Day 1: Tuesday, August 30
Enigma Machine What was it's flaw?
Assignment: Find an article from WWII to today about military cryptography issues, methods, concerns and/or programs. Make sure you find a reputable source - peer-reviewed or via CARS. Use the Impact Research Summary sheet to document and summarize your reading. In the citation space, provide an APA Citation, along with a notation of reputability. Due Thursday at the beginning of class.
Tuesday TOTD: Using a Ceasar's Cypher, encrypt a message to any key of your choice on an index card. On a second card, write it's solution and key. Make sure your name is on both index cards.
Tuesday TOTD: Using a Ceasar's Cypher, encrypt a message to any key of your choice on an index card. On a second card, write it's solution and key. Make sure your name is on both index cards.
Day 2: Wednesday, Aug 31
How fast can you decode?
In your Abstraction Notebook, date and title the next available page as "Research Notes, Cybersecurity."
Using the resources above and below:
Using the resources above and below:
- Draw a diagram of Alice, Bob and Eve -- label each as to their analogy to enryption
- Explain what is mean by the "key" of an encryption algorithm
- Explain what a "back door" is and how/when used or exploited.
- Explain biometrics and provide two examples of use.
- Explain components of strong passwords; provide samples of weak, medium and strong passwords.
- Define the word "credentials" as related to computer security.
- Define and diagram HTTPS, public key, private key from the slide on the Carnegie Mellon video.
- Create a Venn Diagram comparing Worms/Virus & Trojan Horse.
Day 3: Thursday Sept 1
With your partner, complete the following for your assigned topic:
- Locate, analyze and record the definition and examples of each of the types of attack.
- Locate an example of the specific type of attack.
- Catalog as possible the impact of the attack on the business, economy, culture and/or society.
- Determine measures recommended to combat such attacks and where within the hierarchy of the network or internet such protection is recommended to be executed.
- Provide a clear, complete source for all resources used during the project.
- Prepare a presentation of your findings. You may create a video, powerpoint, prezi or TED Talk.
Day 4: Friday, Sept 2
Finish up your work with your partner to present next Tuesday. In addition, make sure your HTML Project 1 is complete and submitted in Google Classroom. Finally, make sure your working website is ready to be submitted and linked on Tuesday.
In the Cybersecurity section of your webpage, add an overall summary and content from your notes and activities. Include links to articles and videos that you found informative. Post your article summary and your partner-research presentation.
In the Cybersecurity section of your webpage, add an overall summary and content from your notes and activities. Include links to articles and videos that you found informative. Post your article summary and your partner-research presentation.