Information Security: Internet Security is an approximately 10 minute video on that topic. It is an introduction to the topic of Internet security. In the video, the players are defined. Hackers (not bad guys), crackers (bad guys), and script kiddies (wannabes) are distinguished. In addition, steps the home user should take to harden the computer are discussed. This includes anti-malware software and a firewall with a special emphasis on software updates. In addition to the video, there are links to the other videos in the series. A transcript of sorts is also available. This video is from an introduction to computers course and is part of a series of 8 videos on computer security-related topics. There is no cost to use this materials. Viewers are encouraged to become a sponsor of the YouTube channel at a cost of $2 per month.
Type of Material:
Online video
Recommended Uses:
It can be used in class embedded in a discussion or, as material to view before class in a flipped classroom - or after class as reinforcement.
Individual use
lecture
Technical Requirements:
None beyond Internet access and ability to run YouTube videos.
Identify Major Learning Goals:
The student can - - Learn about the types of people involved in threats to Internet security. - Distinguish hackers, crackers, and script kiddies. - Understand the importance of updates. - Learn about firewalls.
Target Student Population:
Lower-level college, high school, middle school
Anyone wishing to protect his sensitive information
Prerequisite Knowledge or Skills:
No specific skills are needed, but familiarity with YouTube video controls would be useful.
Content Quality
Rating:
Strengths:
The material is pertinent to any introduction to computer class -- in fact, to anyone using the Internet. It provides some insight into the people involved in threatening security and steps Internet users can take to protect their computers.
Concerns:
For an in depth understanding, material will have to be supplemented.
Potential Effectiveness as a Teaching Tool
Rating:
Strengths:
Material is concise, but can be effective in introducing the importance of Internet security and providing important recommendations. It could be used in several different ways: in a flipped classroom to introduce the topic, in class to highlight important points, or after class to provide reinforcement. The value of frequent updates is explained and encouraged. The visual presentation provides interest and engages multiple senses. The speaker can be seen and heard in the corner of each slide explaining the information. However, this is not just a talking-head presentation. Important points are presented in bullets on the slide -- in an easy to read size. Additionally, relevant graphics are used. It is possible to get closed-captioning as well as a transcript.
Concerns:
Concise material appropriate for its purpose since students lose interest in long videos especially if they are not interactive. However, it does not leave much time for introductions and/or summaries. For this material to be used effectively, instructions on the process of updating would be necessary. Both the captioning and transcript are computer-generated and there are mistakes.
Ease of Use for Both Students and Faculty
Rating:
Strengths:
The video works well and is self-contained. Terms are clearly explained.
Easy to use, just watch the video
Concerns:
There are no instructions, but they are probably not needed for today's generation of computer users.
Internet connection required
Other Issues and Comments:
•This video is a part of a bigger course comprising many videos, it is difficult to make an evaluation per video •Evaluating the whole course (all video) provides an overall more objective feedback •The aforementioned comments and evaluation apply to other video parts submitted individually to MERLOT
Scott Ford, the instructor, is a former FBI Cyber Trainer. He has developed a Udemy course on this topic.
Creative Commons:
Search by ISBN?
It looks like you have entered an ISBN number. Would you like to search using what you have
entered as an ISBN number?
Searching for Members?
You entered an email address. Would you like to search for members? Click Yes to continue. If no, materials will be displayed first. You can refine your search with the options on the left of the results page.
Searching for Members?
You entered an email address. Would you like to search for members? Click Yes to continue. If no, materials will be displayed first. You can refine your search with the options on the left of the results page.