Computers 2BE

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

COMPUTERS AND COMPUTER

SECURITY

The work consists of two parts that will have two different grades. In both cases, a presentation
must be made containing the information requested and then it must be presented in class. In total
the presentation should last about 5-7 minutes and may last up to 10 minutes.

The work is in pairs and you have until 10th of may to do it.

PART A: COMPUTERS
The available topics will be:

1)Definition of computer, hardware, software and units of measurement (bit, byte, kilobyte,...)
2)Motherboard and connections (controller cards)
3)Memory (RAM, ROM, BIOS, Cache)
4)Input peripherals (keyboard, mouse, microphone, scanner)
5)Output peripherals (printer, display, speaker)
6)Different microprocessors and types
7)History of computer science

PART B: COMPUTER SECURITY

In all groups you have to define: cybersecurity, logical security, active security and passive
security.

1. Form hijacking, watering hole attack, zero-day attack, brute force attack, man in the middle
attack, botnet, Security breach, DNS poisoning, DoS (Denial of Service Attack)

2. Data Leaking, Hijacking, Malvertising, Password spray,Pharming, Vulnerability, Catfishing,


Cyberbullying

3. Grooming, Hoax, Social Engineering, Pishing, Identity Theft, Sexting, Sextorsion, Smishing,
Spamming.

4. Spoofing (web), Spoofing (email), Stalking, Typosquatting, Vishing, Whaling, Adware,


Exploit, Computer worm
5. Keyloger, Malware, Ransomware, Rotkit, Trojan, Computer virus,Digital forensics, Antivirus.
Backup,

6. Cybersecurity, Informed consent, access control, parental control, Data masking, virtual IP
address, Firewall, Firewall rules, Geoblocking

7. Honeypot, Data integrity, network access control, security patch, penetration testing, privacy
policy, security policy, online privacy, content removal.

8. Online reputation, Secure boot, browser security, intrusion detection system, spam filter,
tunneling, VPN,Web application firewall, AES (Advanced encryption standard)

9. Authentication, Biometric authentication, Two-factor authentication (2FA), Certificate


authority, Captcha, Digital certificate, email encryption, end-to-end encryption, cryptography,

10. DES (Data encryption standard), Encrypt and decrypt, Digital signature,Hash, https, MD5,
PIN, Password, Password cracking.

11. RSA (Rivest, Shamir, Adleman), SHA, SSH (Secure shell), SSL (Secure socket layer),
Password security, TLS (transport layer security), WPA (secure WI-FI access), Bandwidth,
DNS (Domain Name System), Hacker, Sniffer (Packet Analyzer)

You might also like