Objectives Students will be able to explain computer science terminology related to coding, password protection, social engineering, and network security Students will be able to describe how encryption works to protect privacy Students will be able to describe recent network security breaches and how companies defend against them Students will be able to explain why the term “hacker” is extremely flexible and the variety of roles that hackers play Students will be able to analyze reports of unfolding security breaches and apply their understanding of security networks to them 1 Cyber Security Cyber 101 http://www.pbs.org/wgbh/nova/labs/lab/cy ber/1/1/ Hacking and Privacy http://www.pbs.org/wgbh/nova/labs/lab/cy ber/2/1/ Cyber Codes – http://www.pbs.org/wgbh/nova/labs/lab/cy ber/3/1/ 2 In-Lab Exercise - Cyber Security ◦ http://www.pbs.org/wgbh/nova/labs/lab/cyb er/ ◦ Click on Play Game ◦ Sign In With Google – Use the google account you created in the first lab ◦ Click on Play Game again after log in. ◦ As you advance in the activity, answer the questions in the word document provided for the activity. ◦ LEVEL 1 and 2 are part of Assignment. Level 3 is for quiz(Please look at the quiz document provided on BB). 3 You are the chief technology officer of a start-up social network company. Choose a character and a company name. Whenever we go online—to shop, chat with our friends, or do anything else—we put ourselves at risk of cybercrime. Computer viruses can corrupt our files, hackers can steal our data, and criminals can trick us into revealing sensitive information. But luckily there are simple steps we can take to protect our digital lives. 4 You will advance by using computer coding, logical reasoning, critical thinking, and vulnerability detection to solve various problems. These are the same skills employed regularly by cybersecurity professionals. However, you won’t need any prior cybersecurity or coding expertise to succeed. 5 Virus attack! If any of your employees download a computer virus, it could destroy company files, steal passwords, or email spam to the company's contacts. Basic methods to protect from Virus Attack: 1. Upgrade Antivirus Software 2. Backup Company Files 3. Phishing email Detection Training 6 Coding Challenge This challenge is an introduction to basic computer programming. Computer code is usually written in text, but in this challenge we’re using Blockly, a visual computer programming editor created by Google that uses drag-anddrop blocks that can be stacked together to create a computer program. You will program a robot to navigate a maze using Blockly drag-and-drop commands. 7 Social Engineering Challenge Scammers try to trick people into handing over sensitive information and downloading computer viruses from emails. In this challenge, you will learn to spot scam emails, websites and phone calls. They will complete the challenge armed with practical tips that will help them avoid becoming victims of social engineering scams. 8 Network Cyber Battles By completing the challenges, you will earn resources to buy cyber defenses to protect their companies against a series of cyber attacks that reflect the types of attack that real companies and institutions often fall victim to. You will learn about a range of cyber attacks and how to effectively defend institutions from them. 9 LEVEL 1 Coding Challenge 1. Hiding Data in a virtual maze 10 Password Cracking Challenge 1. There's a mole in the company selling your precious code to your competitors. 11 12 Phishing: Trick you into giving your passwords, financial information, anything they can use to steal your identity or hack into the company's records. 13 PHISHING EMAIL 14 PHISHING WEBSITE 15 PHISHING CALLS 16 Intermediate methods to protect from a cyber Attack: 1. Encryption 2.