Wednesday, June 23, 2010

Data Security and Encryption

After learning about hacking and how it compromises data security, we will learn about the next step in protecting data, by means of encryption. The very ancient and often used in technique of cryptography involves scrambling messages in such a way that only the parties within the communication or, in our case, a computer algorithm and users know how to decode them effectively.
We will first learn the basics on cryptography from the Encryption Tutorial. Another simple source is What is Cryptography? at WiseGeek.
Subsequently, we will try our skills at decrypting through the CRYPTOCOM Game.

Friday, June 18, 2010

Presentation on hacking

In pairs, create a PowerPoint presentation that discusses one of the following issues:

- When can hacking be considered ethical, if ever?
- In the movie, there is a statement that says: “The hackers were the heroes of a Computer era that they created but that outlawed them”
- Should a hacker go to jail? Under what circumstances?

Use supporting references (web sites) and complete the presentation by the end of today. Submit it to itgs.sass@gmail.com before the end of today's lesson.