You are on page 1of 15

Lesson 1: You and your

data
Year 9 – Cybersecurity

Mr. Peter Cox


Objectives

Lesson 1: You and your data


In this lesson, you will
● Explain the difference between data and information
● Critique online services in relation to data privacy
● Identify what happens to data entered online
● Explain the need for the Data Protection Act

2
Starter activity

Motives behind attacks

What might some of these attacks be


trying to steal or get access to?

DATA

https://threatmap.checkpoint.com
3
Starter activity

Cybersecurity
In this unit you will gain an awareness
of:

● The importance and value of data


● How human actions can make data
more vulnerable to theft or
exploitation
● Common cyberattacks
● Measures put in place on networks to
help protect IT systems from attacks

4
Activity 1

Data and information

Data is raw facts and figures: Information is created when that data
has been processed and becomes
meaningful:
John: 28 These are scores from a test where the
pass mark was 35.
Claire: 49
John needs to resit the test.
Jade: 40
The average score is 40.
Ahmed: 45

Chloe: 38
5
Activity 1

Why is customer data valuable to businesses?

This data is the contents of a


Tent shopping basket for an online
customer.

This data can be used to help build a


Dog toys profile of this customer and
therefore convert the data into
information.

What assumptions can you


Fitness reasonably make about this
tracker
customer?
6
Activity 2

Data social media companies might collect

Complete the mind map by adding


example data next to each category.

Example

Personal information about you:

● Name
● Date of birth
● Etc.

7
Activity 2

Data social media companies might collect

Personal info: Name, date of birth


How do you think social media
Content: Images, status updates, emojis
companies make money if they are free
created
to use?
User behaviour: What pages you visited,
What do they do with your data?
groups you are a member of, what you
have ‘liked’

Data you have on others: Names of your


friends and their numbers

8
Activity 3

Privacy policies: Be informed

Work in pairs and decide which two of the Snapchat ncce.io/snapchatprivacy


companies on the right-hand side you
wish to research. In your pairs, allocate Instagram ncce.io/instagramprivacy
one each. Google ncce.io/googleprivacy
Spend five minutes researching the Facebook ncce.io/facebookprivacy
question, ‘What data do these
companies collect about their users?’

Add your new findings to your mind map


and spend two minutes discussing them
with your partner.
9
Activity 3

The consequences of data theft


Watch this video

If cybercriminals successfully
stole data from these
companies, who would suffer
and in what way?

10
Activity 5

Data Protection Act 2018

All organisations and people using and


storing personal data must abide by the
following principles.

Data must be:

11
Activity 5

Data Protection Act 2018: Your rights

As a data subject, you have the right to


find out what information the government
and other organisations store about you.

You have the right to:

12
Activity 5

Data Protection Act 2018: Your rights

You also have rights when an organisation


is using your personal data for:

● Automated decision-making processes


without human involvement (for example,
when a computer decides if you should be
approved for a loan)
● Profiling, for example to predict your
behaviour or interests

13
Plenary

Exit ticket

Complete the exit ticket worksheet. 1. Name three items of data that a company
might hold on you that would help form
your profile.

2. Give one potential consequence to you if


cybercriminals had access to that data.

3. Give one potential consequence to the


company storing the data if a
cybercriminal gained access to the data
they were storing.

14
Summary

Next lesson

In this lesson, you... Next lesson, you will…

Looked at the difference between data and Look at the risk of data being
information compromised through human error, and
strategies that can be put in place to avoid
Investigated what data companies might the dangers
collect on you, as well as how that data
might be valuable to cybercriminals

Looked at the need for the law involving


data protection

15

You might also like