Non-GCSE
Lesson 5 Data protection
The theoretical right to privacy is one thing, but ensuring it in practice is another. In this lesson, learners will determine how their data might be stolen, and why. They will then learn how to protect their data from attack. Building on discussions from previous lessons, learners will first be asked to determine what data they have created or shared online might be valuable, and to whom. They will then be invited to share their own knowledge on how this data could be stolen. After this knowledge sharing, learners will be presented with a series of online attacks such as phishing scams, ransomware, and malware to help formalise their knowledge. Learners will then discuss how they can protect themselves from such attacks and create a script for an online public service announcement that warns users about the threats of malware.
Learning objectives
- Evaluate what data created online is valuable, and to whom
- Discuss ways in which data might be stolen
- Define terms ‘phishing’ and ‘malware’
- Identify ways to protect one’s data online
Package contents
- Lesson plans
- Learning graphs
- Unit overviews
- Activities
Not registered yet?
Create an account and get access to over 500 hours of free teaching resources.