Section 3.10

Unauthorized Access to Computing Resources

Learning Goals

IOC-2.C.1: Phishing is a technique that attempts to trick a user into providing personal information. That personal information can then be used to access sensitive online resources, such as bank accounts and emails. 

IOC-2.C.2: Keylogging is the use of a program to record every keystroke made by a computer user in order to gain fraudulent access to passwords and other confidential information. 

IOC-2.C.3: Data sent over public networks can be intercepted, analyzed, and modified. One way that this can happen is through a rogue access point. 

IOC-2.C.4: A rogue access point is a wireless access point that gives unauthorized access to secure networks. 

IOC-2.C.5: A malicious link can be disguised on a web page or in an email message. 

IOC-2.C.6: Unsolicited emails, attachments, links, and forms in emails can be used to compromise the security of a computing system. These can come from unknown senders or from known senders whose security has been compromised. 


Objectives and General Description

In the previous lessons, students learned how they can protect their data.  In this lesson students will learn about outside threats to their data through unauthorized access to their computing resources.  Students will research real life examples of various security threats and will evaluate the impact of each of these examples.  Students will be working with a partner and will be randomly assigned a topic.  Each set of partners will define the threat, find a real life example and create a presentation for the class. During the presentation, all students will take notes so that each student ultimately has a research guide on each topic.


Activities

Activity 3.10.1 (flipped activity, Budget 7 minutes in class)


Activity 3.10.2 (budget 2 hours)