Cybersecurity is defined in the Merriam-Webster dictionary as the following:
"Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack"
In a New York Times Article about Digital Security from 2014, the author relays the information that:
"There has been more than a 10,000-fold increase in the number of new digital threats over the last 12 years....
Last year, over 552 million people had their identities stolen, according to Symantec, and nearly 25,000 Americans had sensitive health information compromised — every day — according to the Department of Health and Human Services. Over half of Americans, including President Obama, had to have their credit cards replaced at least once because of a breach, according to the Ponemon Group, an independent research organization."
Assignment 1: Assessing the Impact of Data Security Breaches
A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personally identifiable information, personal health information, company secrets or intellectual property.
Step 1: Select and read one of the articles below about major online data breaches that have taken place in the last few years.
Step 2: Create a document in Microsoft Word and save it in your folder. Summarize the following based on what you have learned:
- The name of the organization attacked;
- The nature of the data breach — Were credit card numbers stolen? Passwords? Personal information?
- The extent of the breach: How many people did it affect? How much money does the organization estimate it lost as a result of the data breach? What other information was compromised?
- How the cyberattack occurred, if known. Did the organization, for example, take any missteps that allowed for data to be easily compromised?
- What, if anything, could have prevented it?
- What should individuals do if they are concerned their financial or personal information might have been stolen?
|File Size:||103 kb|
|File Size:||113 kb|
Assignment 2: All About Cybersecurity
Watch the videos Cybersecurity 101 and Hacking and Privacy located on the NOVALABS section of pbs.org
You may then enter the Cybersecurity Lab and play the game.
This game will teach you how to keep your digital life safe, spot cyber scams, learn the basics of coding, and defend against cyber attacks. You will complete challenges to strengthen your cyber defenses and thwart attackers.
PLEASE NOTE: This game is meant to be played during one class period. Your progress in the game will NOT be saved.
Assignment 3: Internet Safety Project
This assignment will help you lean more about various types of threats to your computer and safety online.
Step 1: Watch the video below as an introduction to viruses, worms, and trojans:
Step 2: View this PowerPoint to understand What is the difference between viruses, trojans, and worms?
Step 3: Next you will be taking a more in-depth look at antivirus, passwords, and how to maintain your privacy online. Click here to enter the Secure Comics web site, where you will view each of these three comics:
Be sure to complete the challenge section at the end of each!
Show What You Know!
Choose from ONE of the three options below:
Option 1: Pests on your computer
Describe the different types of infections you can get and where they can come from. You can use the information from the video and PowerPoint, add your own research, and add personal experience into it too.
- How do you handle a hacked e-mail?
- How can you recognize an infection on your computer?
- What are scams going on right now online?
- How can you avoid becoming a victim of a scam?
- What is some software you can use to clean out your computer?
Option 2: Cybersecurity Threats
Select one of the topics below to research. Include information about what the threat is, how you can recognize it, and ways to avoid it.
- IP Spoofing
Option 3: Famous Computer Crimes or Hackers
Pick a famous computer hacker or hacking to report on.
- What was the crime?
- How did they break the law? (example: hacking into a system, downloading illegally or using materials they did not own in their work)
- Who was affected?
- Who was responsible?
- What were the damages?
- How can we avoid running into the same problem?
1. Create a PowerPoint presentation to show what you know. Be sure to include:
- Relevant factual information
- Photographs on very slide
- Transitions on every slide
- A works cited page on the last slide
- A total of at least 7 slides.