{"id":28072,"date":"2024-10-07T04:41:38","date_gmt":"2024-10-07T04:41:38","guid":{"rendered":"https:\/\/www.orbeducation.com\/au\/?post_type=product&#038;p=28072"},"modified":"2025-03-10T14:33:41","modified_gmt":"2025-03-10T14:33:41","slug":"cyber-safety-and-security-2024-yrs-7-8","status":"publish","type":"product","link":"https:\/\/www.orbeducation.com\/au\/product\/cyber-safety-and-security-2024-yrs-7-8\/","title":{"rendered":"Cyber Safety and Security  2024 (Yrs 7-8)"},"content":{"rendered":"<h3><strong>Curriculum Information<\/strong><\/h3>\n<p><strong>0. Cover, Checklist<\/strong><\/p>\n<p><strong>1. Vocab<\/strong><\/p>\n<p><strong>2. Cautious Connections<\/strong><br \/>\nNSW Comp Tech (2024)-Net:  \u00a4   Specify the non-functional requirements of a networked solution:  Social benefit or facilitating social interactions. <\/p>\n<p><strong>3. Cyberbullying<\/strong><br \/>\n&#8220;NSW DT(Tech Mand):  LS &#8211; \u00b7  explore social and ethical issues associated with digital solutions, for example:<br \/>\n\u2013  cyber safety<br \/>\n\u2013  appropriate digital communicationNSW Comp Tech (2024)-Net:  \u00a4   Explore how people\u2019s changing expectations and concerns for security and privacy have shaped computer technology:  Identity verification of social media profiles, such as considering cyber safety before connecting with someone on social media. &#8221;<\/p>\n<p><strong>4. Passwords<\/strong><br \/>\nAC V9.0 (Recap 5-6):  &#8211;       using multiple accounts, each with different passphrases, to access each website or app used for school and home, for example having a different username and password combination for school, gaming and music accounts<br \/>\nAC V9.0 (Recap 5-6):  &#8211;       explaining why re-using a password is risky when one of them is found out, for example how a compromised password from one social media account might be able to be used to access their bank or school account if the password is the same and other details are also compromised<br \/>\nAC V9.0 (7-8): \u00b7        explain how multi-factor authentication protects an account when the password is compromised &#8230; (AC9TDI8P13)<br \/>\nAC V9.0 (7-8):  &#8211;       explaining how multi-factor authentication prevents unauthorised access by prompting the account owner for a token or single-use password, for example demonstrating how a funds transfer from their bank account requires not only logging in, but provision of a one-time password received via\u202fSMS<br \/>\nAC V9.0 (7-8): Investigate personal security controls, including multi-factor authentication, to protect their data if passwords are compromised\u2026<\/p>\n<p><strong>5. Your Personal Data<\/strong><\/p>\n<p><strong>6. Big Data<\/strong><br \/>\nAC V9.0 (7-8):<br \/>\n<strong>7. Digital Footprint<\/strong><br \/>\nAC V9.0 (Recap 5-6):  &#8211;       describing scenarios where data, images or both that have been posted online can lead to information being resurfaced at a later date, for example how a comment made on a social media post or video associates a person with both their comment and the content<br \/>\nAC V9.0 (Recap 5-6):   Identify their digital footprint and recognise its permanence.<br \/>\nAC V9.0 (7-8): Manage their digital footprint.<br \/>\nAC V9.0 (7-8): \u00b7        investigate and manage the digital footprint existing systems and student solutions collect and assess if the data is essential to their purpose (AC9TDI8P14)<br \/>\nAC V9.0 (7-8):  &#8211;       reviewing and managing their digital footprint across online digital tools that they use, for example selecting their default privacy and sharing settings on social media accounts<\/p>\n<p><strong>8. Data Privacy<\/strong><br \/>\nAC V9.0 (7-8):  &#8211;       assessing the appropriateness and relevance of data collected by surveys from other students and organisations they complete online, for example identifying that providing your address data is not necessary for a survey asking about your food preferences but providing the address for the Census would be appropriate<br \/>\nAC V9.0 (7-8):  &#8211;       investigating the ethical obligations of individuals and organisations regarding ownership and privacy of data and information by researching an online platform\u2019s privacy policy for data collection, use and storage information and discussing impacts on digital footprint<\/p>\n<p><strong>9. Data Security<\/strong><br \/>\nAC V9.0 (7-8): Investigate personal security controls&#8230; and they understand the impact of phishing and other cyber security threats on people and data.<\/p>\n<p><strong>10. Securing Your Data<\/strong><br \/>\nNSW Comp Tech (2024)-Net:  \u00a4   Evaluate the social impacts and ethical and legal responsibilities in connecting people and systems: &#8230; protecting personally identifying information (PII).<br \/>\nNSW Comp Tech (2024)-Net:  \u00a4   selects and applies safe, secure and responsible practices in the ethical use of data and computing technology NSW Comp Tech (2024)5-SAF-01:  <\/p>\n<p><strong>11. Collaboration<\/strong><br \/>\nAC V9.0 (Recap 5-6):  &#8211;       defining and acting collectively using online community standards and valuing the work of others, for example moderating language and behaviour in an online class forum, not deleting the work of collaborators, and respecting others\u2019 intellectual propertyNSW DT(Tech Mand):  LS &#8211;  &#8211;  collaboration<br \/>\nAC V9.0 (Recap 5-6):   Select and use appropriate digital tools effectively to plan, create, locate and share content, and to collaborate, applying agreed conventions and behaviours.<br \/>\nAC V9.0 (7-8):  &#8211;       collaborating effectively online using cloud storage, for example setting up and managing a shared space in an online repository\u2026<br \/>\nAC V9.0 (7-8): Select and use a range of digital tools efficiently and responsibly to create, locate and share content; and to plan, collaborate on and manage projects.<br \/>\nAC V9.0 (7-8):  &#8211;       determining and recording the tasks, responsibilities and timeframes for a collaborative project, for example using a spreadsheet to record tasks and their sequence, critical dates and who is responsible for each task so a project can be finished on time<\/p>\n<p><strong>12. Encryption<\/strong><br \/>\nAC V9.0 (7-8):  &#8211;       exploring simple encryption and decryption algorithms, for example ROT13 and XOR<\/p>\n<p><strong>13. Encryption Spreadsheets<\/strong><\/p>\n<p><strong>14. Copyright<\/strong><br \/>\nNSW DT(Tech Mand):  \u2013  copyright and intellectual property<\/p>\n<p><strong>15. Accessibility<\/strong><br \/>\nNSW DT(Tech Mand):  \u2013  accessibility<\/p>\n<h3><strong>By Curriculum<\/strong><\/h3>\n<p><strong>Australian Curriculum V9.0 (2024)<\/strong><br \/>\nAC V9.0 (Recap 5-6): \u00b7        access multiple personal accounts using unique passphrases and explain the risks of password re-use (AC9TDI6P09)<br \/>\nAC V9.0 (Recap 5-6): &#8211;       using multiple accounts, each with different passphrases, to access each website or app used for school and home, for example having a different username and password combination for school, gaming and music accounts<br \/>\nAC V9.0 (Recap 5-6): &#8211;       explaining why re-using a password is risky when one of them is found out, for example how a compromised password from one social media account might be able to be used to access their bank or school account if the password is the same and other details are also compromised<br \/>\nAC V9.0 (7-8): \u00b7        explain how multi-factor authentication protects an account when the password is compromised &#8230; (AC9TDI8P13)<br \/>\nAC V9.0 (7-8): &#8211;       explaining how multi-factor authentication prevents unauthorised access by prompting the account owner for a token or single-use password, for example demonstrating how a funds transfer from their bank account requires not only logging in, but provision of a one-time password received via\u202fSMS<br \/>\nAC V9.0 (7-8): Investigate personal security controls, including multi-factor authentication, to protect their data if passwords are compromised\u2026<br \/>\nAC V9.0 (7-8): &#8211;       investigating how recommendation algorithms used in media services rely on data that tracks user habits, for example how music streaming services generate playlists that contain songs from genres and artists that are similar to those you listen to regularly<br \/>\nAC V9.0 (7-8):<br \/>\nAC V9.0 (Recap 5-6): \u00b7        explain the creation and permanence of their digital footprint and consider privacy when collecting user data (AC9TDI6P10)<br \/>\nAC V9.0 (Recap 5-6): &#8211;       describing scenarios where data, images or both that have been posted online can lead to information being resurfaced at a later date, for example how a comment made on a social media post or video associates a person with both their comment and the content<br \/>\nAC V9.0 (Recap 5-6): Identify their digital footprint and recognise its permanence.<br \/>\nAC V9.0 (7-8): Manage their digital footprint.<br \/>\nAC V9.0 (7-8): \u00b7        investigate and manage the digital footprint existing systems and student solutions collect and assess if the data is essential to their purpose (AC9TDI8P14)<br \/>\nAC V9.0 (7-8): &#8211;       reviewing and managing their digital footprint across online digital tools that they use, for example selecting their default privacy and sharing settings on social media accounts<br \/>\nAC V9.0 (Recap 5-6): &#8211;       explaining why collecting the smallest amount of data needed for a purpose is important to protect someone&#8217;s privacy, for example how choosing not to collect information about someone&#8217;s birthdate when it is not necessary ensures that private data cannot be stolen in a cyber attack<br \/>\nAC V9.0 (7-8): &#8211;       assessing the appropriateness and relevance of data collected by surveys from other students and organisations they complete online, for example identifying that providing your address data is not necessary for a survey asking about your food preferences but providing the address for the Census would be appropriate<br \/>\nAC V9.0 (7-8): &#8211;       investigating the ethical obligations of individuals and organisations regarding ownership and privacy of data and information by researching an online platform\u2019s privacy policy for data collection, use and storage information and discussing impacts on digital footprint<br \/>\nAC V9.0 (7-8): \u00b7        &#8230; identify phishing and other cyber security threats (AC9TDI8P13)<br \/>\nAC V9.0 (7-8): Investigate personal security controls&#8230; and they understand the impact of phishing and other cyber security threats on people and data.<br \/>\nAC V9.0 (7-8): &#8211;       identifying the common techniques used in phishing scams to identify and exploit susceptible users, for example using an email address from an unofficial domain when pretending to be an online retailer, or including grammatical errors to help filter out users who are more likely to detect the\u202fscam<br \/>\nAC V9.0 (Recap 5-6): Explore different ways of working collaboratively, such as agreeing on how tasks should be allocated and content shared.<br \/>\nAC V9.0 (Recap 5-6): &#8211;       defining and acting collectively using online community standards and valuing the work of others, for example moderating language and behaviour in an online class forum, not deleting the work of collaborators, and respecting others\u2019 intellectual property<br \/>\nAC V9.0 (Recap 5-6): Select and use appropriate digital tools effectively to plan, create, locate and share content, and to collaborate, applying agreed conventions and behaviours.<br \/>\nAC V9.0 (7-8): &#8211;       collaborating effectively online using cloud storage, for example setting up and managing a shared space in an online repository\u2026<br \/>\nAC V9.0 (7-8): Select and use a range of digital tools efficiently and responsibly to create, locate and share content; and to plan, collaborate on and manage projects.<br \/>\nAC V9.0 (7-8): &#8211;       determining and recording the tasks, responsibilities and timeframes for a collaborative project, for example using a spreadsheet to record tasks and their sequence, critical dates and who is responsible for each task so a project can be finished on time<br \/>\nAC V9.0 (7-8): &#8211;       explaining why cryptography is necessary for securing data, for example transmitting credit card details over the internet<br \/>\nAC V9.0 (7-8): &#8211;       exploring simple encryption and decryption algorithms, for example ROT13 and XOR<\/p>\n<p><strong>NSW Digital Technologies (Tech Mandatory)<\/strong><br \/>\nNSW DT(Tech Mand): LS &#8211; &#8211; applying safe practices when communicating online<br \/>\nNSW DT(Tech Mand): \u00b7 identify social, ethical and cyber security considerations of digital solutions, for example:<br \/>\nNSW DT(Tech Mand): LS &#8211; &#8211; appropriate digital communication<br \/>\nNSW DT(Tech Mand): \u2013 privacy issues and digital footprints<br \/>\nNSW DT(Tech Mand): LS &#8211; &#8211; managing privacy settings when using social media<br \/>\nNSW DT(Tech Mand): LS &#8211; \u00b7  explore social and ethical issues associated with digital solutions, for example:<br \/>\nNSW DT(Tech Mand): LS &#8211; \u00b7  evaluate their design and production skills, for example: DT<br \/>\nNSW DT(Tech Mand): LS &#8211; &#8211; collaboration<br \/>\nNSW DT(Tech Mand): LS &#8211; &#8211; copyright when using online images and media<br \/>\nNSW DT(Tech Mand): \u2013 copyright and intellectual property<br \/>\nNSW DT(Tech Mand): LS &#8211; &#8211; accessibility of online content<br \/>\nNSW DT(Tech Mand): \u2013 accessibility<\/p>\n<p><strong>NSW Computing Technology (2024)<\/strong><br \/>\nNSW Comp Tech (2024)-Net: \u00a4   Describe the purpose of connecting people and systems:<br \/>\nNSW Comp Tech (2024)-Net: \u00a4   Specify the non-functional requirements of a networked solution: Social benefit or facilitating social interactions.<br \/>\nNSW Comp Tech (2024)-Net: \u00a4   Evaluate the social impacts and ethical and legal responsibilities in connecting people and systems: Social: online access to services, remote working, cyber bullying, or the filter bubble.<br \/>\nNSW Comp Tech (2024)-Net: \u00a4   Explore how people\u2019s changing expectations and concerns for security and privacy have shaped computer technology: Identity verification of social media profiles, such as considering cyber safety before connecting with someone on social media.<br \/>\nNSW Comp Tech (2024)-Data: \u00a4   Explore design principles and issues relevant to analysing data, including visualisation principles, data trails and ownership of data: Accessing and restricting your historical data or tracking users to customise advertising with browser cookies.<br \/>\nNSW Comp Tech (2024)-Net: \u00a4   Specify what data is collected, who owns it, and how it will be protected, considering privacy and cybersecurity, including when interpreting data:<br \/>\nNSW Comp Tech (2024)-Net: \u00a4   Evaluate the social impacts and ethical and legal responsibilities in connecting people and systems: Legal: reporting data breaches to users and regulators, anonymising data and disposal of PII.<br \/>\nNSW Comp Tech (2024)-Net: \u00a4   Evaluate solutions against the predetermined functional and non-functional requirements that meet social, ethical and legal responsibilities and cybersecurity principles:<br \/>\nNSW Comp Tech (2024)-Net: \u00a4   Explore how people\u2019s changing expectations and concerns for security and privacy have shaped computer technology: Using appropriate firewall settings, such as implementing cyber security to browser software.<br \/>\nNSW Comp Tech (2024)-Net: \u00a4   Evaluate the social impacts and ethical and legal responsibilities in connecting people and systems: Ethical: black-hat and white-hat hacking, Digital Literacy codes of conduct, or protecting personally identifying information (PII).<br \/>\nNSW Comp Tech (2024)-Net: \u00a4   selects and applies safe, secure and responsible practices in the ethical use of data and computing technology NSW Comp Tech (2024)5-SAF-01:<br \/>\nNSW Comp Tech (2024)-UE: \u00a4   manages, documents and explains individual and collaborative work practices NSW Comp Tech (2024)5-COL-01:<br \/>\nNSW Comp Tech (2024)-Data: \u00a4   Investigate issues with the use of data, including cyber safety, security, privacy and ethics: Breach of copyright.<br \/>\nNSW Comp Tech (2024)-Net: \u00a4   Investigate how the profile and attributes of end users are used by developers when creating products: Accessibility needs, such as vision and hearing.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learning how to be safe online is essential for all students as they increase their exposure to the internet and the array of potential problems that come with it. These issues have been recognised by those developing our curricula and given an increased presence from 2024.<\/p>\n<p>ORB Education&#8217;s new <em>Cyber Safety and Security<\/em> pack includes 15 separate resources, each full of student-centred activities. The ideas covered include:<\/p>\n<ul>\n<li>The impacts and prevention of cyberbullying.<\/li>\n<li>Our digital footprints and how to reduce and remove them.<\/li>\n<li>The strength of passphrases and why we use multi-factor authentication.<\/li>\n<li>How much information (including PII) is collected from us when using the internet and how the protection of this is governed by privacy policies.<\/li>\n<li>How the information collected from us is used by recommendation algorithms and can lead to a filter bubble.<\/li>\n<li>Cybercrime and how personal information can be exposed in data breaches.<\/li>\n<li>Phishing, malware and how to protect our systems with firewalls and antivirus applications.<\/li>\n<li>How to anonymise and secure the data we collect from others when working on research projects at school.<\/li>\n<li>Safe and respectful collaboration and how to set up a shared document online.<\/li>\n<li>How encryption protects our information in transit and an investigation of the ROT13 and XOR ciphers (both manually and using a spreadsheet).<\/li>\n<li>Copyright and how we can incorporate online content both legally and ethically into our schoolwork.<\/li>\n<li>How to make our work accessible to all.<\/li>\n<\/ul>\n<p>These resources are nearly all standalone, meaning that you can slip them in at the start of a relevant topic and be comfortable that you have addressed the curriculum requirements around working safely and securely online.  The editable version allows you to tailor the activities to your exact needs digitally.<\/p>\n<p>The targeted curriculum outcomes were gathered from the new Australian Curriculum V9.0 as well as the NSW Digital Technologies (mandatory) curriculum and the new Computing Technology course (2024). The relevant curriculum statements are listed below.<\/p>\n<p>Files: Cover \/ Checklist \/ Wordlist \/ Cautious Connections \/ Cyberbullying \/ Passwords \/ Your Personal Data \/ Big Data \/ Digital Footprint \/ Data Privacy \/ Data Security \/ Securing Your Data \/ Collaboration \/ Encryption \/ Encryption Spreadsheets \/ Copyright \/ Accessibility<\/p>\n<p><em>80 pages of tasks and answers, plus spreadsheet solutions for the encryption activities.<br \/>\n<\/em><\/p>\n<p><a href='http:\/\/www.orbeducation.com\/Previews\/Co\/CoP059_Cyber_Safety_and_Security.pdf' target='_blank' rel='noopener noreferrer'>Sample Pages<\/a><\/p>\n","protected":false},"featured_media":27945,"comment_status":"open","ping_status":"closed","template":"","meta":{"site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"set","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}}},"product_brand":[],"product_cat":[19],"product_tag":[],"class_list":{"0":"post-28072","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-years-7-8-digital-technologies","7":"desktop-align-left","8":"tablet-align-left","9":"mobile-align-left","11":"first","12":"instock","13":"taxable","14":"shipping-taxable","15":"purchasable","16":"product-type-variable","17":"has-default-attributes"},"_links":{"self":[{"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/product\/28072","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/comments?post=28072"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/media\/27945"}],"wp:attachment":[{"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/media?parent=28072"}],"wp:term":[{"taxonomy":"product_brand","embeddable":true,"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/product_brand?post=28072"},{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/product_cat?post=28072"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/www.orbeducation.com\/au\/wp-json\/wp\/v2\/product_tag?post=28072"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}