Friday, September 14, 2018

Friday, September 14, 2018

Today in class, we will:

-- Do an in-class simulation of a DDoS attack and discuss. (second hour only)

-- Reread the section about social engineering in our online text and discuss. Then we will research and report on malware. Reports are due Monday before class starts and should be emailed to my email address on the white board.

Please research and report on one of these examples of malware:

Viruses/Worms
Botnets
Keyloggers
Backdoors
Trojan Horses
Time Bombs
Spyware

Please answer the following questions. Be sure to write the question number and question before each answer.

1. What is your chosen malware?
2. How does it work?
3. How does social engineering figure into its distribution? (i.e., what is misleading about its installation or use?)
4. What are some real-world examples?
5. How is it prevented and/or removed?

Grading rubric:

Typed and neatly formatted: 10 points
Each question is answered and answered correctly: 75 points total
Sources are credited and fully cited: 15 points
(i.e. from the article "Lawsuit renews focus on privacy policies for mobile apps"
By SUSAN MONTOYA BRYAN, ASSOCIATED PRESS ALBUQUERQUE, N.M. — Sep 13, 2018, 7:58 PM found at https://abcnews.go.com/Technology/wireStory/lawsuit-renews-focus-privacy-policies-mobile-apps-57811647)
* Please cite sources immediately following information given. We are not using formal MLA style, just an informal source citation, as shown, that provides the source information). 

Today's applicable Oklahoma curriculum standards:

(L1.NI.C.01 Compare physical and cybersecurity measures by evaluating trade-offs between the usability and security of a computing system.)

(L1.NI.C.04 Explain trade-offs when selecting and implementing cybersecurity recommendations from multiple perspectives such as the user, enterprise, and government. )

Semester Test Study Links

In case you didn't write down the links given in class for studying for the semester test, they are listed below: Unit 4 Test - www.te...