Professional Documents
Culture Documents
Computers 2BE
Computers 2BE
Computers 2BE
SECURITY
The work consists of two parts that will have two different grades. In both cases, a presentation
must be made containing the information requested and then it must be presented in class. In total
the presentation should last about 5-7 minutes and may last up to 10 minutes.
The work is in pairs and you have until 10th of may to do it.
PART A: COMPUTERS
The available topics will be:
1)Definition of computer, hardware, software and units of measurement (bit, byte, kilobyte,...)
2)Motherboard and connections (controller cards)
3)Memory (RAM, ROM, BIOS, Cache)
4)Input peripherals (keyboard, mouse, microphone, scanner)
5)Output peripherals (printer, display, speaker)
6)Different microprocessors and types
7)History of computer science
In all groups you have to define: cybersecurity, logical security, active security and passive
security.
1. Form hijacking, watering hole attack, zero-day attack, brute force attack, man in the middle
attack, botnet, Security breach, DNS poisoning, DoS (Denial of Service Attack)
3. Grooming, Hoax, Social Engineering, Pishing, Identity Theft, Sexting, Sextorsion, Smishing,
Spamming.
6. Cybersecurity, Informed consent, access control, parental control, Data masking, virtual IP
address, Firewall, Firewall rules, Geoblocking
7. Honeypot, Data integrity, network access control, security patch, penetration testing, privacy
policy, security policy, online privacy, content removal.
8. Online reputation, Secure boot, browser security, intrusion detection system, spam filter,
tunneling, VPN,Web application firewall, AES (Advanced encryption standard)
10. DES (Data encryption standard), Encrypt and decrypt, Digital signature,Hash, https, MD5,
PIN, Password, Password cracking.
11. RSA (Rivest, Shamir, Adleman), SHA, SSH (Secure shell), SSL (Secure socket layer),
Password security, TLS (transport layer security), WPA (secure WI-FI access), Bandwidth,
DNS (Domain Name System), Hacker, Sniffer (Packet Analyzer)