Rapid Research - Cybercrime

Slides:



Advertisements
Similar presentations
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
Advertisements

Breaking Trust On The Internet
Phishing (pronounced “fishing”) is the process of sending messages to lure Internet users into revealing personal information such as credit card.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
10 Tips for keeping MCL safe 1. Set up your defenses. Do you have adequate firewalls and antivirus software to protect you from hackers who could steal.
3.05 Protect Your Computer and Information Unit 3 Internet Basics.
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
What is risk online operation:  massive movement of operation to the internet has attracted hackers who try to interrupt such operation daily.  To unauthorized.
Julie Latham Digital Citizenship: An Informational Guide.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
SAMET KARTAL No one wants to share own information with unknown person. Sometimes while sharing something with someone people wants to keep.
Why Does The Site Need an SSL Certification?. Security should always be a high concern for your website, but do you need an SSL certificate? A secure.
Security Risks Todays Lesson Security Risks Security Precautions
AP CSP: Cybercrime.
HTTP and Abstraction on the Internet
HTTP AND ABSTRACTION ON THE INTERNET
Selecting a Web Hosting Service
Unit 3: Lesson 1 - The Need for Programming Languages
Practice PT - Big Data and Cybersecurity Dilemmas
UNIT 2 – CHAPTER 1 – LESSON 1 DIGITAL INFORMATION.
PRACTICE PERFORMANCE TASK (PT) FLASH TALK : THE INTERNET AND SOCIETY
Routers and Redundancy
THE NEED FOR DNS DOMAIN NAME SYSTEM
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
VIRUS HOAX + BOTS. VIRUS HOAX + BOTS Group Members Aneeqa Ikram Fatima Ishaque Tufail Rana Anwar Amjad.
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
UNIT 3 – LESSON 5 Creating Functions.
Cyber Security By: Pratik Gandhi.
Information Security 101 Richard Davis, Rob Laltrello.
Sending Bits in the Real World
UNIT 4 - BIG DATA AND PRIVACY
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
The Need for Algorithms 2 days
Rapid Research - Data Innovations
Vocabulary Prototype: A preliminary sketch of an idea or model for something new. It’s the original drawing from which something real might be built or.
Lesson 2-9 AP Computer Science Principles
RAPID RESEARCH DATA INNOVATIONS
Practice PT - Design a Digital Scene 3 days
Practice PT - Big Data and Cybersecurity Dilemmas
Done BY: Zainab Sulaiman AL-Mandhari Under Supervisor: Dr.Tarek
Unit 1.6 Systems security Lesson 3
DAY 1 – CREATE PERFORMANCE TASK
Malware, Phishing and Network Policies
Identity Theft This presentation will focus on identity theft. What do you already know about identity theft? Do you know anyone who has had their identity.
Forensics Week 12.
DAY 2 - Lesson 2: Explore PT: Make a Plan (1 hr)
Internet Safety Vocabulary
DAY 1 - Explore - AP Performance Task Prep
HOW DO I KEEP MY COMPUTER SAFE?
RAPID RESEARCH DATA INNOVATIONS
Lecture 3: Secure Network Architecture
Faculty of Science IT Department By Raz Dara MA.
Bethesda Cybersecurity Club
Encryption with Keys and Passwords
– Communication Technology in a Changing World
Rapid Research - Format Showdown
Rapid Research - Cybercrime
Vocabulary Big Data - “Big data is a broad term for datasets so large or complex that traditional data processing applications are inadequate.” Moore’s.
Cyber security and Computer Misuse
Computer Security By: Muhammed Anwar.
The Internet: Encryption & Public Keys
Unit 1 Fundamentals of IT
Securing your system, protecting your digital data and devices.
U2L6 Rapid Research – Format Showdown
Test 3 review FTP & Cybersecurity
1.2.2 Security aspects • Show understanding of the security aspects of using the Internet and understand what methods are available to help minimise the.
Unit 1.6 Systems security Lesson 1
Privacy, Security, and Ethics
An overview over Botnets
INTERNET SECURITY.
Presentation transcript:

Rapid Research - Cybercrime UNIT 4 – LESSON 8 – 2 DAYS

Vocabulary Alert: anitvirus software - usually keeps big lists of known viruses and scans your computer looking for the virus programs in order to get rid of them. DDoS Attack - Distributed Denial of Service Attack. Typically a virus installed on many computers (thousands) activate at the same time and flood a target with traffic to the point the server becomes overwhelmed. firewall - software that runs on servers (often routers) that only allows traffic through according to some set of security rules. Phishing Scam - a thief trying to trick you into sending them sensitive information. Typically these include emails about system updates asking you send your username and password, social security number or other things. SSL/TLS - Secure Sockets layer / Transport Layer Security - An encryption layer of HTTP that uses public key cryptography to establish a secure connection. virus - a program that runs on a computer to do something the owner of the computer does not intend. Cybercrime - any instance where digitally stored data falls into the hands of someone not originally intended to have access to it"

PURPOSE: Review terminology about cybersecurity and crime that is relevant for the AP CS Principles Exam Practice research and writing skills that will help students on the Explore PT.

To conclude our thinking about encryption and security we're going to look at how cybercrimes are conducted, how cybersecurity measures can protect us, and what the implications are of data leaking. Then you'll research a particular cybercrime and quickly prepare a one-pager about it.

You are going to watch a video touches on a number of topics that you might choose to research later: DDoS Attacks (and Bot Nets) Cyber warfare Viruses and Anti Virus Software Phishing Scams Credit Card theft Types of people who commit cybercrimes

Watch The Internet: Cybersecurity and Crime - Video in Code Studio Complete the Cybersecurity and Crime Video Worksheet - Video Worksheet

DAY 1: Choose Innovation, Read and Research Review Activity Guide and Rubric: At the beginning of the project, review the one- pager template and rubric. The written component is quite short. You probably have space for at most 100-150 words per response. Choosing Your Cybercrime Event: You have 20 minutes to choose a topic. Do not leave class today without a topic in mind and ideally with some resources identified. Luckily, in choosing your topic, you will likely have begun to identify resources you can use in completing your project. Conducting Your Research: This document is intended to serve primarily as a guide to students for identifying online sources of information. The skill you need to develop is identifying useful resources on your own and then synthesizing this information. Being presented with a structured way of doing this means students will have a model for how to complete their research when completing the actual Explore PT.

DAY 2 – REVIEW Cybercrime Definition: The definition of a cybercrime event as "any instance where digitally stored data falls into the hands of someone not originally intended to have access to it

Day 2 - Prepare one-pager Complete One-Pager: You should find this aspect of your project most familiar. The prompts are similar in style and content to prompts you have already seen. You need to be clear in your writing, and everything must fit on a single page. If they have responded completely to each of the prompts, it is fine to write less. You MUST finish this project today – we are simulating what will happen in February when you are working on your College Board performance tasks. There is a time limit and we have to stick to it.

TTURN IN YOUR ONE-PAGERS TODAY! No Homework today