Download as pdf or txt
Download as pdf or txt
You are on page 1of 1

  

AulaVirtual

DEP. TECNOL… / Unit 7. Security and safe use of the…

Digitalisation (4º ESO, some people


from C, E, F, G, H)

Curso Participantes Más 

General

IES NEIL ARMSTRONG

4º ESO
 

Avisos

◀UNIT 6. Image Edition

Unit 7. Security and safe use of the


Internet

Para romper el hielo: "The Cyberbully"

 Hecho: Ver  Hecho: Hacer un envío

Cierre: viernes, 5 de abril de 2024, 09:06

We are going to watch this film and, later o


questions and debate about the ideas

The Cyberbully 2015 (Subtitulado es

Ver en

1. Tell me your general opinion about the


not? Just tell me the reasons for your a
2. Tell me what you think you have learnt
3. Explain to me if you would recommend
people your age that has not been able
tell the reasons).
4. Tell me what ways Casey could have us
situation.
5. Tell me another ending (not the one in
liked or found suitable for the film.
6. Tell me which one you think is a critica
moment where, if Casey had acted a d
would have changed a lot in the plot.
This is an INDIVIDUAL task. You must make SENTENCES and
correct way.

INFORMATION SECURITY GLOSSARY

 Hecho: Ver Por hacer: Crear entradas: 1

We are going to learn about this part


of the subject by creating a glossary
about some of the most important
terms in informatics security.

You have to define the terms you are


assigned by using from 8 to 20 text
lines and you should also include one
image that helps understanding and
makes explanation more visual. Also,
using examples of typical usage or
the concepts is needed. You can also
add or link some other webpage
where you can get more information
or a video. It is key that include
references for the information found!
It is also important that you express
the concepts using your own words.

You will need to define those


concepts:

Manal, Yosra, Ana Inés,


Carolina: active security, license
agreement (EULA), malware,
cracker (keygen program),
zombie, digital footprint, man-
in-the-middle attack
Laura, Laura, Ariadna, Paula y
Carmen: passive security,
botnet, internet worm, hacker,
virus, digital certificate, proxy
Guillermo, Miguel, Víctor y
Héctor: adware, backup, troya,
ransomware, sniffer, privacity,
keylogger
Moha, Mathias, Alejandro:
dictionary attack, Nigerian
letters, pharming,
autentification, flooding, P2P
programs, double factor
authentification
Carla, Sheila, María, Alexander:
antivirus, logic bomb, HTTPS
(versus HTTP), security
patches, blacklist, phishing,
spam/junk mail
Elena C, Ariana, Emma,
Alejandra: backdoor, cookies,
firewall, lamer, NAS system,
vulnerability
Álvaro, África, Leire: brute
force attack, conduct code,
spoofing, in-depth security, hash
function, white/black hacking
Nicole, Natalia, Denis:
biometrics, HOAX, electronic
signature, honeypot, keylogger,
UPS powering systems
José, Hugo, Bryan: bug, cloud
computing, service denial,
spyware, identity fraud, hijack

For you to have a model, I will myself


add and define information security,
so you can check it up.

I will set a deadline when we see the


pace of completion, but we will likely
use 4 full sessions. Marks will be
shown in another activity.

Marks for Glossary activity

Both marks and comments for the


glossary activity will be included
here.

Expositions about safe use of the


Internet and security

Por hacer: Ver Por hacer: Hacer un envío

Cierre: lunes, 20 de mayo de 2024, 09:15

Those are the groups, along with the


topic and the order for the
exposition. All the presentations (pdf
format) is delivered the same
day (May, 20th), even if you will have
your exposition much later.
Expositions will be started on that
same day (May, 20th) and will turn
into one individual mark for every
person.

1. Nicole+Natalia+Denis (Privacity
safeguarding, also in apps)
2. Moha+Mathias (Dangerous
communities: Llados and so)
3. María+Sheila+Carla (Hacking and
hackers: history and types)
4. Álvaro+África+Leire (Excessive
use of Social networks)
5. Inés+Yosra+Manal+Carolina
(Grooming)
6. Alexander
7. Elenas+Emma+Alejandra
(Antivirus systems: practical
approach)
8. Víctor+Héctor (parental control)
9. Guillermo+Miguel (Most common
malicious apps and programs)
10. Bryan+Hugo+José ()
11. Lauras+Paula+Ariadna+Carmen
(Fake News: how to identify
them)

◀UNIT
Ir a...
6.
Image
Edition

EducaMadrid
Consejería de Educación, Ciencia y Universidades
Ayuda

Reiniciar tour de usuario

You might also like