{"id":423,"date":"2023-12-08T15:19:26","date_gmt":"2023-12-08T15:19:26","guid":{"rendered":"https:\/\/mrcottle.co.uk\/WP\/?page_id=423"},"modified":"2024-01-29T11:57:38","modified_gmt":"2024-01-29T11:57:38","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/mrcottle.co.uk\/WP\/cybersecurity\/","title":{"rendered":"Cybersecurity"},"content":{"rendered":"\n\n\n\r\n<p><span style=\"color: #202124; font-family: 'Google Sans', arial, sans-serif; font-size: 20px; font-weight: 400; letter-spacing: normal; text-transform: none; background-color: #ffffff; text-decoration-style: initial;\">Computer Crime and Cybersecurity<\/span><\/p>\r\n\n<p><span style=\"color: rgb(55, 65, 81); font-family: S\u00f6hne, ui-sans-serif, system-ui, -apple-system, &quot;Segoe UI&quot;, Roboto, Ubuntu, Cantarell, &quot;Noto Sans&quot;, sans-serif, &quot;Helvetica Neue&quot;, Arial, &quot;Apple Color Emoji&quot;, &quot;Segoe UI Emoji&quot;, &quot;Segoe UI Symbol&quot;, &quot;Noto Color Emoji&quot;; white-space-collapse: preserve;\">In KS3 computer science, understanding cybersecurity becomes pivotal in navigating the digital landscape. It serves as the foundational shield against modern threats. This learning journey equips students with vital insights into protecting data, recognizing vulnerabilities, and comprehending the ethical responsibilities in a connected world. Covering topics from password security to online safety, it fosters a proactive approach, instilling critical thinking to identify and mitigate cyber risks. By exploring encryption, malware, and safe online behavior, students grasp the significance of cybersecurity, preparing them to navigate a technologically driven society responsibly while cultivating an awareness that safeguards both personal and collective digital spaces.<\/span><br><\/p>\n\n\n\n\n\n\n\n<p style=\"text-align: left;\"><span style=\"color: #212121; font-variant-numeric: normal; font-variant-east-asian: normal; text-align: start; white-space: pre-wrap; font-family: Arial; font-size: 13pt; vertical-align: baseline;\">The <\/span><span style=\"color: #212121; font-variant-numeric: normal; font-variant-east-asian: normal; text-align: start; white-space: pre-wrap; font-family: Arial; font-size: 13pt; vertical-align: baseline;\"><strong style=\"font-weight: bold; -webkit-font-smoothing: antialiased;\">intention<\/strong><\/span><span style=\"color: #212121; font-variant-numeric: normal; font-variant-east-asian: normal; text-align: start; white-space: pre-wrap; font-family: Arial; font-size: 13pt; vertical-align: baseline;\"> of this unit is to provide a more detailed knowledge and understanding of cybersecurity and how to stay safe online. <\/span><\/p>\n\n\n<p style=\"text-align: left;\"><span style=\"color: #212121; font-variant-numeric: normal; font-variant-east-asian: normal; text-align: start; white-space: pre-wrap; font-family: Arial; font-size: 13pt; vertical-align: baseline;\">Students complete a student portfolio showing their research, knowledge and understanding of cybersecurity. <\/span><\/p>\n\n\n\r\n<p style=\"text-align: left;\"><span style=\"color: #212121; font-variant-numeric: normal; font-variant-east-asian: normal; text-align: start; white-space: pre-wrap; font-family: Arial; font-size: 13pt; vertical-align: baseline;\">The <\/span><span style=\"color: #212121; font-variant-numeric: normal; font-variant-east-asian: normal; text-align: start; white-space: pre-wrap; font-family: Arial; font-size: 13pt; vertical-align: baseline;\"><strong style=\"font-weight: bold; -webkit-font-smoothing: antialiased;\">impact<\/strong><\/span><span style=\"color: #212121; font-variant-numeric: normal; font-variant-east-asian: normal; text-align: start; white-space: pre-wrap; font-family: Arial; font-size: 13pt; vertical-align: baseline;\"> of this unit will be measured by the students final portfolio. <\/span><\/p>\r\n\n\n\n\n\n\n\n<h5><strong>Help Sheet<\/strong><\/h5>\n\n\n\n\n\n\n\n<p>Support Links &#8211;&nbsp;<\/p>\n\r\n<p>&nbsp;<\/p>\r\n\n\n\n\n<p>Computers are great, but what you need to stay on the right side of the law.&nbsp;<\/p>\n\n\n\r\n<p>Click here for a link to a HTML colour chart to help you with choosing colours for your code.\u00a0<\/p>\r\n\n\n\n\r\n<p>When you have finished your main emoji you can add some HTML symbols on using the add text code.\u00a0<\/p>\r\n\n\n\n\r\n<p>If you are stuck, you can click here and see an example of a coded frog.\u00a0<\/p>\r\n\n\n\n\n\n\n\n\n\r\n<p>Key Terms<\/p>\r\n\n\n\n<p><span style=\"font-weight:normal;\" id=\"docs-internal-guid-904153e9-7fff-1cb9-8047-a9700f8720c7\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">phishing<\/span><\/span><br><\/p>\n\n\n<p><span id=\"docs-internal-guid-798ed122-7fff-f56a-6d21-bcec2509747a\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">An attempt to gain personal information about someone by way of deception.<\/span><\/span><br><\/p>\n\n\n\n\n<p><span style=\"font-weight:normal;\" id=\"docs-internal-guid-075c0cdb-7fff-3369-2203-ebef2ada451c\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">hacking<\/span><\/span><br><\/p>\n\n\n<p><span id=\"docs-internal-guid-6dc6a3d8-7fff-0668-5a3f-2639c5521076\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">Illegally accessing or modifying computer files without permission<\/span><\/span><br><\/p>\n\n\n\n\n<p><span style=\"font-weight:normal;\" id=\"docs-internal-guid-9f11cd7a-7fff-3f31-ebf4-bb8eaa30a667\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">malware<\/span><\/span><br><\/p>\n\n\n<p><span id=\"docs-internal-guid-e681734d-7fff-1a91-ba0a-92df32a24e9b\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">Software that is designed to cause harm or damage to a computer. E.g. viruses that might damage files, adware that causes pop-ups, and spyware that collects and shares login details.<\/span><\/span><br><\/p>\n\n\n\n\n<p><span style=\"font-weight:normal;\" id=\"docs-internal-guid-2508ae73-7fff-4bfa-cffd-ab743931d3e3\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">cybercrime<\/span><\/span><br><\/p>\n\n\n<p><span id=\"docs-internal-guid-830b40bf-7fff-2a01-2747-20b9418db499\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">Criminal activities carried out by means of computers or the internet.<\/span><\/span><br><\/p>\n\n\n\n\n<p><span style=\"font-weight:normal;\" id=\"docs-internal-guid-fbe639e4-7fff-570a-cfc0-6cf90f68223e\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">RSI<\/span><\/span><br><\/p>\n\n\n<p><span id=\"docs-internal-guid-eb4066db-7fff-36f0-4a81-a215407fff5d\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">Repetitive Strain Injury &#8211; pain caused by repeated movement of part of the body e.g. typing on a computer keyboard.<\/span><\/span><br><\/p>\n\n\n\n\n<p><span style=\"font-weight:normal;\" id=\"docs-internal-guid-6a49ab09-7fff-cd70-b58f-da857e3b9f35\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">copyright<\/span><\/span><br><\/p>\n\n\n<p><span id=\"docs-internal-guid-9f51b2da-7fff-4719-3548-b5a1d6177c61\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">A set of rights that prevents people copying and distributing a piece of work without the copyright holder&#8217;s permission.<\/span><\/span><br><\/p>\n\n\n\n\n<p><span style=\"font-weight:normal;\" id=\"docs-internal-guid-e4b59085-7fff-db9a-93a0-da28e72f2ddf\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">e-waste<\/span><\/span><br><\/p>\n\n\n<p><span id=\"docs-internal-guid-87452123-7fff-5b48-cdac-a6a60cee532f\"><span style=\"font-size: 14pt; font-family: Calibri, sans-serif; color: rgb(255, 255, 255); background-color: transparent; text-decoration-style: initial; vertical-align: baseline; white-space-collapse: preserve;\">Discarded electronic appliances such as mobile phones, computers, and televisions.<\/span><\/span><br><\/p>\n\n\n\n\n\n\n\r\n<p>Future Career Opportunities<\/p>\r\n\n\n\n<p style=\"text-align: left;\"><span style=\"color: #ffffff;\">Skills<\/span><\/p>\n<ul>\n<li style=\"text-align: left;\"><span style=\"color: #ffffff; font-size: large;\">Developing bespoke security solutions<\/span><\/li>\n<li style=\"text-align: left;\"><span style=\"color: rgb(255, 255, 255); font-size: large;\">Implementing security solutions and protocols<\/span><\/li><li style=\"text-align: left;\"><span style=\"color: rgb(255, 255, 255); font-size: large;\">Working to a deadline<\/span><br><\/li>\n<\/ul>\n<p style=\"text-align: left;\"><span style=\"color: #ffffff;\">Average UK Salary \u00a340,000 &#8211; \u00a355,000<\/span><\/p>\n\n\n<p style=\"box-sizing: border-box; font-weight: 300; font-family: Roboto; font-size: 16px; text-align: left;\"><span style=\"box-sizing: border-box; color: #ffffff;\">Skills<\/span><\/p>\n<p style=\"text-align: left;\">&nbsp;<\/p>\n<ul>\n<li style=\"text-align: left;\"><span style=\"color: #ffffff; font-size: large;\">Managing Security Processes<\/span><\/li>\n<li style=\"text-align: left;\"><span style=\"color: #ffffff; font-size: large;\">Communication with clients<\/span><\/li>\n<li style=\"text-align: left;\"><span style=\"color: #ffffff; font-size: large;\">Ensuring Regulatory Compliance<\/span>&nbsp;<\/li>\n<\/ul>\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Average UK Salary \u00a370,000 &#8211; \u00a380,000<\/span><\/p>\n\n\n\r\n<p style=\"box-sizing: border-box; font-weight: 300; font-family: Roboto; font-size: 16px; text-align: left;\"><span style=\"box-sizing: border-box; color: #ffffff;\">Skills<\/span><\/p>\r\n<p style=\"text-align: left;\">\u00a0<\/p>\r\n<ul>\r\n<li style=\"text-align: left;\"><span style=\"color: #ffffff; font-size: large;\">Creative skills<\/span><\/li>\r\n<li style=\"text-align: left;\"><span style=\"color: #ffffff; font-size: large;\">Working with clients<\/span><\/li>\r\n<li style=\"text-align: left;\"><span style=\"color: #ffffff; font-size: large;\">Working to a deadline<\/span>\u00a0<\/li>\r\n<\/ul>\r\n<p style=\"text-align: center;\"><span style=\"color: #ffffff;\">Average UK Salary \u00a326,000<\/span><\/p>\r\n\n\n\n\n\n\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-423","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/mrcottle.co.uk\/WP\/wp-json\/wp\/v2\/pages\/423","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/mrcottle.co.uk\/WP\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/mrcottle.co.uk\/WP\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/mrcottle.co.uk\/WP\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/mrcottle.co.uk\/WP\/wp-json\/wp\/v2\/comments?post=423"}],"version-history":[{"count":7,"href":"https:\/\/mrcottle.co.uk\/WP\/wp-json\/wp\/v2\/pages\/423\/revisions"}],"predecessor-version":[{"id":485,"href":"https:\/\/mrcottle.co.uk\/WP\/wp-json\/wp\/v2\/pages\/423\/revisions\/485"}],"wp:attachment":[{"href":"https:\/\/mrcottle.co.uk\/WP\/wp-json\/wp\/v2\/media?parent=423"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}