Typing.Com 10 Min (Typing.com is Due at the end of the week) Blog Post # 19 Phishing (Blogs Will be due next week) 1. What is Phishing? Explain what it is and why it's done 3-5 Sent Ex. Phishing is the process of _______. People do Phishing scams to get ________. 2. What are 3 targets of Phishing (What are the creators looking to get?) a. b. c. 3. What are two ways to avoid phishing scams? a. b. ___________________________________________________________________________________________ 4. What are homograph attacks? Explain how they are similar to phishing scams. 3-5 Sent Ex. Homograph attacks are when __________. They are similar to Phishing scams because ________. You can avoid them by_______ Google Phishing Scam Example of Phishing scam where attacks used google as a platform SHMOOP Day 2 - Internet Safety -Open a new Google Doc Answer these brainstorming questions Step 1 Students: Watch the "Passwords 101" video on YouTube and answer the following questions:
Step 2 Copy as paste these Tips and Highlight the 2 that you think are most important. You will be discussing the reasons you chose to highlight them.
Why did you choose those two? Write down the main points you and your partner discussed (2-4 Sentences) Step 3 Students, use the criteria you came up with for good and bad passwords to create a list of 5 bad (or weak) passwords, ones that are easy to guess. you can work alone or in partners. Then each student comes up with one good password that he/she keeps private. BAD 1. 2. 3. 4. 5. GOOD 1. After you are done check the Strength of your passwords on this website Password Meter Most people have really bad passwords. Most common passwords from 2018 HERE Step 4 Malware Watch Video on malware and Answer Q's 1. What is Malware and what is it used for? 2. Viruses are a type of malware. How are they spread? 3. Trojans get their name from the spartan trojan horse. What would be an example of a trojan 4. Ransomware gives you what type of message? 5. What is spyware trying to get? Why is it so successful? 6. Worms have a unique way of spreading what is it? 7. What style of computer virus do you you think is most dangerous and explain why 2-4 sent Step 5 Website protection How websites store and protect passwords Video HERE 1. Explain what hashes are and why they are used (2-4 Sent) 2. How does salt protect your Hash? What would happen if websites did not use salt? (2-4 Sent) Make sure document can be seen "by anyone with the link" -Share -More-> "Anyone with the link can view" |