Ben Garside

Ben Garside

Ben is a Learning Manager for the Raspberry Pi Foundation making teaching resources for educators. When he's not spending time tinkering with his Raspberry Pi, he likes spending time with his family

Activity

  • Hi everyone and welcome to the course. I'm Ben and I'm a Learning Manager at the Raspberry Pi Foundation. I will be facilitating this course over the next few weeks. I will be around to answer questions and offer feedback from today (the 6th March) until 31st March.

    I've been part of the team that developed the Teach Computing Curriculum here in England and...

  • That's really interesting. Is there much focus on programming skills, or is it more the use of applications?

  • Hi Oghale, good to have you with us on the course. Looking forward to reading your thoughts and comments as you work your way through the course. Good luck and I hope that you enjoy it.

  • That's really good to hear and thanks for sharing. I'm going to look up Mote to find out more about it!

  • Hi Mikhail, great to have you on the course with us and I hope that you enjoy it. Looking forward to hearing your thoughts and a little bit more about your context.

  • Hi everyone and welcome to the course. I'm Ben and I'm a Learning Manager at the Raspberry Pi Foundation. I will be facilitating this course over the next few weeks. I will be around to answer questions and offer feedback from today (the 5th September) until 30th September.

    I've been part of the team that developed the Teach Computing Curriculum here in...

  • @DebbieWinchester There are risks associated with both, but the argument is that the cloud servers are more likely to be more secure than your computer due to the amount of money and effort they will put into security. Safety is likely to be key part to their business models.

    I agree with what you're saying, but could someone access your data if they...

  • Welcome Danyal. I hope that you enjoy the course!

  • Welcome Dominic. Good to have you on the course.

  • Great analogies!

  • I think it's becoming more and more common for companies to work almost entirely on the cloud, so like floppy disks, sadly I can see the USB sticks going the same way towards the museum of old tech!

  • Hi Cali, glad to have you with us on the course. I hope that you find it useful

  • Great to have you with us on the course and I'm glad that you have enjoyed it. Thank you for contributing to the comments whilst you've gone along!

  • @StephanieH Yes, I agree that they can be vague with the information about what the update is doing, but trust me in saying that they're usually worth doing, particularly if there's any security update. The "Wannacry" ransomware attack was so successful as it targeted security vulnerabilities on versions of Windows that didn't have their updates

  • That's close but it's the operating system that will handle how to translate the keyboard input. Your keyboard will come with a device driver which tells the OS how to handle the input. You can also customise this in settings and tell the OS which keyboard layout you want to use.

  • Yes that's correct. The keyboard is the input device, the OS processes the input from the keyboard rather than it being considered part of the input as such.

  • That's really great to hear Stephanie. Thank you for you contributions to the comments as well. Hope to see you on another one of our courses again in the future :)

  • @AlexandraGalloni That's good thinking and something you could try in the classroom to see if it works out.

    I'd personally always teach operators before selection as IF statements require an operator to work. I'd also make sure that they understood boolean expressions.

  • @StephanieH Yes Stephanie that's along the right lines! Processor technology is getting more and more advanced, so whilst they can play very high quality games, because of the small screen size and lack of space and power for a top notch video card then they can't really compete with desktops. Battery life and physical space are the main limiting factors

  • @AngelicaBeristain Yes I think you're right, you become reliant on their uptime. Also they often charge a subscription fee whilst you're own storage has a one off cost.

  • I like the contexts you have given each example. They'd all work really well in the classroom

  • I'm looking forward to reading your comments as you work your way through this course Umair. Good luck.

  • Glad you could join us Umair. I hope this course helps you with your aims.

  • That's a possibility. What do you think the disadvantages are to cloud storage over a HDD for example?

  • Great answer!

  • You've got it Stephanie and are definitely thinking along the right lines.

    With regards to mobile phones, you're absolutely right, they are very powerful these days. Why do you think desktop PCs often come with towers full of hardware when a mobile phone can do so much inside such tiny device?

  • That's great motivation, glad to have a software engineer on the course! Hope that you enjoy it

  • Yes, very definitely. What other components do you think are. essential?

  • @AngelicaBeristain This is a future I want to live it!

  • Great to have you with us on the course Annette. I hope that you enjoy it.

  • That's a really interesting thought. What do you think would replace a monitor or screen?

  • Hi David. Sounds like some great motivation. Good to have you with us

  • Hi Angelica. Great to have you with us. I hope that you enjoy the course

  • Hi Stephanie. Great to have you on the course. I hope that this gives you a good insight into how computers work!

  • Welcome to the course everyone!! My name is Ben and I will be facilitating this course . I'll be checking in daily between 1st August and 26th August (2022) to answer questions, offer help and guidance and join in on discussions.

    From a young age I've always wanted to know what was inside the box when my Dad brought home our first computer (he didn't let me...

  • I don’t suppose it matters too much for the exercise, but the link to the. raw data isn’t working: http://data.glasgow.gov.uk/dataset/method-of-travel-to-work-or-study

  • I think 5 is the median and the interquartile is 18?

  • Hi all, having taught Computer Science in an English secondary school for 14 years, I am now working as a learning manager for an educational charity. I’m interested in learning more about how data science education can be taught and made accessible to young people.

    I think there is an ever increasing need to education young people about data science (and…

  • I have a heart rate monitor that is used to measure exercise when going to the gym. Basic data is collected by the device, but when in proximity of my phone, the data is uploaded to the cloud to calculate calories burnt and compares me against other gym members. Therefore the data must be stored on the cloud on servers owned by the heart rate monitor…

  • @SarahKirk Really pleased to hear that Sarah! Hope to see you on some of our other courses at some point :)

  • Hi Afsheen, we have an online course with that title, but we have two Teach Computing Curriculum units called "Computer Systems", one at KS3 and one at KS4. I would recommend them :)

  • Welcome Afsheen. Great to have you with us on the course. I hope that you enjoy it

  • I absolutely agree Ankita :)

  • Hi everyone and welcome to the course. I'm Ben and I'm a Learning Manager at the Raspberry Pi Foundation. I will be facilitating this course over the next few weeks. I will be around to answer questions and offer feedback from today (the 7th March) until 1st April.

    I've been part of the team that developed the Teach Computing Curriculum here in England and...

  • Great! Glad that you enjoyed it Mary and thank you for taking part.

  • Thank you for sharing Mary. I wasn't able to access your resources as I didn't have permission. Let us know if you are able to change that as we'd love to see them :)

  • @YukoNamba There is research that says that strong passwords are more effective than regular changes, but it does depend on the circumstances.

  • I'm genuinely really very happy to hear that you enjoyed it and found it useful Rachel. I hope it's tempted you to take another one of our courses in the near future!

    Thank you for you contributions to the course as well, I've enjoyed reading them and I'm sure others on the course have too.

  • Glad that you enjoyed it Emanuel. I hope that you also enjoy week 2.

  • Really pleased that you enjoyed it Yuko. Hope to see you on another one of our courses soon.

  • Do you think clicking on a phishing link can always be described as careless? How do you think you could reduce the chance of staff members clicking on such links?

  • Yuko, what exactly is an online school? Your setup sounds quite unique. What do you feel about having to change your password every three months?

  • The vast majority of schools in the UK, ban the use of mobile phones in schools for the reasons you mentioned. I'm sure it'll happen in France one day too.

  • The problem I think there is with questions such as memorable place, it only takes for one of the websites that you used this memorable place to be compromised for that to damage the security of everywhere that has used the question.

    I heard one good bit of advice about this where you can use a password manager to generate a random set of characters to...

  • If someone told you 2FA was too time consuming for them to use it, how would you respond?

  • I think this is all sound advice. I think it's pretty unlikely for you or your students to be the target of a DDoS attack, but it's more likely for a company who has your details, for example a bank or a online store to to be the target.

  • Great! I hope that you enjoy week 3

  • Let me know if you want me to explain anything in a different way. I'm here to help. Glad you're enjoying the course.

  • Do you use Office 365 or Google Apps for Education? If so, you can still do this, but without making them public facing.

  • I completely agree. I was donated a 2011 iMac. The specs are great, you'd still pay a lot of money for them in 2022, but it's. obsolete as it won't get the latest OS and as a result isn't supported anymore and won't get security updates. Very sad.

  • Ha, yes, I know what you mean. I think you can only do what you can do. Use the right protection software, other than that, always have some level of reasonable doubt. If something doesn't look quite right, then it probably isn't.

  • I agree, but then you have to think which websites this would appear on. Reputable websites are highly unlikely to have this form of malware present on their site.

  • With the third one, it's a bit of chicken and egg situation for me. It's up to us to keep our software up to date, but only if the updates are available, therefore the software provider has a responsibility to keep supporting the software and keep pushing out updates to make sure that it's secure

  • It's no problem about the tasks Julia, it's all about taking part and getting the information you need from the course. I'm please that you enjoyed it and thank you for your contributions.

  • It's always helpful to know that little bit more than is required for the level that you teach. I'm really pleased that you enjoyed it Diane and thanks for joining us.

  • Yes, social distancing certainly helps with avoiding shouldering.

  • Thanks for joining is Emanuel. I hope the course helps you with your goals. Looking forward to reading your thoughts and comments as you progress with the course.

  • Welcome David. I hope that you enjoy the course.

  • Really pleased that you're enjoying the course Rachel.

  • As described below, it is possible, but when I teach about the types of attack that are possible by downloading software to do the dark arts, I will always follow it up by teaching consequences. I a lot of countries there are specific laws against these type of actions that can come with sever punishments.

  • @EmanuelManuel In some cases. Often OS security updates are to "patch" up vulnerabilities that have been found that cybercriminals can take advantage of.

    You'll find this out when you progress with the course, but software aimed of reducing the chance of human vulnerabilities are things such as two factor authentication or CAPTCHA etc

  • Only if the antivirus detects it before it starts causing damage. If the trojan was a ransomware attack, once the executable file has been opened for the first time, it may be too late for antivirus to do anything about it.

  • A sobering thought

  • Very pleased that you enjoyed it Nicholas. I hope to see you on one of our other courses in the near future.

  • Yes these are all possible in theory, but you have to weigh up the likelihood of the human getting it wrong to the possibility of a bot also being able to do it. For example, famous personalities can be very subjective and what percentage of users don't have the motor skills to be able to make a pattern with a mouse.

  • Hi Emily, really pleased to have you with us on the course. I hope you find this useful and gives you some knowledge to pass on to the students that you work with. Keep us posted with how you get along!

  • This is a good question. The easy answer is all of the above. Hackers can be anything from state sponsored hackers to a teenager in their bedroom that has downloaded tools from the Internet that do the technical stuff for them (known as script kiddies).

  • Each attack is different, but it's commonplace for the attacker to ask for payment through bitcoin which is less regulated and harder to trace.

  • Very pleased that you're enjoying the Hugo. I hope week 3 is as equally useful to you

  • I think the "always on" approach is the way to go. It's eats up a bit of your system resources, but I think it's worth it.

  • It very much depends on the type of malware. Some can go completely undetected without the use of anti-malware software to scan the system. You've mentioned two symptoms which are the main ones, but obviously if it's infected your files you might not be able to open them. Also if it's a ransomware attack it'll be very obvious as you'll see a message on your...

  • In theory, yes this is possible. That said, apps on official download platforms such as the Google Play Store or Apple's App store are very unlikely to do this. If you're an android user, be careful about where you download the apk files from.

  • @AbdullahHussain I'm not a windows user, but you can do this on your own computer I think using device manager. I think if it was my own personal computer I wouldn't disable USB ports and be careful who I let use my computer.

    This is more a feature that you'd want to utilise when managing a network of which there will be network management tools that allow...

  • What are the signs that you might notice?

  • Hi Abdullah, good to have you with us on the course. I hope this acts as a good starting point for you and that you enjoy it.

  • Welcome Stella

  • You're completely right Jim, it is absolutely any age that can be vulnerable to any attacks.

  • Glad that you enjoyed it Rachel. I hope that you enjoy week 2!

  • Really pleased to hear that Julia! Thank you for your contributions to the course so far.

  • Great to read that Nicholas and I'm pleased that you're enjoying it. Looking forward to reading your week 3 comments too.

  • Hi Jim, glad to have you with us. I love that you are on a path of learning something new everyday and it sounds like you're already thinking along the right lines in terms of cybersecurity. I hope that you enjoy the course.

  • Hi Fiona. Welcome to the course. I hope this course helps you with both of your aims. Have you seen our unit of work on the Teach Computing Curriculum?

    https://teachcomputing.org/curriculum/key-stage-3/cybersecurity

  • I mostly agree, but CAPTCHA like technologies will and have evolved with the technology. It used to be having to spell out a horrible looking set of letters, now it works where a lot of the time you're not even aware that CAPTCHA is working behind the scenes. For example, the "I am not a robot" button is CAPTCHA that has tracked your mouse movement prior to...

  • Welcome Salma. Good to have you with us on the course.

  • Reach out if you're struggling Julia. If there's something you don't understand let me know I'd love to try and explain it a different way to help :)

  • I completely agree, but it's amazing how many large companies have been victims to it. Sony and TalkTalk to name a couple.

  • Yes, I agree. Also a lot of exploits are deliberately designed to take advantage of human error

  • We're excited that you're doing it to Rachel. Good luck and I hope that you enjoy it

  • A1. What would be the benefit of the bots monitoring websites that you mentioned?

    A2. It is also possible to pay third party companies to act as external firewalls. All traffic goes via their servers and therefore in theory attacks such as DDoS attacks don't ever reach your servers.

  • I agree with these points that you make. Training staff should be the top priority and as you rightly point out, humans make mistakes.