Digital Security

Dillon and Tammam


The full definition of Digital Security (self-protection) is: taking necessary precautions to guarantee electronic digital safety. Any digital product can be hacked and stolen, hence the hacker or the theif may and can get personal information of the digital product; comprimising you since amoug the things they can steal is your credit card number, or even your social security number (only in the US). In any society, there are individuals who steal, deface, or disrupt other people. The same is true for the digital community. It is not enough to trust other members in the community for our own safety. In our own homes, we put locks on our doors and fire alarms in our houses to provide some level of protection. The same must be true for the digital security. We need to have virus protection, backups of data, and surge control of our equipment. As responsible citizens, we must protect our information from outside forces that might cause disruption or harm.

Digital Security is simply about being secure about everthing that is electronic. For example, when you begin to learn about computers and the internet, you are taught to not reveal any personal information, like your full name and contact numbers. Then, on a later stage, you are taught about anti-virus software; and how it works. It basically does it's best to keep your electronical devices free from viruses. But why?

Well viruses can cause all sorts of mischeif, like deleting files and putting them in places they are not supposed to be. So when your computer is searching for that file, it finds another one, so then the program doesn't work. Onde upon a time, there was a virus that you recieved via e-mail, and if you opened it, it froze your computer. So when you pressed the power button to restart, it hit the zero-sector on your hard draive, which obilberates all the data, and could lead to motherboard damage; which is fatal. It most likely does that by altering the power input, therefore frying most of your equipment, since they are connected to the motherboard. But that was resolved; 3 years ago. So you can imagine what computer viruses can do nowadays.

The Bottom Line:
A Computer Virus is a computer program that can copy itself and infect a computer without permission or knowledge of the user. A computer virus can damage programs and delete files, reformat the hard disk, present text, video or audio messages, cause erratic behaviour, and can result in system crashes, among other things. Remedies include security software that can handle various aspects of security.

After you learn about viruses and anti-viruses, you learn about malware and spyware.

Malware is software designed to infiltrate and damage a computer system without the owner's knowledge. Malware can destroy files on a hard disk, corrupt the file system by writing junk data, send e-mail spam or ping a server, let viruses into the system unchecked, among many, many other things.
Spyware is software that has been designed to monitor users' web browsing and/or display unwanted advertisements. Spyware can gather information about computer users, showing them numerous, annoying and bogus pop-ups, and install a key logger (which records all of a users' keystrokes, therefore uncovering credit card passwords, and so forth) and alter web browser behaviour, also among other things. Remedies for spy- and malware include security software that can handle various aspects of security. Examples include Norton and McAfee who produce software specializing in certain security aspects like viruses, but they also produce software that covers viruses, malware, spyware, bugs, worms, internet intrusions (possibly by hackers), etc...

An example of spy- malware is a cyber-attack; an example of which is a relativley recent one too, is the attack on Estonia, on the 17th May, 2007: Nato is sending information warfare specialists to Estonia after the country suffered a major online attack. Targets of the denial of service attacks include the websites of the Estonian presidency and its parliament, almost all of the country's government ministries, political parties, three of the country's six big news organisations, two of the biggest banks, and firms specialising in communications.”
And this whole attack was from around the globe, computers everywhere pinged the servers simultaneously. Yes, a virus can do that. There is also a virus along the lines of an e-card you receive in your email. It had a specific title, but I forgot that, since the situation was resolved 3 years ago. Anyways, if you open this e-card it freezes your computer, completely. So you reach for the power button after several unfreeze attempts, and once you press that power button, the virus hits the zero-sector on your hard disk, crippling it.
5th graders are generally unaware of this stuff, especially the Estonian attack. 5th graders know that viruses are bad, but they do not know how serious they are. NATO leaders got together to place a cyber-warfare policy. Almost everything today is electronic, even military hardware; which is why the NATO is very cautious about this, as is the rest of the world since the attack.

Finally, we must not forget the precautions we can take besides software, like keeping your password to yourself, using various passwords, not the same one for all purposes, changing them ever now and then, for the average user, every 9 months, also use alphanumeric passwords, which include letters and numbers, and make them long.


We have chosen Dillon's younger sister's class, becasue we decided we needed to educate the 5th graders about digital security prior to entering the senior school, and we choose her class because we already have ties with that class.
Here are the different designs we came up with concerning the order and materails used for the lesson. Of course since we wrote the design report, a few minor changes were ineviatble.


Lesson evaluation from Mrs Lindsay

We initiated the presentation with the following video Dillon made:

The following is the main presentation power point:

This is the Jeopardy game with digital security questions, the power point isn't acting as it is supposed to, besides it was designed to be handled manually....

And finally, here is the handout that we presented to the audience at the end; the audience evaluation:

As for the expert in our topic, we could not locate one, however, according to my extensive time spent with computers and electronics, I consider myself an expert, though I'm not going to interview myself.


Tuesday 13/11/07: Final design and Plan are ready, and begin work on powerpoint and Jepordy game.
Monday 19/11/07: Continue work work on powerpoint and Jepordy game.
Tuesday 20/11/07: Finish up work on the powerpoint, pause Jeopordy; work on script for movie.
Monday 26/11/07: Movie script, Jeopardy game, evaluation, and quiz sheet are done. Begin filming movie.
Tuesday 27/11/07: Continue filming movie.
Monday 3/12/07: Continue filming movie.
Tuesday 4/12/07: Continue filming movie.
Monday 10/12/07: Finish of filming movie; and begin editing.
Tuesday 11/12/07: Finish editing movie.
Monday 17/12/07: Margin lesson for any problems...
Monday 7/1/08: Margin lesson for any problems...
Tuesday 8/1/08: Margin lesson for any problems...
Monday 14/1/08: Margin lesson for any problems...
Tuesday 15/1/08: Presentation day.


Here is Tammam's Evaluation:

Here is Dillons evaluation.

Digital Security Evaluation
Dillon BB-J
9b IT

There are many pros and cons about my digital security slide show along with some strength and weaknesses. There can be many things to improve our (Me and Tammam) presentation to Mr. Davis’s 5th grade class. Unfortunately, for us Tammam was a little late for coming in on time for our presentation, about 5-10 minutes late. And if Tammam came in on time, we could have presented our Jeopardy game, and that was the weakness of our presentation. Because our Movie, that I made, was around nine minutes long and our slide show took around 20-30 minutes long along with some questions, we didn’t have any time to play the Jeopardy game because the 5th graders had to go to Arabic, but they did really want to play the game. That was kind of a strength because it shows that they were eager to move on with our digital security presentation (that or they just wanted to skip Arabic).

Besides the Jeopardy game, every thing went really well. The digital security movie was a big hit and everyone loved it. There was nothing that could make my movie any better because it was the best. When it came to the power point, however, it was good but many of the students thought it was boring, like every slideshow, so that is a weakness, and to make our slideshow stronger, we need to make it less boring by putting some humor into and more action and pictures. When I say it was boring, I don’t mean it was bad, we reviewed and talked about what we’re suppose to talk about, such as malware and spyware and so on. Many of the students asked many question and had an answer along with it and that was a strength because it shows us that the students were learning and eager to learn.

Next time, if we do this sort of thing again or go back in time, we will try to come in a little bit more early and try not to come in late so that we have time to complete our presentation fully. That includes showing our movie, our power point presentation, our Jeopardy game along with questions. That way Tammam and I will get top marks in our digital security presentation. If we do all of those steps above, Tammam and I will have all strengths and no weaknesses.

Works Cited:

1. Incisive Media Limited. Estonia under cyber-attack. 17 May 2007. 26 October 2007 <>.
2. Ribble, Mike and Gerald Bailey. Digital Security. 26 May 2006. 26 October 2007 <>.
3. Wikipedia Contributors. Computer virus. 29 November 2007. 30 November 2007 <>.
4. Wikipedia Contributors. Image: Spyware infestation. 19 May 2006. 30 November 2007 <>.
5. Wikipedia Contributors. Malware. 28 November 2007. 30 November 2007 <>. 6. Hale-Evans, Ron. Mind Performance Hacks. California: O'Reilly Media, Inc., 2006.

Final assessment rubrics:
Tammam -
Dillon -