Remember - your computer pioneers project is due next Friday, October 5th, before we go to the hospital.
Begin unit 4: Basic principles of computer security, malware, privacy, and cyberwar. Essential Questions:
- How does the pervasiveness of networked computers affect our personal safety and privacy?
- How does the pervasiveness of networked computers affect our personal safety and privacy?
Homework for today is to read the following:
5 of the Worst Computer Viruses Ever
Security Dangers of Public WiFi
Students list ways to avoid getting malware on their computers.
(Second period will do PSAT pre-gridding in last 15 minutes of class)
Tuesday:
Homework for today is to read the following:
Videos:
Hacking Your Phone (60 Minutes) (13:00) sensationalized, but has some good information
Medical Identity Theft
Business Casual G-Men (link not usable from school. . . )
Wednesday:
Group 3 current events due today:
P1: Tatum, Param, Evan, Sara
P2: Jonah, Kasey, Haia, Ahani, Alexandra
Remember to enter your topic here and be sure no one else from your section is already doing it. And remember to submit it to turnitin!
Homework for today is to read the following:
Cyberwar Threat from NOVA (2015) (53:10)
Ukraine blames cyberattack for Christmas power outage (2016) (5:48)
- New Fast-Spreading Virus takes Internet by Storm(1999)
- Slammed! An inside view of the worm that crashed the Internet in 15 minutes (2003)
- The Facebook Virus Spreads: No Social Network is Safe (2008)
- What is a Drive-By Download? (2013)
- Hacker Lexicon: A Guide to Ransomware, the Scary Hack That’s on the Rise (2017)
5 of the Worst Computer Viruses Ever
Security Dangers of Public WiFi
Students list ways to avoid getting malware on their computers.
(Second period will do PSAT pre-gridding in last 15 minutes of class)
Tuesday:
Homework for today is to read the following:
- How Phishing Works (from HowStuffWorks)
- Creepster of the Week: Webcam Hijacker Gets Six Year Sentence (2011)
- Cyberthieves Silently Copy Your Passwords As You Type (2006)
- Health Insurer Anthem is Hacked, Exposing Millions of Patients' Data (2015)
- Your Apps Know Where You Were Last Night, and They're Not Keeping It Secret (2018)
- I’m terrified of my new TV: Why I’m scared to turn this thing on — and you’d be, too and this followup
Videos:
Hacking Your Phone (60 Minutes) (13:00) sensationalized, but has some good information
Medical Identity Theft
Business Casual G-Men (link not usable from school. . . )
Wednesday:
Group 3 current events due today:
P1: Tatum, Param, Evan, Sara
P2: Jonah, Kasey, Haia, Ahani, Alexandra
Remember to enter your topic here and be sure no one else from your section is already doing it. And remember to submit it to turnitin!
Homework for today is to read the following:
- How Zombie Networks Fuel Cybercrime (2004)
- The Untold Story of NotPetya, the Most Devastating Cyberattack in History (2018 - long but worthwhile, very current) (This one has a really bad word, repeated three times. I wish people wouldn't do that, because outside of that it tells an important story really well.)
- Someone Is Learning How to Take Down the Internet (2016) . (try this link if the other isn't working. . . )
- DDOS attack that disrupted internet was largest of its kind in history, experts say (2016)
- (optional) Here is an fascinating description of the Stuxnet worm: What is the most sophisticated piece of software code ever written?
Cyberwar Threat from NOVA (2015) (53:10)
Ukraine blames cyberattack for Christmas power outage (2016) (5:48)
Thursday:
Give out review sheet for test next Wednesday on analog/digital, internet technology, and computer security.
Class visit with Joe McCormick, computer security expert
Friday:
Wrap up details from computer security unit, review for test next Wednesday.
Begin unit 5: Medical Informatics
Essential Questions:
- How is computer technology used in medical research and the practice of medicine today?
- How is the use of computer technology going to change medicine in the future?
All groups working on informatics project. Each group must create a google docs presentation and share it with Mr. J. by the end of the period
Some sources to start with are at:
https://sites.google.com/a/ctemc.org/judkis/medical-informatics.