ALEX Classroom Resource

  

Hackers & Cyber Attacks: Crash Course Computer Science #32

  Classroom Resource Information  

Title:

Hackers & Cyber Attacks: Crash Course Computer Science #32

URL:

https://aptv.pbslearningmedia.org/resource/hackers-cyber-attacks-crash-course-cs/hackers-cyber-attacks-crash-course-cs/

Content Source:

PBS
Type: Audio/Video

Overview:

Not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White Hats, who hunt for bugs, close security holes, and perform security evaluations for companies. And there are a lot of different motivations for hackers.

Content Standard(s):
Digital Literacy and Computer Science
DLIT (2018)
Grade: 9-12
12) Describe how sensitive data can be affected by malware and other attacks.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • explain how malware works.
  • describe how sensitive data can be affected by malware and other attacks.
Teacher Vocabulary:
personal data, malware, cyber attacks
Knowledge:
Students know:
  • how malware works.
  • how sensitive data can be affected by malware and other attacks.
Skills:
Students are able to:
  • identify when a computer issue is potentially caused by malware.
  • remove malware from a computing device.
  • explain ways to protect computing devices from malware.
Understanding:
Students understand that:
  • malware is harmful to computing devices and personal data.
  • software exists to remove malware from computing devices.
  • software exists to protect computing devices from a malware attack.
Digital Literacy and Computer Science
DLIT (2018)
Grade: 9-12
17) Discuss the ethical ramifications of malicious hacking and its impact on society.

Examples: Dissemination of privileged information, ransomware.

Unpacked Content
Evidence Of Student Attainment:
Students will:
  • discuss malicious hacking.
  • discuss ethical ramifications of malicious hacking.
  • discuss the impacts on society of malicious hacking.
Teacher Vocabulary:
  • white hat hacking
  • black hat hacking
  • information
  • ransomware
Knowledge:
Students know:
  • that not all people use technology in a legal or ethical manner.
  • that software and processes are created to elicit personal data for negative purposes.
  • that the negative behaviors associated with technology have impacts on society.
Skills:
Students are able to:
  • identify malicious hacking.
  • discuss ethical ramifications of malicious hacking.
  • discuss the impacts on society of malicious hacking.
Understanding:
Students understand that:
  • that not all people use technology in a legal or ethical manner.
  • that software and processes are created to elicit personal data for negative purposes.
  • that the negative behaviors associated with technology have impacts on society.
Tags: cybersecurity, digital tools, ethical, hackers, hacking, internet
License Type: Custom Permission Type
See Terms: https://www.pbslearningmedia.org/help/terms-of-use/
For full descriptions of license types and a guide to usage, visit :
https://creativecommons.org/licenses
AccessibilityVideo resources: includes closed captioning or subtitles
Comments
  This resource provided by:  
Author: Stephanie Carver