Introduction to Computing Computer Programming Terrorisom
No Background in Cyber Security
Student Awareness Maintaining Integrity Smart User
Cover Relevant Topics Malware Phishing Points of Vulnerability Protection Options Resource Availability Consequences
Avoiding Dangerous Sites Domain Name Clues Intended Use Ethical Use
Personal Data Protection Passwords, SSN, Address, DOB Compromising Pictures/Videos Attachments & Links from unknown senders Social Engineering Protect Your Computing Devices
Produce an MLA Formatted Research Paper on a Cyber Security Related Topic Produce a Class Presentation on a Cyber Security Related Topic
Describe what is meant by cybercrime and who perpetrates it? Name and describe the types of viruses from which I need to protect my computer? Explain how you can protect a computer from viruses? Explain how hackers attack computing devices and describe the harm they can cause? Explain the purpose of a firewall and describe how it keeps a computer safe from hackers? Identify 2 methods for password management?
Illustrate how a person can surf the Internet anonymously and use biometric authentication devices to protect their data? Describe the management of online annoyances such as spyware and spam? Identify the data that should be backed up and describe the best methods for doing so? Explain what is meant by social engineering and describe how someone can avoid falling prey to phishing? Provide hands-on check for understanding