January 6-7th

posted Jan 6, 2020, 7:44 AM by Mike Costello   [ updated Jan 7, 2020, 9:55 AM ]
Typing.Com 10 Min (Typing.com is Due at the end of the week)


Blog Post # 19 Phishing (Blogs Will be due next week)

1. What is Phishing? Explain what it is and why it's done 3-5 Sent
    Ex. Phishing is the process of _______.  People do Phishing scams to get ________.


2. What are 3 targets of Phishing (What are the creators looking to get?)
     a.
     b.
     c.

3. What are two ways to avoid phishing scams?
     a.
     b.
___________________________________________________________________________________________

4. What are homograph attacks? Explain how they are similar to phishing scams. 3-5 Sent
    Ex. Homograph attacks are when __________.  They are similar to Phishing scams because  ________.  You can avoid them by_______ 

Google Phishing Scam Example of Phishing scam where attacks used google as a platform


SHMOOP Day 2 - Internet Safety
-Open a new Google Doc

Answer these brainstorming questions
Step 1 
Students: Watch the "Passwords 101" video on YouTube and answer the following questions:
  1. What are some examples of bad passwords? Are any of your personal passwords weak like these?
  2. Why are these passwords unsafe? Why are they easy to hack? 
  3. Do you think any of your personal passwords are strong?
Step 2 
Copy as paste these Tips and Highlight the 2 that you think are most important.
You will be discussing the reasons you chose to highlight them.
  • Don't ever write down your password.
  • Never ever text or email your password, since then anyone who breaks into your phone or laptop can steal your password.
  • Don't tell anyone your password. 
  • Variety is the spice of life: don't use the same password for everything
  • Don't let public computers remember your passwords or usernames. (We're not suggesting your local librarian is an identity thief, but you have to be careful.)
Why did you choose those two?
Write down the main points you and your partner discussed (2-4 Sentences)


Step 3 

Students, use the criteria you came up with for good and bad passwords to create a list of 5 bad (or weak) passwords, ones that are easy to guess. you can work alone or in partners. Then each student comes up with one good password that he/she keeps private. 

BAD

1.

2.

3.

4.

5.

GOOD

1. 

After you are done check the Strength of your passwords on this website Password Meter 

Most people have really bad passwords.  Most common passwords from 2018 HERE



Step 4
Malware

Watch Video on malware and Answer Q's

1. What is Malware and what is it used for?

2. Viruses are a type of malware.  How are they spread?

3. Trojans get their name from the spartan trojan horse.  What would be an example of a trojan 

4. Ransomware gives you what type of message?

5. What is spyware trying to get? Why is it so successful?

6. Worms have a unique way of spreading what is it?

7. What style of computer virus do you you think is most dangerous and explain why 2-4 sent

Step 5
Website protection
How websites store and protect passwords Video HERE

1. Explain what hashes are and why they are used (2-4 Sent)

2. How does salt protect your Hash? What would happen if websites did not use salt? (2-4 Sent)


Make sure document can be seen "by anyone with the link"
-Share
-More-> "Anyone with the link can view"
Comments