003 - New Technologies
Geographic Knowledge and Understanding
Strategies to build resilience:
- New technologies for the management of global flows of data and people, including cybersecurity and e-passports.
Concepts
New technologies for the management of global flows of data and people have the power to influence the processes involved.
Aims
To have knowledge and understanding of new technologies for the management of global flows of data and people, including cybersecurity and e-passports.
Key Terminology
Cybersecurity
e-passport
Mass disinformation campaigns
Cyber Espionage
Define the key terms above by using the 'Useful Links' below:
Useful Links
Activity One - Describe
With all new forms of technology there is an element of risk of what could happen if it all went wrong. We have explored the issues surrounding nuclear energy explosions due to human error and environmental degradation caused by the flow of e-waste. But how at risk are we from the misuse of technology?
Describe how at risk we are from cyberattacks.
Describe the global risk of technological advancements.
Activity Two - Detailed Example - Cybersecurity
We all use electronic devices for a range of different purposes but how safe are you from attack? Do you use the same password to access all of your accounts? Can you really tell when you get a 'fake' email. Just because you are younger doesn't mean you are immune to a cyberattack. After all, much of the information about you that is online wasn't put there by you. Your doctor or dentist will now make notes about you on their 'system' it won't be written down on a piece of paper and filed away, it is electronically stored. Everything you watch online is recorded somewhere. Many of you will also use the free wifi in coffee shops but that makes you vulnerable. Answer the following questions using the resources in the 'Useful Resources' box.
What would a cyber attack look like?
How could a cyber attack impact you?
Who is most at risk from a cyber attack?
Describe how New York City are trying to improve cyber immunity.
Describe how governments can better defend themselves against cyberattacks.
Why does cyberwarfare need to be multilateral?
Describe how cyber attacks can be a Process, Possibility and Power.
Activity Two - Detailed Examples - E-Passport
We all hold a passport as we are either immigrants within Switzerland or we travel on a regular basis. Have you ever thought about why you have an e-passport today and what possibilities their use may hold for regions? Answer the following questions using the 'Useful Resources' box.
What is an e-passport?
How can e-passports create power over security risks?
What are the problems involved with the use of e-passports?
How can e-passport create the possibility for change within the continent of Africa?
Describe the process to create an e-passport.
How is Australia trying to keep its citizens secure?
Is e-passport information at risk of cyberattacks? Describe the process.
What is a digital passport and why are they being used?
E-Passports in Africa
E-Passports in Australia
Exam Style Question
"New technologies for cybersecurity create more risks than they solve." Discuss [12 marks]
This lesson was development in collaboration with Richard Allaway from geographyalltheway. For more resources please visit www.geographyalltheway.com