After learning about hacking and how it compromises data security, we will learn about the next step in protecting data, by means of encryption. The very ancient and often used in technique of cryptography involves scrambling messages in such a way that only the parties within the communication or, in our case, a computer algorithm and users know how to decode them effectively.
We will first learn the basics on cryptography from the Encryption Tutorial. Another simple source is What is Cryptography? at WiseGeek.
Subsequently, we will try our skills at decrypting through the CRYPTOCOM Game.
Wednesday, June 23, 2010
Friday, June 18, 2010
Presentation on hacking
In pairs, create a PowerPoint presentation that discusses one of the following issues:
- When can hacking be considered ethical, if ever?
- In the movie, there is a statement that says: “The hackers were the heroes of a Computer era that they created but that outlawed them”
- Should a hacker go to jail? Under what circumstances?
Use supporting references (web sites) and complete the presentation by the end of today. Submit it to itgs.sass@gmail.com before the end of today's lesson.
- When can hacking be considered ethical, if ever?
- In the movie, there is a statement that says: “The hackers were the heroes of a Computer era that they created but that outlawed them”
- Should a hacker go to jail? Under what circumstances?
Use supporting references (web sites) and complete the presentation by the end of today. Submit it to itgs.sass@gmail.com before the end of today's lesson.
Subscribe to:
Comments (Atom)