Cyber security

Cyptography

Cryptography

  • A x2 lesson exploration into ciphers and sending messages securely.

  • Lots of S&C and further reading

  • Finishes by introducing Quantum Apocalypse

Lesson-plan-1.pptx
Lesson-plan-2.pptx
Lesson-plan-3.pptx
Lesson-plan-4.pptx
Lesson-plan-5.pptx
Lesson-plan-6.pptx

Learners should study the following:

  • forms of attack

  • threats posed to networks:

    • malware

    • phishing

    • *people as the ‘weak point’ in secure systems (social engineering)

    • brute force attacks

    • *denial of service attacks

    • *data interception and theft

    • *the concept of SQL injection

    • poor network policy

  • identifying and preventing vulnerabilities:

    • *penetration testing

    • network forensics

    • network policies

    • anti-malware software

    • firewalls

    • *user access levels

    • passwords

    • encryption


Videos:

Demonstration of password hacking - CLICK HERE


Links: