ITGS Banned Words game - Computer Software

Banned Words is a game for ITGS students and teachers that makes for a useful starter or plenary activity. In a previous post I uploaded slides for the ITGS terms related to computer hardware; this slideshow contains all the terms relating to computer software.

For the uninitiated the rules are straightforwad: students must guess which term one of their teammates is trying to explain; the student doing the explaining is not permitted to use any of the banned words on the slide. The concept is similar to Taboo(TM) or Forbidden Words(TM). 

You can download the presentation from Slideshare. It has an embedded macro randomly select a term each click until all terms are covered.



Related posts:

Book Review: Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground by Kevin Poulsen tells the story of Iceman (real name Max Butler), a computer geek turned hacker turned notorious cyber criminal who was eventually imprisoned in 2007. Kingpin charts Butler's rise (or fall?) into organised crime, from his first offences including software piracy and phone hacking, to system administration of one of the largest cyber-criminal discussion forums on the Internet. More modern than The Cuckoo's Egg or even Ghost in the Wire, Kingpin gives a fantastic insight into the world of cybercrime in the late 1990s and early 2000s, a period of time when criminals were starting to make serious money from online fraud - particularly from stealing credit card numbers and associated details - so called carding, and law enforcement agencies were struggling to control this rapidly growing new threat.


A large part of Kingpin discusses the underground discussion forums where cyber-criminals share tools, tactics, and information, including the now infamous Shadowcrew forum. One of the themes of Kingpin is law enforcement's frequent inability to keep up with technology and the new types of crimes it enables - this is especially true in the early days when Max commits his first crimes. The material here is really the stuff of thrillers as a cat-and-moues game develops between the carders, the FBI whose undercover agents try to infiltrate the groups and their servers, and even between the hackers themselves as they compete for notoriety in an atmosphere of distrust. It is at this point that Butler pulls off his most notorious hack - the infiltration and subsequent hostile takeover of rival carders' forums - including DarkMarket - to create his own central criminal marketplace, CardersMarket.

One of the great takeaways from Kingpin is the answer to the question curious Computer Science and ITGS students often ask: 'How do you hack?'. Poulsen explains in candid detail how Butler and his associates circumvented security in their target systems, including exploiting known vulnerabilities in software (flaws in BIND and VNC are discussed), hijacking WiFi connections, and taking advantage of systems that still use default passwords. In one of his bigger hacks, Butler takes advantage of a security lapse at a restaurant that stores unencrypted credit card details in text files on their systems. These examples do a great job of highlighting how security breaches are often caused by simple human error and can be relatively easily exploited - a great lesson for students on the importance of general good security practices such as choosing secure passwords and keeping systems patched and updated.

One aspect of Kingpin that disappointed was the lack of focus on the social impacts of carding, and Butler's crimes in particular. Although loss figures scatter the book (when Butler was arrested the affected banks calculated the total losses at over $86 million), these are almost used as yardsticks to measure the success of each hack - little space is dedicated to the effects on the banks or their customers, almost giving the impression that such fraud is a victimless crime. In a similar vein, throughout the book Poulsen tends to paint a picture of Butler as a misunderstood geek, almost a Robin Hood character driven by a pathological need to hack computer systems. Poulsen does use his own knowledge (he is also a former hacker) to provide a fantastic insight into the hacker mindset, but I would have liked to have seen a little more balance.

Overall though, Kingpin is a thoroughly entertaining book - I read it in just two sittings - that I feel many ITGS students would enjoy. At 239 pages it is short enough to maintain students' interest and is modern enough to provide a wealth of material to which they can relate. Although its coverage of the social impacts of hacking is limited, its clear explanations of hacking attacks and the apparent ease with which they were performed make reading it an eye-opening experience. There is a lot of potential here for discussion material in the ITGS classroom, including security practises, organisational responsibility to secure personal data (and report breaches if they occur), the difficulty of enforcing law online, and the fine line between white hat and black hat hacking. This could keep ITGS students busy for some time!

I bought my copy of Kingpin from Book Depository with free worldwide shipping.

Related posts:

Free Microsoft E-Books

Microsoft has made a collection of hundreds of e-books available for free from its website. The collection features titles covering many major Microsoft products including Office, Windows 8, SQL Server, ASP.NET, and many more, with downloads available in PDF, EPUB, and MOBI formats. While many of the topics are quite complex (Data Mining Extensions (DMX) Reference for SQL Server, anyone?), a lot are ideal for ITGS teachers and students, particularly if they are developing their internal assessment project using Microsoft software.

There are books relating to all Office products, including Quick Start Guides for Excel and Access (I sometimes find students struggle with these) and Getting To Know Office 365 for students who may be using Microsoft's cloud services. Own Your Space - Keep Yourself and Your Stuff Safe Online and BYOD Devices - A Deployment Guide for Education both relate to topics and issues in the ITGS syllabus and could be used as instruction aids or discussion material.

Other titles may be of interest to non-ITGS teachers too, including Developing Critical Thinking Through Web Research Skills and Digital Storytelling.

The collection can be downloaded from Microsoft's blog. It really is huge, so if you find an example that is particularly useful for ITGS, please do add a comment below.

Related posts:

Where to find ITGS news articles

News articles are one of the foundations of ITGS: a great source of discussion material, a way of keeping up to date with the latest developments, and now a key part of the paper 2 exam. In theory, finding ITGS news articles should be easy - we now have access to so many different newspapers, websites, and social media feeds. However, finding articles that clearly present social and ethical issues, relate specifically to information technology, and are written in a clear and engaging way suitable for international students is not always easy. Here is a list of my favourite sites that meet these criteria.

Do you have a suggestion for another ITGS news site? Please do add a comment at the bottom of this post.


The Atlantic
The Atlantic is one of my favourite sites for ITGS news articles. Its articles are longer than many other sites on this list, but also more detailed and often explain how IT systems work in a way that is perfect for strand 3 of the ITGS triangle.




BBC
The BBC seems to be the go-to example in lists like this. Its articles are always well researched and clearly written, and short enough for reading in ITGS class. However, it is worth bearing in mind that a lot of its articles focus on new product releases or similar events which do not tend to generate the social and ethical issues necessary for ITGS analysis.


New Scientist
New Scientist contains a wide range of articles on the latest IT developments, from computer crime to humanoids. Their topic guides include 60 Seconds - a short round up of stories from the past week. Some articles require a subsription to view in full, but many are free.



Communications of the ACM
The ACM (Association for Computing Machinery) covers a wide range of topics that relate directly to ITGS. Although quite long, the articles are clearly written and give enough technical detail to help students understand how the IT systems involved work - great for understanding strand 3, criterion B on paper 2, and ITGS in general.


Science Daily
www.sciencedaily.com/news/computers_math/
Through its (admittedly somewhat crowded) front page, Science Daily provides access to a wide range of information technology related topics, including hacking, encryption, the Internet, and computer modeling. The articles tends to be at a higher reading level than some of the other sites on this list, but should still be accessible to ITGS students.


MIT Technology Review
The Computing section of Technology Review contains the news articles most likely to be relevant to ITGS students and teachers, but it is also worth periodically checking others sections such as biomedicine too. Because the site focuses on upcoming technology and innovative research (often covering stories long before they appear on other sites), it is great for ethical discussions about the direction of technological development.


EdTech Magazine
EdTech features a great range of articles on the development and use of information technology in education. Their particular focus on social impacts makes them very useful for ITGS. In particular, the K-12 section of the site is useful for classroom discussion material.


PBS Frontline
PBS covers many contemporary news stories, some of which link up with the ITGS syllabus. Recent examples include United States of Secrets, covering US Internet spying, and Generation Like, an investigation into teenagers and social media. The great thing about the PBS stories is their depth: each includes a series of videos and related articles that put the story into context - great for addressing the different strands of the ITGS triangle.


IEEE Spectrum
This is another site I love for articles about leading edge technology articles. IEEE Spectrum has a reputation as a top-quality peer-reviewed publication, yet its articles are generally written in a style that is accessible to most readers. The Robotics and Computing sections are frequently updated and contain a great range of material to stimulate ethical debates in ITGS class.


Wired
www.wired.com/security
Wired covers a lot of product releases and similar stories (which are generally not useful for ITGS), but the articles in their security section have a much greater focus on social impacts, making them very useful.




Newsweek
www.newsweek.com/tech-science
Newsweek features the some useful articles in its technology and science section. Although the articles do not appear as frequently as other sites, the depth of the investigations means they often cover several strands of the ITGS triangle.




News.com Australia
www.news.com.au/technology
News Corp's Australia portal features breaking IT news and sometimes has stories not covered by other sites. The articles are long enough to provide sufficient detail, but short enough to be useful for ITGS paper 2 exams with minimal alteration.




The Australian
www.theaustralian.com.au/technology
Another Australian site, which provides an interesting alternative perspective to the predominately US-focused sites. It can be very interesting to look at how major issues (such as government surveillance) are handled compared to the US. The Australian also features regular exclusive stories which investigate issues is more depth.


Of course, there are many other sources for ITGS news articles too. Most major newspapers have technology sections, including the New York Times, the Sydney Morning Herald, and the UK's Guardian, and Telegraph newspapers, and often articles that raise social and ethical issues can be found there.

If you have a suggestion for another ITGS news site, please do add a comment below.


ITGS Project: Criterion E: Product Development

Now you have your ITGS project's design and test plan complete, it is time to start producing your product, always using the specifications and designs that you created in criteria B and D. The development process needs carefully documenting in several ways:
  • You need to take screenshots of the key steps. These will be need to write up the documentation for criteria E. I recommend making dozens of screenshots during product development: if you don't need them later, you can delete them - but if you need a screenshot and you didn't take one, you cannot 'undo' the progress you have made since then.
  • Criteria C needs updating to reflect the progress you are making, as always.
  • I need to see you developing your project. Although the project can (and will) be homework, we need to have class time developing your product too. This gives you a chance to get guidance if you need it, to use the classroom resources, and it also helps me ensure you are developing the project yourself (sorry, but it is true).

Criterion E is not all about creating the product: you must also explain (with screenshots) the key steps you took during the creation, whilst referring to your three complex techniques that you selected earlier in the project. Your criterion E document should only contain details of these complex techniques - not the basic ones. Finally, you also need to justify your choice and use of techniques - often this can be done by referring to the client's needs or to accepted good practice in your product area (e.g. it is generally accepted good practice to use a consistent layout for most web pages or DTP products to aid user navigation).




Related posts:

ITGS Project: Criterion D: Design

Criterion D - Design is where you actually start the process of designing and developing a product to fit your client's needs. You need to come up with a series of diagrams that reflect your product's overall and internal design. At this stage it is critical to remember that you are designing a product to meet your client's needs: everything you design should be based on their needs and / or good practice in your product area. Do not add features that do not solve the client's problems: they are unnecessary.

The overall design is an overview of the general components of your product - for example, in a DTP product, roughly what content will go on each page; in a website, which pages will exist and how they will be linked together (a sitemap is good for this); and in a database, a diagram of the tables, fields, and relationships.

The internal design goes into more detail for each of these components, for example, including details such as the typeface, font colour, font size, margin sizes, and so on for items such as DTP pages, web pages, and database forms. You will also want to include items such as validation fields in databases. The key here is to look at the ITGS project's rubric: for the highest marks, you must "...include sufficient detail for an IT-literate third party to see how the product was created."

For reasons of neatness and the ability to correct mistakes, I recommend you create your design digitally wherever possible. I know some of the IB examples and the example projects that scored 7 used paper designs, but overall I feel things look better digitally. That said, you should NOT use your intended production software to create the design (i.e. do not 'design' the table layout in Access, or 'design' the page layout in Dreamweaver). Also remember to update your criterion C as you generate your designs.



Related posts:

ITGS Banned Words game - Computer Hardware

Banned Words is a game for ITGS students and teachers that makes for a useful starter or plenary activity. Students develop their vocabulary and explanation skills by explaining supplied term to their teammates, but without mentioning the banned words (similar to Taboo(TM) or Forbidden Words(TM)). Two or more teams can play.

Previously I have used paper cards to play this game (you can download them from my web site), but now I have gone hi-tech and paper free! This presentation covers the keywords related to Computer Hardware from the beginning of Strand 3 in the ITGS syllabus. If you download the presentation rather than view it on Slideshare, you can make use of the button which takes you to a random term each time until all terms are covered exactly once (this is achieved using VBA code, so Office may give you a security warning).



Related posts:

ITGS Dragon's Den Lesson

This is a fun little activity which I tried recently with my new grade 11 ITGS students, based on the Dragon's Den TV series. We are in the middle of a unit covering sections 3.1 Hardware and 3.2 Software of the syllabus (chapters 1 to 3 of my textbook) and have learnt about common input, output, and storage devices as well as starting to analyse some of the social and ethical impacts of technology from strand 1. This activity synthesizes some of that knowledge, as well as giving students an opportunity to practise presentation skills (mine were surprisingly good) and involve some creativity (I think Creative really should be on the IB Learner Profile).

The lesson involves students inventing a (realistic, it must be stressed!) new use for one of six technologies, including RFID, QR codes, and GPS. Students sometimes struggle to come up with examples of these technologies in their exams and I found that in the process of this activity they not only came up with new ideas but also discovered a few existing ones too. In true Dragon's Den style, students must pitch their idea to the class, focusing on the positive social impacts in an attempt to earn the class' 'investment'.


My students came up with some quite innovative ideas, and it was interesting to see how they came to understand the capabilities and limitations of each technology, as well as how they viewed the role of technology in our lives (some had ideas which clearly raised a few social and ethical concerns, which enabled a further discussion about privacy and other issues).

Related posts: