You will be able to identify how simple encryption works
You will be able to identify what makes a good password
You will be able to identify at least two different methods of confirming identity
Review: Different Biometrics methods of confirming identity. (voice, finger print, DNA, Eye)
Review: Encryption Methods
Watch: The Cyber attacks has identified
Watch: The Spoof on Biometric methods of confirming identity from Monsters vs Aliens
Be sure to include the Validation Icon & Link on your page!!
Encrypted messages keeps a nations secrets especially in war
American Code Talkers
Richard Clark & I agree on CyberSecurity
Funny Video on Hacking in the 90s
US Government Cyber Crime info
Advice for Password Security from the BBC
The Best computer security you can have is common sense!
Protect your password (20 worst passwords plus don't give your password to anyone),
use a firewall on your network, update your Computers's Operating System with the latest patches and use virus protection plus update your software regularly!
Hold your data in encrypted storage!
Encryption Methods: Cryptography, Public Key Encryption
Report attacks and check for the latest attempts on computer systems
CERT® Coordination Center Carnegie Mellon University's Computer Emergency Response Team
CSRC Computer Security Resource Center
Find Good Charities to make sure your idenity is not stolen
Have someone else in the class review your website using our notes on Good Web design
Biometrics: Using characteristics of your body (voice, finger print, DNA, Eye) for authentication.
Reminder: Post your articles on Canvas under the Weekly Articles on the Discussion Board Section.