Throughout history, there have been many ways to store and copy data, from our physical bodies (brains) to writing (books) to computers. In this lesson, students will analyze those different ways to store and copy data and determine what differentiates them. Furthermore, students will learn why humans transitioned from one to the other.
This lesson is about knowing which kinds of data can be considered more trustworthy or less trustworthy. Students will learn some of the cybersecurity risks of engaging with untrustworthy data and the ethical considerations of creating and sharing false data.
This lesson is about the different types of personal data that social media companies collect on their users. Students will identify why their data is valuable to social media companies and how it is used for targeted advertisements.
This lesson will examine how computers and the internet have popularized a new phenomenon called crowdsourcing. Students will learn how crowdsourcing taps into the wisdom of crowds, and how that wisdom can be used in cybersecurity to find vulnerabilities.