Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks take down servers by distracting them with meaningless traffic until they grind to a halt. Scientology, Westboro Baptist Church, and other controversial organizations have been hit by this form of attack. This video discusses how the way we talk about the results of a software program -- words like "attack" -- reflects how we view the online world.
Not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White Hats, who hunt for bugs, close security holes, and perform security evaluations for companies. And there are a lot of different motivations for hackers.
The lesson elements in this module teach students about the privacy principle “Information about you on the Internet will be used by somebody in their interest — including against you”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/information-is-valuable/.
Summary of Learning Objectives: Students can give examples of how their data may be used to benefit others; students can investigate and evaluate how different online services use data, in order to make informed choices.
Target Age: High school, college undergraduate.
Unencrypted communication over the Internet works a lot like sending a postcard: it can be read by anybody along the delivery route. Communication is routed through intermediary computers and systems, which are connected to many more computers and systems. Encryption, or encoding information so it appears scrambled to anyone who doesn’t know the key, is a way to wrap a postcard in an envelope. While it can never be 100% secure, stronger encryption makes it harder for people to get to the contents.
The lesson elements in this module teach students about the privacy principle “Communication over a network, unless strongly encrypted, is never just between two parties”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/someone-could-listen/.
Summary of Learning Objectives: Students can articulate how the multi-step, multi-party pathways of networked communication affect users’ privacy; students can identify and use more secure communication options.
Learning Objectives:
Any time you interact online, that information is recorded in the network. And, as with in-person communication, once you’ve shared something, you can’t control what happens to it — or how people will interpret it. Other people can repost or forward content to any audience without your permission, websites can sell information to other businesses, and data can be legally subpoenaed. Websites and search engines automatically pick up and duplicate content, making it impossible to “unshare” — the Internet never forgets!
The lesson elements in this module teach students about the privacy principle “Sharing information over a network means you give up control over that information — forever”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/sharing-releases-control/.
Summary of Learning Objectives: Students can enumerate ways their information may be recorded, re-shared, and reinterpreted once it is online; students can use privacy settings and imaginative self-inquiry to limit potentially harmful sharing.
Creating an identity on the Internet or impersonating somebody else is often just a matter of a few clicks. Currently, there is no foolproof way to match a real person with their online identity. This means that you can never be sure with whom you are communicating and that someone could steal your online identity and impersonate you!
The lesson elements in this module teach students about the privacy principle: “Identity is not guaranteed on the Internet”. They are designed to be independent and flexible, so you can incorporate them into any size lesson plan. Student resources are available at https://teachingprivacy.org/identity-isnt-guaranteed/.
Summary of Learning Objectives: Students can explain why it is difficult to be sure who one is communicating with online; students can investigate and evaluate the legitimacy of services that want their personal information.
Students learn about various types of cybercrimes and the cybersecurity measures that can help prevent them. Then students perform a Rapid Research project investigating a particular cybercrime event with a focus on the data that was lost or stolen and the concerns that arise as a result. The Rapid Research activity features vocabulary, concepts, and skills that should help prepare them for the AP Explore PT, and also serves as a capstone for the sequence of lessons on encryption and security.
Students will be able to:- explain the characteristics of a phishing attack.- explain how a DDoS attack works.- describe how one computer virus works.- research and describe a cyber attack found in the news.- reason about the threats posed by, and methods of recourse for, various types of cyber attacks.- describe plausible storage, security, or privacy concerns for particular pieces of data.
Note: You will need to create a free account on code.org before you can view this resource.
To conclude their study of big data and cryptography, students will complete a small research project related to a dilemma presented by Big Data or Cybersecurity, in the form of a Practice Performance Task. Students will pick one of two issues to research more deeply - either an issue related to big data, or one related to cybersecurity. Students will need to identify appropriate online resources to learn about the functionality, context, and impact of the technological innovation that gave rise to the dilemma they are investigating. After completing their research, students will present their findings both in a written summary and with an audio/visual artifact they found online. The written components students must complete are similar to those students will see in the AP Performance Tasks.
This project is an opportunity to practice many of the skills students will use when completing the Explore Performance Task on the AP® Exam at the end of the year. While an open-ended research project might be intimidating, students have built all the skills they need to complete this task.
Note: This is NOT the official AP® Performance Task that will be submitted as part of the Advanced Placement exam; it is a practice activity intended to prepare students for some portions of their individual performance at a later time.
Students will be able to:- identify reliable and authoritative sources of information about computing information.- synthesize information taken from multiple online sources to create a cohesive description of a computing innovation.- identify an artifact that clarifies an aspect of a computing topic not easily captured in writing.- explain both the beneficial and harmful effects related to a modern social dilemma in computing.