Friday, April 20th
Rally Schedule

 


News presentations by Anthony and Joseph.

Review Homework

Hacking Crimes - you decide - add a last page that shows the actual sentence if you can find it.

Top 10 Cyber Security Predictions for 2017 - include this as part of your presentation

Begin Presentations

How to NOT get Hacked

The Worst Case Hack Attack

Everyday Cybercrime and what you can do about it


 

Homework


Continue your review for the IB exam - three weeks away - use the IB Guide as your check off list.
Reveiw pages 96-99 in Gray - be sure you can identify the different types of malware and how they work.

 

What

3.4 Networks
Internet threats and security • Internet security: for example, firewall, proxy server, SSL (secure sockets layer), encryption, public and private keys, digital signatures • Internet threats: for example, global viruses, hackers, spam, phishing, pharming, spyware, adware

 

Why

Databases lie at the heart of most IT systems whether in businesses, organizations or other institutions.

 

How

By completing the DB questions