Tuesday TOTD: Using a Ceasar's Cypher, encrypt a message to any key of your choice on an index card. On a second card, write it's solution and key. Make sure your name is on both index cards.
Using the resources above and below:
- Draw a diagram of Alice, Bob and Eve -- label each as to their analogy to enryption
- Explain what is mean by the "key" of an encryption algorithm
- Explain what a "back door" is and how/when used or exploited.
- Explain biometrics and provide two examples of use.
- Explain components of strong passwords; provide samples of weak, medium and strong passwords.
- Define the word "credentials" as related to computer security.
- Define and diagram HTTPS, public key, private key from the slide on the Carnegie Mellon video.
- Create a Venn Diagram comparing Worms/Virus & Trojan Horse.
- Locate, analyze and record the definition and examples of each of the types of attack.
- Locate an example of the specific type of attack.
- Catalog as possible the impact of the attack on the business, economy, culture and/or society.
- Determine measures recommended to combat such attacks and where within the hierarchy of the network or internet such protection is recommended to be executed.
- Provide a clear, complete source for all resources used during the project.
- Prepare a presentation of your findings. You may create a video, powerpoint, prezi or TED Talk.
In the Cybersecurity section of your webpage, add an overall summary and content from your notes and activities. Include links to articles and videos that you found informative. Post your article summary and your partner-research presentation.