Cybersecurity
|
|
|
|
1. Bill Nye: My Computer is Under Attack with worksheet (Netflix)
2. MediaSmarts Secure Comic with worksheet
Secure Comics (gsrca.de)
3. Intro to cyber security (code.org)
4. Assignment: one page research
2. MediaSmarts Secure Comic with worksheet
Secure Comics (gsrca.de)
3. Intro to cyber security (code.org)
4. Assignment: one page research
Lesson 2 & Assignment
Assignment:
You should choose a recent cybercrime event that you find personally relevant or interesting. For the purposes of this project, we’ll define a cybercrime event as any instance where digitally stored data falls into the hands of someone not originally intended to have access to it.
Step 1: Read the following document "How Not to get Hacked" : How Not to Get Hacked | Code.org
Step 2: Choose an Industry / Product / Company of Interest
Choose an industry, product, or company of interest and try to find instances of it having been hacked or leaked in some
way. Aim to find stories where a piece of technology actually was hacked or failed, leading to the release of data. Avoid
stories where someone just posts private information online.
Potential search terms include:
● “_____ leak”
● “_____ hack”
● “_____ breach” or “_____ data breach”
Step 3: Check the news
The rate of cybercrime seems only to be increasing, and it’s likely that recent news includes some instance of cybercrime.
Search through recent news stories and see if you can quickly identify a cybercrime event as your topic. Just make sure
your cybercrime actually involves data falling into the wrong hands.
Step 4: Conduct your research
You already have some practice finding good resources online. You’ll want to find recently published documents from
authoritative sources. There is no need to use overly technical documents, but keep an eye out for familiar terminology
and topics.
Key Information to Find
● Overview: Whose data was stolen? When did this happen? Briefly explain the context of the event.
● Data Specifics: What specific data fell into the wrong hands?
● How was it stolen / How to Prevent: How specifically was the data stolen? Is this a flaw in the technology?
Were there any cybersecurity measures in place? How might this type of attack be prevented in the future?
● Data Privacy / Security Concerns: What specific concerns arise from this data being stolen? Is there already
evidence of the data being used in concerning ways? Try to find how the privacy or security of some people were
compromised.
You should choose a recent cybercrime event that you find personally relevant or interesting. For the purposes of this project, we’ll define a cybercrime event as any instance where digitally stored data falls into the hands of someone not originally intended to have access to it.
Step 1: Read the following document "How Not to get Hacked" : How Not to Get Hacked | Code.org
Step 2: Choose an Industry / Product / Company of Interest
Choose an industry, product, or company of interest and try to find instances of it having been hacked or leaked in some
way. Aim to find stories where a piece of technology actually was hacked or failed, leading to the release of data. Avoid
stories where someone just posts private information online.
Potential search terms include:
● “_____ leak”
● “_____ hack”
● “_____ breach” or “_____ data breach”
Step 3: Check the news
The rate of cybercrime seems only to be increasing, and it’s likely that recent news includes some instance of cybercrime.
Search through recent news stories and see if you can quickly identify a cybercrime event as your topic. Just make sure
your cybercrime actually involves data falling into the wrong hands.
Step 4: Conduct your research
You already have some practice finding good resources online. You’ll want to find recently published documents from
authoritative sources. There is no need to use overly technical documents, but keep an eye out for familiar terminology
and topics.
Key Information to Find
● Overview: Whose data was stolen? When did this happen? Briefly explain the context of the event.
● Data Specifics: What specific data fell into the wrong hands?
● How was it stolen / How to Prevent: How specifically was the data stolen? Is this a flaw in the technology?
Were there any cybersecurity measures in place? How might this type of attack be prevented in the future?
● Data Privacy / Security Concerns: What specific concerns arise from this data being stolen? Is there already
evidence of the data being used in concerning ways? Try to find how the privacy or security of some people were
compromised.
Use a table to keep track of your information; you can also add more if you like. You’ll need to include at least 3 sources of information but you can use more.
Submit to MS teams a "one-pager" quick research summary answering the above questions. (Key information to find) Organize your page using the above headings. Include separate reference page. (15 marks) |