Skip to content

1 – You and your data

🔎 Unit Overview

In this unit you will gain an awareness of:

  • The importance and value of data
  • How human actions can make data more vulnerable to theft or exploitation
  • Common cyberattacks
  • Measures put in place on networks to help protect IT systems from attacks

🎯 Learning Objectives

  • Explain the difference between data and information
  • Critique online services in relation to data privacy
  • Identify what happens to data entered online
  • Explain the need for the Data Protection Act

💬 Key Vocabulary

  • data
  • information
  • cybersecurity
  • cybercriminals
  • profiling
  • user behaviour
  • privacy policies
  • data protection
  • data subject
  • data portability
  • malware

📝 Starter Activity – Motives behind attacks

Click this link: https://threatmap.checkpoint.com/

Look at the cyberattacks that are happening right now.

What might some of these attacks be trying to steal or get access to?

📖 Data vs Information

Data is raw facts and figures with no context:

John: 28

Claire: 49

Jade: 40

Ahmed: 45

Chloe: 38

Information is created when that data has been processed and becomes meaningful:

These are scores from a test where the pass mark was 35.

John needs to resit the test.

The average score is 40.

📝 Level 1 – Customer Data

This data is the contents of a shopping basket for an online customer.

This data can be used to help build a profile of this customer and therefore convert the data into information.

What assumptions can you reasonably make about this customer?

Download the Level 1 activity and answer the questions.

📝 Level 2 – Categorise the data

Complete the mind map by adding example data next to each category.

Download the Level 2 activity to do this.

Example

Personal information about you:

  • Name
  • Date of birth etc.

📖 Privacy policies: Be informed

Work in pairs and decide which two of the companies on the right-hand side you wish to research. In your pairs, allocate one each.

Spend five minutes researching the question, ‘What data do these companies collect about their users?’

Add your new findings to your mind map and spend two minutes discussing them with your partner.

📖 The consequences of data theft

Watch this video

If cybercriminals successfully steal data from companies, who would suffer and in what way?

📖 Data Protection Act 2018

In 2018 the UK implemented the European Union’s General Data Protection Regulations (GDPR) into UK law with the Data Protection Act. It states that all organisations and people using and storing personal data must abide by the following principles.

Data must be:

📖 Data Protection Act 2018 – Your rights

Anyone whose data is stored when using a computer is counted as a data subject. As a data subject, you have the right to find out what information the government and other organisations store about you.

You have the right to:

📝 Level 3 – Quick Quiz

Download the Level 3 activity and complete the four questions to summarise your learning today.

🏅 Level Up

🥇 Level 1

  • Complete the Level 1 worksheet and upload the completed file to Teams.

🥈 Level 2

  • Complete the Level 2 worksheet and upload the completed file to Teams.

🥉 Level 3

  • Complete the Level 3 worksheet and upload the completed file to Teams.

In this lesson, you…

  • Looked at the difference between data and information
  • Investigated what data companies might collect on you, as well as how that data might be valuable to cybercriminals
  • Looked at the need for the law involving data protection

Next lesson, you will…

  • Look at the risk of data being compromised through human error, and strategies that can be put in place to avoid the dangers