Unit 10: Cybersecurity Principles

It worker suffering data loss
This activity demo would go so much better if you create an account and log in :)
Basic activities (computer-graded)

Multiple Choice Activity

Students will be able to select the best match between unit terms and their definitions.

You must sign in to try this activity.

Login to view the Listening Activity

Listening Comprehension Activity

Students will be able to listen to short audio clips in English and then spell them correctly.

You must sign in to try this activity.

Login to see the Spelling Activity

Spelling and Recognition

Students will be able to identify and spell a vocabulary term correctly given only the definition.

You must sign in to try this activity.

Advanced activities (optionally teacher-graded)
Login to see the Speaking Activity

Speaking Practice Activity

Students will be able to speak and record 5 example sentences from the unit vocabulary and then submit them for grading by the classroom teacher. If no teacher is available or desired, then the students will be shown good examples of other students' work.

US
UK
Stuxnet was a computer worm that used multiple zero-day exploits to infiltrate Iranian nuclear enrichment facilities and sabotage their centrifuges.
US
UK
As many popular Internet protocols are still vulnerable to spoofing attacks, the general rule of programming is still: "trust nothing".
US
UK
Replay attacks can be prevented by tagging login attempts with a quickly expiring session ID or token.
US
UK
Using weak passwords is a sure way to compromise your digital safety.
US
UK
The CISO was instructed to develop a plan to prevent, detect, and recover from potential attacks at all 10 of the company's data centers.

You must sign in to try this activity.