Cybersecurity
Cybersecurity is defined in the Merriam-Webster dictionary as the following:
"Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack"
In a New York Times Article about Digital Security from 2014, the author relays the information that:
"There has been more than a 10,000-fold increase in the number of new digital threats over the last 12 years....
Last year, over 552 million people had their identities stolen, according to Symantec, and nearly 25,000 Americans had sensitive health information compromised — every day — according to the Department of Health and Human Services. Over half of Americans, including President Obama, had to have their credit cards replaced at least once because of a breach, according to the Ponemon Group, an independent research organization."
Assignment 1: Assessing the Impact of Data Security Breaches
A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personally identifiable information, personal health information, company secrets or intellectual property.
Directions:
Step 1: Select and read one of the articles below about major online data breaches that have taken place in the last few years.
Step 2: Create a document in Microsoft Word and save it in your folder. Summarize the following based on what you have learned:
- The name of the organization attacked;
- The nature of the data breach — Were credit card numbers stolen? Passwords? Personal information?
- The extent of the breach: How many people did it affect? How much money does the organization estimate it lost as a result of the data breach? What other information was compromised?
- How the cyberattack occurred, if known. Did the organization, for example, take any missteps that allowed for data to be easily compromised?
- What, if anything, could have prevented it?
- What should individuals do if they are concerned their financial or personal information might have been stolen?
Articles:
uber_data_breach.pdf | |
File Size: | 394 kb |
File Type: |
yahoo_says_hackers_stole_data_on_500_million_users_in_2014.docx | |
File Size: | 103 kb |
File Type: | docx |
home_depot_says_hackers_also_stole_email_addresses.docx | |
File Size: | 113 kb |
File Type: | docx |
Assignment 2: All About Cybersecurity
Watch the videos Cybersecurity 101 and Hacking and Privacy located on the NOVALABS section of pbs.org
You may then enter the Cybersecurity Lab and play the game.
This game will teach you how to keep your digital life safe, spot cyber scams, learn the basics of coding, and defend against cyber attacks. You will complete challenges to strengthen your cyber defenses and thwart attackers.
Assignment 3: Viruses, Trojans, and Worms
View this PowerPoint to understand What is the difference between viruses, trojans, and worms?
viruses_worms__trojans.pptx | |
File Size: | 3783 kb |
File Type: | pptx |
Step 3: Next you will be taking a more in-depth look at antivirus, passwords, and how to maintain your privacy online. Click here to enter the Secure Comics web site, where you will view each of these three comics:
Be sure to complete the challenge section at the end of each!