LESSON MATERIALS (You CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)
Objectives
Students will be able to:
Learn that HTML with CSS(Cascading Style Sheets) and JS(JavaScript), forms a triad of cornerstone technologies for the World Wide Web.
Learn the reasons about the threats posed by, and methods of recourse for, various types of cyber attacks
Vocabulary
CSS - Cascading Style Sheets is a style sheet language used for describing the presentation of a document written in a markup language like HTML.
JavaScript - JavaScript is a scripting language used to create and control dynamic website content.
BOTNET - A botnet is a number of compromised computers used to create and send spam or viruses or flood a network with messages as a denial of service attack. The compromised computers are called zombies.
DNS SPOOFING - also referred to as DNS cache poisoning, is a type of computer attack wherein a user is forced to navigate to a fake website which looks like a real one, with the intention of diverting traffic or stealing credentials of the users.
DDoS Attack - Distributed Denial of Service - When you hear about a website being “brought down by hackers,” it generally means it has become a victim of a DDoS attack. This means that hackers have attempted to make a website or computer unavailable by flooding or crashing the website with too much traffic.
Phishing - A seemingly trustworthy entity asks for sensitive information such as: SSN, Credit card numbers, Login IDs or Passwords via e-mail.
LESSON MATERIALS (You CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)
Objectives
Students will be able to:
Learn open source software are held to an “open standard” that the software will work in the way intended and not do anything malicious.
Learn the basis of trust models.
Vocabulary
OPEN SOURCE - A type of computer software in which source code is released under a license in which the copyright holder grants users the rights to study, change, and distribute the software to anyone and for any purpose.
SSL - An SSL Certificate is a small computer file that digitally combines a cryptographic key with an organization’s details.
TRUST MODELS - The collection of rules that inform application on how to solve the legitimacy of a Digital Certificate.
LESSON MATERIALS (You CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)
Objectives
Students will be able to:
Identify abstractions used in the development of Internet protocols.
Explain how layers of protocols allow the Internet to function.
Describe how a protocol or layer of the internet acts as an "abstraction" for other layers.
Vocabulary
HTTP - HyperText Transfer Protocol - the protocol used for transmitting web pages over the Internet
IP Address - A number assigned to any item that is connected to the Internet.
TCP - Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
URL - An easy-to-remember address for calling a web page.(like www.code.org).
Packets - Small chunks of information that have been carefully formed from larger chunks of information.
TCP - Transmission Control Protocol - provides reliable, ordered, and error-checked delivery of a stream of packets on the internet. TCP is tightly linked with IP and usually seen as TCP/IP in writing.
Lesson 04 - Routers and Redundancy
LESSON MATERIALS (You CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)
Objectives
Students will be able to:
Describe the redundancy of routing between two points on the Internet.
Evaluate the benefits and security concerns associated with the use of a routed system of sending packets.
Vocabulary
Network Redundancy - having multiple backups to ensure reliability during cases of high usage or failure
Router - A type of computer that forwards data across a network
DNS - short for Domain Name System, this system translates domain names (like example.com) to IP addresses (like 93.184.216.34)
DHCP- A network management protocol used on TCP/IP networks whereby a DHCP server dynamically assigns an IP address and other network configuration parameters to each device on a network so they can communicate with other IP networks
Lesson 02 - IP ADDRESSES
LESSON MATERIALS (You CAN ACCESS ONLY VIA @BERGEN.ORG ACCOUNT)
Objectives
Students will be able to:
Define a protocol and IP ( Internet Protocol)
Explain the differences between IPv4 and IpV6 protocols.
Vocabulary
IP Address - A number assigned to any item that is connected to the Internet.
Packets - Small chunks of information that have been carefully formed from larger chunks of information.
Protocol - A set of rules governing the exchange or transmission of data between devices.
IETF - Internet Engineering Task Force - develops and promotes voluntary Internet standards and protocols, in particular the standards that comprise the Internet protocol suite (TCP/IP).
Internet - A group of computers and servers that are connected to each other.
Net Neutrality - the principle that all Internet traffic should be treated equally by Internet Service Providers.