Hacking - Task 1
Click the button below to get startedHacking in the context of cyber security is:
|
Of all the reasons people hack, which do you think is the most popular reason?
Encryption- scrambling data so hackers can't read it
HTTP v HTTPS
Keeping data secure online - public key encryption explained
TASK 2 - keeping yourself safe from hackers
READ THIS TEXT FIRST.
With cyber criminals all over the internet trying to intercept user names, passwords and financial details, there needs to be a way of keeping these personal details safe. Without a secure means of transferring these details, shopping and banking online would be impossible. The solution is public key encryption. Encryption means that data is scrambled into a meaningless jumble. It can only be read, or decrypted, by someone who knows how to decrypt it. This is known as the key. The problem is how to send the key over the internet without that being intercepted by criminals as well. The video explains the solution. Websites that encrypt data have a tiny padlock in the address bar. This cannot be faked so always check before putting in any personal details. |
|
How to protect against hackersTo protect from hackers you need to have a piece of software called a firewall installed and running on your device.
A firewall works a little like parental controls. Rules are set up to allow certain websites access and deny others. Watch the video to find out more about how a firewall works. An IP address is the unique address that a device gets when it joins the internet. You can find out what your IP address is simply by Googling 'What is my IP address?' You can also find out companies IP addresses by Googling. Try looking up Tik Tok or Snapchat's IP address. |
|
If you have time, you can play this Firewall game where you act as the firewall.
Wordsearch
NOW MOVE ON TO THE MALWARE PAGE --> |
Task 3 - careers
Take the quiz and find out what animal you are and what careers might suit you.
1. Create a Word or PowerPoint document on Office 365 and share it with your teacher.
2. Record the results of the quiz - what animal are you?! What are your strengths? What career areas were suggested for you? Which famous people have the same personality type as you? Do you agree with the results?
3. Now click here to find out about the job of an ethical hacker. Find out what the main job involves, what the salary might be and what training or qualifications you need to apply. Record your findings in a Word or PowerPoint document.
4. Visit the main careers website and choose another IT-based job. Find out what the main job involves, what the salary might be and what training or qualifications you need to apply. Add your findings to your document.
5. Finally, search for any other career that you are interested in and add information about this to your document.
2. Record the results of the quiz - what animal are you?! What are your strengths? What career areas were suggested for you? Which famous people have the same personality type as you? Do you agree with the results?
3. Now click here to find out about the job of an ethical hacker. Find out what the main job involves, what the salary might be and what training or qualifications you need to apply. Record your findings in a Word or PowerPoint document.
4. Visit the main careers website and choose another IT-based job. Find out what the main job involves, what the salary might be and what training or qualifications you need to apply. Add your findings to your document.
5. Finally, search for any other career that you are interested in and add information about this to your document.
iDEA badges to do (or re-do) linked to this topic.
Data Play, Digital Ethics, Digital Careers and Digital Pathways.
Even if you have done these badges before, do them again please.