Homework for today is to read the following:
- How Phishing Works (from HowStuffWorks)
- Creepster of the Week: Webcam Hijacker Gets Six Year Sentence (2011)
- What is a keylogger?
- Health Insurer Anthem is Hacked, Exposing Millions of Patients' Data (2015)
- Your Apps Know Where You Were Last Night, and They're Not Keeping It Secret (2018)
- Your TV is spying on everything you watch
- Hacking Your Phone (60 Minutes) (13:00) sensationalized, but has some good information
- Medical Identity Theft
- Business Casual G-Men (link not usable from school. . . )
Tuesday:
Homework for today is to read the following:
Homework for today is to read the following:
- How Zombie Networks Fuel Cybercrime (2004)
- The Untold Story of NotPetya, the Most Devastating Cyberattack in History (2018 - long but worthwhile) (This one has a really bad word, repeated three times. I wish people wouldn't do that, because outside of that it tells an important story really well.)
- Someone Is Learning How to Take Down the Internet (2016) . (try this link if the other isn't working. . . )
- DDOS attack that disrupted internet was largest of its kind in history, experts say (2016) (Pay attention -- what business is Dyn in?)
There may be a surprise quiz about these articles, you really should read them.
If wired.com says that you have read all your articles for this month, try again with your browser in incognito mode, or try a different browser.
(optional) Here is an fascinating description of the Stuxnet worm: What is the most sophisticated piece of software code ever written?
Videos (in class):
Videos (in class):
- Stuxnet: Computer worm opens new era of warfare (2012) (14:54)
- Ukraine blames cyberattack for Christmas power outage (2016) (5:48)
- Cyberwar Threat from NOVA (netflix link here) (2015) (53:10) (link not working as of 9/25/19)
Wednesday:
Group 3 current events due today:
P1: Sehar, Justin, Mackenzie, Olivia, Adarsh
P2: Krishi, Sarah, Sofia, Eric
Remember to enter your topic here and be sure no one else from your section is already doing it.
P1: Sehar, Justin, Mackenzie, Olivia, Adarsh
P2: Krishi, Sarah, Sofia, Eric
Remember to enter your topic here and be sure no one else from your section is already doing it.
Wrap up any remaining issues on computer security.
Give out review sheet for test next Tuesday on analog/digital, internet technology, and computer security.
Begin Unit 5: Medical Informatics
Essential Questions:
- How is computer technology used in medical research and the practice of medicine today?
- How is the use of computer technology going to change medicine in the future?
Begin Medical Informatics project. Each team must create a Google Slides presentation and share it with me before the end of the period.
Thursday:
JSUMC orientation
Friday:
Review for test next Tuesday
Everyone working on informatics projects