Category: Cyber Resilience and Internet Safety

curricular area and keeping learners safer online

cyber toolkit create

Cyber Toolkit: Create (NEW)

Teachers should focus on understanding how learners are using online platforms – do they consume, create or communicate?

This section focuses on the risks of using devices and online platforms to create content. This can be any form of media, including video, photos, text or games. Creating content carries less risk than consuming or communicating as long as the content remains on the device – the biggest risks coming when created content is shared via communication.

Ofcom data (2022) shows that the number of children and young people creating online video content is actually a small number and decreasing as this content becomes ‘more professionalised’.

Cyber Toolkit home

Go to Consume or Communicate

cyber toolkit create

Internet safety risks and considerations

Access

In order to create online content and potentially inappropriate or harmful content, learners usually need access to:

  • a device (internet access is not necessarily required for creating media content)
  • apps to create the content, such as the device’s camera and editing or manipulation apps

When supporting learners with this area, it is important to consider who controls their access to these opportunities and resources:

  • Is there a risk of this occurring in school?
  • How is that enabled?
  • Are there steps that could be taken to reduce the risk of this?

If it is an out-of-school risk:

  • How can the school support with this?
  • Is support required for families or learners?
  • Who can support with this: Community Learning and Development or Police Scotland?
Potential risks

Being more cyber resilient reduces the risk of internet safety issues arising. We all want the internet to be a more welcoming space for children and young people and that is why we promote this positive message of safe, smart and kind.

Topics to explore with learners might include are:

  • the types of content they might create
  • the risk in creating or sharing?
  • the risk of creating and sharing content to them or might it harm others?
  • the potential risks, and associated harms, the same for everyone – why are they different, and why does this matter?

Cyber resilience guidance

Devices

The first potential vulnerability when creating content is the device not being securely setup.

Check with learners that they have taken these steps to reduce the risk of content being stolen from their device:

  • their device account (Windows, iOS or android) has a strong password (three random words)
  • makes use of 2-factor authentication (2FA)
  • additional security features, such as fingerprints or facial recognition
  • has a unique account for each user (if shared device, such as a tablet or laptop)
  • a screenlock that requires a passcode or biometric (face or fingerprint) to log in to stop unauthorised access (hacking)
  • the latest operating system (usually iOS, android or Windows) installed as this usually fixes potential security vulnerabilities
  • installed apps from approved providers, such as App Store or Play Store to avoid potentially malicious apps that allow content to be stolen through a ‘backdoor’

 

Learners should also consider where created content is stored – this will typically be on the device but can also be stored on cloud storage, such as OneDrive, iCloud or Drive, and this adds the risk of remote hacking and content theft

 

  • apple devices have a content filter, called communication safety in Messages, in their ‘screen time’ settings that blocks potentially nude content sent or received on children’s phones
Accounts

Another potential vulnerability when creating content is the accounts on the device or online platform not being secure enough and allowing others to access created content.

Check with learners that they have taken these steps on their apps to reduce the risk of content being stolen from their accounts:

  • they use a secure, perhaps separate, email account (with its own unique username, secure password and 2FA)
  • they use their device security, such as account and biometrics, to log in to apps as this means they need to have the device in-hand to access the account
  • they do not share access to their account with anyone
  • they know how to use the settings and security features to set the platform up to only share information they are willing to share – this might include turning off data or location tracking, for example
Report and support

When using devices or online platforms to create content, learners should understand that online platforms and services, including apps, carry greater risk of being shared without permission as the content created on these is almost always stored on their server, which is the company’s computer, and not the child or young person’s device. 

Should created content ever be shared with, or without, permission then learners should have the knowledge, skills and support to report and recover from the potential risks associated with this:

Anyone under the age of 18 is considered a child by law and ANY content that contains exploitative or indecent images or video of children is child sexual abuse and illegal.

Educators should follow Local Authority child protection procedures. Children and young people who experience this should report it to CEOP (Child Exploitation and Online Protection).

 

It is not illegal to film or photograph someone without consent, however, any exploitative or indecent images or video of children is child sexual abuse and illegal.

Educators should follow Local Authority child protection procedures. Children and young people who experience this should report it to CEOP (Child Exploitation and Online Protection).

Digital content that may have been created consensually but once consent is revoked it can be challenging to stop the other party sharing it. The Internet Watch Foundation Report/Remove tool can be used to request any exploitative or indecent images and video are removed from online servers.

Resources

Thinkuknow by CEOP is the national website for learning about child exploitation and online protection (CEOP). Their learning resources site offers information and resoruces for learners, families and educators. 
These are a selection of the resources for different ages:

Jessie & Friends (4-7s)

Play Like Share (8-10)

Send me a pic? (11-14)

Exploited (14+)

cyber toolkit communicate

Cyber Toolkit: Communicate (NEW)

Teachers should focus on understanding how learners are using online platforms – do they consume, create or communicate?

This section focuses on the risks of using online platforms to communicate. 69% of children aged 3-15 used an online communications service for making voice/video calls or sending messages in 2022 (Ofcom).

The Cyber First Aid Box can be used by families to discuss and provide support to children and young people who may have encountered an online harm.

Cyber Toolkit home

Go to Consume or Create

cyber toolkit communicate

Although most of our time online is spent consuming content, such as viewing social media posts, watching videos or playing games, there is perhaps greater risk of harm from online communications. Whereas the user is mostly in control of content they consume, communicating with others involves others and therefore the additional risk of their behaviour impacting the user.

It is important that learners learn how to setup and maintain as much control of their devices and accounts to reduce the potential risk of harm. Teachers should make learnign specific to as many of the learners as possible, the statistics below should help shape some of your conversations with learners and help to identify the apps most common to children and young people.

 

Ofcom (2022) statistics reveal that:

  • 50% of 3-15-year-olds use WhatsApp (rising to 75% of 12-15s)
  • 30% of children aged 3-15 use Snapchat
  • 30% of children aged 3-15 use FaceTime
  • 22% of those aged 13+ who had received a recent unwelcome friend request, follow request, or message, received this via an instant messaging service
  • 9% of UK internet users aged 13+ who had experienced an online potential harm in the last four weeks, encountered their most recent potential harm on an instant messaging platform

The potential risks of online communication are most likely (Ofcom, 2022):

  • unwelcome friend/follow requests or messages
  • trolling
  • bullying, abusive behaviour or threats
  • unwanted sexual messages

Unwanted contact

cyber toolkit unwanted contact

Unwelcome friend/follow requests or messages (20%) and unwanted sexual messages (8%) account for 28% of the potential risks encountered by UK internet users aged 13+ (Ofcom, 2022). Understanding how the platform works can help children and young people reduce the likelihood of this potential risk by managing who can and cannot contact them.

go to Unwanted Contact page

Trolling, bullying and abusive behaviour
cyber toolkit trolling bullying abusive behaviour

Trolling (15%) and bullying, abusive behaviour or threats (8%) account for 23% of the potential risks encountered by UK internet users aged 13+ (Ofcom, 2022). Understanding how the platform works can help children and young people reduce the likelihood of this potential risk by managing whose messages and posts they see, and how to mute or block people who may be trolling, bullying or abusing them.

go to Trolling, Bullying and Abusive Behaviour page

Technology assisted harmful sexual behaviour (TAHSB)
technology assisted harmful sexual behaviour

Technology-assisted harmful sexual behaviour (TA-HSB) is when children and young people use the internet or other technology to engage in sexual activity that may be harmful to themselves and others. TA-HSB covers a range of behaviour including:

  • the developmentally inappropriate use of pornography
  • online sexual abuse
  • grooming
  • sexting

go to TAHSB page

03 March 11:00 – 11:45, Code Along – Networks and Radio Communication with micro:bit Second Level Learners +

In this live lesson, for second level learners and above, we will send messages between two or more BBC micro:bits (this is possible with the simulator and with actual devices).  To protect our messages, we will use some simple encryption to ensure that our messages cannot be intercepted and read anyone other than who we intend them to be read by.

Book your class onto this live lesson here.

02 March AM, PM and evening, NCSC Childminders in Scotland session and play-along for children (early level)

As childminders, you want to create a safe and secure environment for the children in your care. As we become ever more reliant on digital technology it is increasingly important that you protect data (on children, and families), finances and also the integrity of any digital systems you use, including email, communication channels and databases.

This webinar is for all childminders working in Scotland. It is run by the National Cyber Security Centre and supported by the Scottish Government, Education Scotland, Scottish Childminding Association and the Care Inspectorate, as part of Cyber Scotland Week. It will provide you with advice and steps you can take to minimise the likelihood and impact of a cyber attack, and information about where to get help and advice if you need it.

Join us to identify a handful of steps you can take to minimise the potentially costly and disruptive effect of a cyber incident, and better safeguard the children in your care, as well as your business’s finances and reputation.

Part of the 9.30am and 1.30pm sessions include a story ‘Monkey Cow’ by Stuart Spendlow and a hands on activity for children, focusing on creating secure passwords. To take part in the children’s activity, you will require some resources to hand:

• bag/box

• random household objects/ toys

• post it notes/small pieces of paper

• pens/pencils

Please click on one of the time slots below to join us in one of the 50 minute interactive online sessions for all childminders in Scotland and the children in your care.

Click here to sign up to the 9.30am -10.20am session

 

Click here to sign up to the 1.30pm -2.20pm session

 

7PM SESSION IS FULL SIGN UP NOW CLOSED (shorter childminder only session, no children’s activity)

 

When you have signed up, a join link will be sent to you via the email you use to sign up.

The link will ask you to join an online Microsoft Team’s meeting. No log in is required.

Cyber Scotland Week 2023 #CSW2023

This session’s Cyber Scotland Week will take place 27th February – 5th March 2023.
Let us know what you’re up to on twitter @digilearnscot with #CSW2023

Education Scotland will be delivering and supporting live sessions all over the country and online, as well as making asynchronous opportunities and resources available too.

YouTube player

About CSW23

The Three Aims of Cyber Scotland Week are:

Protection – improving cyber resilience knowledge, behaviours, awareness and practice

Innovation – showcasing innovative work happening across Scotland’s cyber sector

Skills and Careers – promoting skills development and a career in cyber security and to discover the importance of cyber security

Full events schedule

These are events already confirmed with more to be added:

Monday 27th February

All day – CyberFirst development day: Falkirk (CyberFirstGirls_DevelopmentDays_flyer)

1100 – 1145, Barefoot Live Lesson (First Level) 

Tuesday 28th February 

All day – CyberFirst development day: Inverness (CyberFirstGirls_DevelopmentDays_flyer)

Thursday 2nd March 

All day – CyberFirst development day: West College Scotland Glasgow campus (CyberFirstGirls_DevelopmentDays_flyer)

0930 – 1015, Tech She Can LIVE assembly: Tech Safety and Security

AM, PM & twilight (3 sessions)NCSC childminder session and read and play along for children (Early Level)  

Friday 3rd March  

All day – CyberFirst development day in Microsoft HQ Edinburgh (CyberFirstGirls_DevelopmentDays_flyer)

Monday 6th March

All day – CyberFirst development day: Maybole  (CyberFirstGirls_DevelopmentDays_flyer)

Sign up for these LIVE sessions

- Join Barefoot for this live lesson on Cyber Resilience, for first level learners. In this live lesson we will explore the idea of how and why we can keep our things secure using locks and…

cyber security for secondary schools

Cyber Security

ipsum lorum

 

go to Cyber home

content

- As childminders, you want to create a safe and secure environment for the children in your care. As we become ever more reliant on digital technology it is increasingly important that you protect data (on…
- This session's Cyber Scotland Week will take place 27th February - 5th March 2023.Let us know what you're up to on twitter @digilearnscot with #CSW2023 Education Scotland will be delivering and supporting live sessions all…
cyber security for ELC - All ELC providers want to create a safe and secure environment for the children in your care. As we become ever more reliant on digital technology it is increasingly important that you protect data (on…
cyberfirst cyber security with NCSC - Education Scotland is proud to be Scotland's CyberFirst programme regional partner. Education Scotland's digilearn programme provides national guidance, support and inspiration to local authorities, schools and educators across all thirty-two local authorities. go to the…

cyber secondary teachers

Cyber Resilience and Internet Safety for secondary teachers

This section aims to provide ideas, information and professional learning to support secondary teachers develop confident and responsible children and young people that are cyber resilient or interested in studying cyber security.

  go to cyber home

Cyber resources

cyberfirst courses for learners

CyberFirst offers a range of learning courses and resources from age 11, including:

  • Trailblazers
  • Adventurers
  • Defenders
  • Futures

go to CyberFirst courses

living in a digital worldExperience an interactive journey into the world of cybersecurity. This resource shines a light on some of the most important topics for how to stay safe inside the digital world and gives practical suggestions that help improve cyber resilience. 

go to Living in a Digital World

This set of resources combines the SQA level 4 units in Cyber Security Fundamentals and Internet Safety

They reinforce our belief that every learner should have the knowledge and skills to use the internet and online services safely, allowing them to spot potential risks and recover from any potential harm, they face while using online services. 

go to Level 4 resources

Understanding cyber resilience and internet safety

cyber toolkit

The Teacher Cyber Toolkit is the main page for information, ideas and resources for teachers. It splits internet use into: consume, create or communicate and has resources and information for each of these.

go to Cyber Toolkit

Teacher Digital Skills ToolkitStart here if you need support with basic digital literacy skills, such as creating passwords, logging in to Glow or connecting to Wi-Fi.

go to Teacher Digital Skills toolkit

this is cyber clpl

This is Cyber Resilience and Internet Safety is the next step for teachers more confident in their own digital literacy. There are four sessions to choose from whether you are planning lessons or creating guidance for your school or community.

go to This is Cyber CLPL

Cyber across the curriculum

Cyber resilience and internet safety can be incorporated into other curricular areas, below are links to those which are ‘responsibilities of all’. This has been kept concise for simplicity but there are many other aspects that could be explored by teachers.

cyber security for secondary schools

Cyber security can be studied in Scottish education as a discrete subject. It offers challenge, problems to solve and opportunities. 

go to cyber security

cyber in health and wellbeing

There are lots of areas of our lives now touched by digital technology and cyber resilience can help keep them safer, more private and fairer. 

go to cyber in HWB

cyber in literacy and english

More of the information we consume is now online, in the form of news, social media and literature. Learners need support to find, evaluate and make use of these texts.

go to cyber in literacy