise intellectual property
apply digital information security practices
apply personal security protocols
identify the impacts of ICT in society