Follow along with the in-class demonstration to learn how the Caesar Cipher (also known as the Shift Cipher) works, and how you can use it to encode and decode text messages.
Follow the Instructable to learn how keywords can be incorporated with this cipher to make it more difficult to decrypt.
I have placed 8 encrypted messages around the perimeter of the room. Work together to decrypt them all! Submit a Google Doc to my Google Classroom page with the decrypted messages by the end of the day tomorrow.
Some of the decrypted messages lead to treasure! The first to decode each message gets the goods!
Remember, you may work together, but each student must submit their own original document to the Google Classroom page by tomorrow to receive credit for the lab. Don’t put more than one name on your document, and don’t submit someone else’s document as your own!
Assigned: January 21st, 2020 Due Date: January 22nd, 2020
This section introduces you to basic security concepts, including authentication, authorization, accounting, and encryption. After finishing this section, you should be able to:
Describe
the most common authentication types and when to use them.
Explain
the purpose of multifactor authentication.
Describe
various models for creating and maintaining access control lists.
Explain
why access control frameworks need to keep track of who gains access to the system.
Type 1 Authentication A type of authentication that requires the user to provide something that they know, such as a password or PIN.
Type 2 Authentication A type of authentication that requires the user to provide something that they have, such as a key, fob, electronic chip, or smart card.
Type 3 Authentication A type of authentication that requires the user to provide something that they are, such as a fingerprint, handprint, retinal pattern, face, or voice.
Multifactor Authentication Authentication that requires two or more evidences of authentication, usually of different types.
Single Sign-on A method of authenticating with one system to gain access to other related systems.
Discretionary Access Control (DAC) A type of access control where a user has complete control over a resource, and also determines the permissions other users have to those resources.
Role-based Access Control (RBAC) A type of access control that restricts access based on the user’s role in an organization.
Mandatory Access Control (MAC) A type of access control that historically was associated with multilevel security and military systems and may use a security clearance to restrict access to resources. The security manager controls the security policy, and users aren’t able to override the policy.
Accounting The process of keeping track of user activity while attached to a system.
Logging The capturing and storing of computer and user events.
Non-repudiation The ability to ensure that someone can’t deny that they performed a certain act.
Caesar Cipher An early example of encryption used by Julius Caesar to send confidential military messages.
Data at Rest Data in a persistent storage medium, such as a hard drive or optical disc.
Data in Transit Data that are being transported from one device to another, whether by radio, electrical, or light signals.
Topics Discussed:
What
are the most common and the most secure ways to authenticate a person to a
computer or a network?
How
do information systems assign access control permissions to particular users?
When
is it important to use different types of data encryption?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 4.4: Security Concepts, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.
Assigned: January 16th, 2020 Teacher Pacing Due Date: January 17th, 2020
This section introduces you to the most common threats to data confidentiality, integrity, and availability. After finishing this section, you should be able to :
Describe the most common threats to data confidentiality.
Describe the most common threats to data integrity.
Describe the most common threats to data availability.
Identify common social engineering techniques used by hackers to gain access to online data.
Evaluate email messages to determine if they represent a possible social engineering attack
Snooping Attempting to secretively discover private information about a person, company, or other entity.
Wiretapping A form of eavesdropping that uses programs such as packet sniffers to capture data being transmitted over a network.
Social Engineering The use of deception to gain personal and/or private information for unlawful purposes.
Reconnaissance The passive gathering of information about a potential victim.
Pretexting Tricking a victim into revealing sensitive information under false pretenses.
Email Attack Exploiting a victim using email messages.
Browser Attack Convincing a victim that they are performing a legitimate task within their web browser window when, in fact, they are being tricked into revealing sensitive information or installing malware on their computer.
Man-in-the-Middle Attack An attack where the attacker secretly relays and possibly alters the communications between two parties who believe they are directly communicating with each other.
Replay Attack An attempt to connect to a server by capturing and resending authentication information.
Impersonation TCP session hacking and other methods where an attacker takes over the communication to a server by appearing to be the victim.
Denial of Service An attack that attempts to overload a system so that the services it provides are no longer available to legitimate network clients.
Topics Discussed:
How
can businesses and individuals protect confidential information?
What
are some of the most common ways hackers gain unauthorized access to online
data?
What
are the biggest threats to business data availability?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 4.3: Threats to Data, and achieve a score of 80% or higher on the 15 question Exam to complete the Section.
Assigned: January 14th, 2020 Teacher Pacing Due Date: January 15th, 2020
This section introduces you to data and information assets, intellectual property laws, and digital privacy. After finishing this section, you should be able to:
Describe the relationship between data and information assets.
Identify the basic steps in the data analytics process.
Describe the implications of copyright and intellectual property laws for Internet use.
Explain how much privacy you can expect when using the Internet for social networking, file sharing, and financial transactions.
Explain how much privacy you can expect when using computers at work.
Data Analytics The process of turning data points into useful information.
Copyright Protections granted by the federal government to creators, writers, and inventors regarding rights to reproduce, display, make derivatives of, sell, rent, or lend a work.
Intellectual Property Anything that is owned by a copyright holder.
Piracy The crime of using someone else’s intellectual property in a way that should be reserved for the copyright holder.
Fair Use An exception to copyright law that allows short excerpts of a copyrighted work to be used for purposes that benefit the public.
Public Domain Works whose copyrights have expired and are free for anyone to reproduce, display, and make derivatives.
Proprietary Software Any software where the publisher retains intellectual property rights to the source code.
Open-source Software Software where anyone can inspect, enhance, and modify the source code.
Patent A license given by a government that provides inventors a temporary monopoly on their invention.
Trademark Any word, picture, or symbol that’s used to distinguish a good from other similar goods.
Privacy Expectation A reasonable belief that personal information collected by an information system is controlled and protected, not shared or used beyond its original intent.
Topics Discussed:
How do businesses use data to make informed decisions and to use their resources more efficiently?
How can I protect my intellectual property? How can I protect the intellectual property of others?
How much privacy do you personally expect when using the Internet?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 4.2: Data, and achieve a score of 80% or higher on the 10 question Exam to complete the Section.
Assigned: January 8th, 2020 Teacher Pacing Due Date: January 9th, 2020
Information System A combination of technology, people, and procedures used to organize, analyze, and store data.
Information System Types The various forms of information systems including transaction processing, management, and expert systems.
Systems Analysis and Design The study and design of a system, accomplished by examining its components and their interactions.
System Development Life Cycle (SDLC) A methodology or framework that defines steps and tasks for developing and maintaining information systems.
Waterfall Model A development model that breaks down project activities into a series of sequential or linear phases, each phase depending on the deliverables from the previous phase.
Iterative Design A development model that involves designing, implementing, and testing smaller pieces of the overall project, then cycling back and doing more analysis and design.
Planning Phase The SDLC phase that involves gathering information about the technology and software needs of an organization, deciding which options are most feasible, and setting timelines and deliverables for the entire project.
Analysis Phase The SDLC phase that involves studying existing information systems that are already in place and the requirements for new information systems.
Design Phase The SDLC phase that involves reviewing the system requirements document from the analysis phase and producing detailed specifications that cover all aspects of the system.
Implementation Phase The SDLC phase that involves purchasing and installing new hardware and software, integrating the various system components, and testing the operation of the new system.
Maintenance Phase The SDLC phase that involves monitoring and evaluating the new information system.
Project Management The practice of initiating, planning, executing, controlling, and closing the work of a team to achieve specific goals and meet specific success criteria at the specified time.
Systems Integration An activity that involves integrating various computing systems and software applications to function together as a whole.
Agile Methodologies A project management process that divides a large or complex project into smaller, more manageable projects that can be completed as part of an incremental or iterative process.
Needs Assessment A systematic process for determining and addressing needs, or “gaps” between current conditions, and desired conditions, or “wants”.
Risk Management The identification, evaluation, and prioritization of risks followed by activities that minimize, monitor, and control the impact of the risk.
Topics Discussed:
How do technology, people, and procedures work together in an information system?
What are some principles of effective systems analysis and design?
What role does project management play in the design and implementation of information systems
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 4.1: Information Systems, and achieve a score of 80% or higher on the 8 question Exam to complete the Section.
Assigned: January 6th, 2020 Teacher Pacing Due Date: January 8th, 2020
Students will demonstrate their understanding of hardware and software basics by completing a summative quiz so that they can assess and measure the progress that they have made.
Click the Testout Courseware link, log in and look for the “NetOp 1H Final Exam 2019” test.
The exam consists of 132 multiple choice questions.
Before starting the quiz, please put away all notes, study guides and other materials.
Please close all other documents and webpages and do not open any new tabs or windows until after you have submitted the quiz.
Please remain silent until everyone has completed the quiz.
You have seventy-seven minutes to complete the test. Be sure to submit your test answers before the end of the class period today, and be forewarned that the test will auto-submit itself at the end of the class period, so work quickly!
Congratulations on completing the first half of Networking and Operating Systems! I’ll see you in 2019 with TestOut Section 4, and a completely new set of projects focused on the fundamentals of networking and cybersecurity!
Have the Merriest of Christmases, the Happiest of New Years’, the Happiest of Hanukkahs, the most Peaceful of Kwanzaas, or just a restful two week break – whatever you may celebrate, enjoy it to the fullest!
Assigned: December 18th, 2019 Due Date: December 18th, 2019
Assembly Language A human-readable, low-level computer language that is a symbolic representation of binary machine language.
Compiled Language A computer programming language, such as C and C++, that uses a software tool called a compiler to translate the code into binary machine language.
Interpreted Language A computer programming language, such as Python, JavaScript, and Ruby, that requires a program called an interpreter to execute the instructions written in the source code each time the application is run.
Runtime Engine A special interpreter that translates bytecode into computer specific machine language. Bytecode is a platform independent, low-level language that is compiled from source code.
Flowchart A visual representation of the logic in a program.
Branching The logic in a program that tells the computer to execute a different part of the program rather than executing statements one-by-one, in order.
Looping The login in a program that tells the computer to repeatedly execute a sequence of instructions until a condition is reached.
Algorithm Specific, step-by-step procedures that illustrate how a problem will be solved.
Hypertext Markup Language (HTML) A markup language interpreted by web browsers.
Cascading Style Sheet (CSS) A file associated with a web page that describes how HTML elements are to be displayed.
JavaScript A programming language commonly used to create interactive effects within a web browser.
Topics Discussed:
Why
must computer programs be precise in giving instructions to the computer?
What
products and services that I use were created by programmers?
How
do popular programming languages help programmers create software for multiple
platforms?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 3.3: Introduction to Programming, and achieve a score of 80% or higher on the 14 question Exam to complete the Section.
Assigned: December 11th, 2019 Teacher Pacing Due Date: December 12th, 2019
This section introduces you to database access methods, big data, and careers in working with databases. After finishing this section, you should be able to:
Explain what SQL is and interpret a basic SQL query.
Compare and contrast different methods of accessing data from a database.
Define the term Big Data and describe its related challenges and opportunities.
Describe various careers in working with databases
Use Microsoft Access to perform basic queries on a database.
Data Definition Language (DDL) Database commands that change the structure, or schema, of the database.
Data Manipulation Language (DML) Database commands that modify the records within the database and not the schema itself.
Direct Access A method of accessing a database directly using the database management system itself.
Query Builder A method of accessing a database using a graphical user interface that allows users to select what actions they want to perform on a database.
User Interface Access A method of accessing a database using forms that allow users to interact with the database.
Programmatic Access A method of accessing a database using custom computer programs.
Data Extraction The process of gathering and organizing big data.
Data Mining A broad and open-ended analysis of extracted big data.
Big Data Analytics The process of asking specific questions to help interpret big data.
NoSQL Nonrelational databases that arise from big data.
Database Administrator A person who is responsible for designing, maintaining, backing up, and securing an organization’s databases.
Database Developer A person who designs and implements databases, usually by writing SQL code and conducting performance tests to ensure database optimization.
Data Analyst A person who specializes in gathering and analyzing data to inform business decisions.
Data Scientist A person who focuses on data analysis, especially as it relates to data mining and big data analytics. These positions require even more advanced programming and analytical skills.
Topics Discussed:
How
can you access and analyze data that’s stored in a relational database?
What
kinds of questions can be answered by analyzing Big Data?
What
career opportunities are available in working with databases?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 3.2: Interfacing with Databases, and achieve a score of 80% or higher on the 10 question Exam to complete the Section.
Assigned: December 9th, 2019 Teacher Pacing Due Date: December 10th, 2019
This section introduces you to databases and gives you practice using a relational database management system. After finishing this section, you should be able to:
Describe
the purposes of a relational database.
Define
basic relational database terminology, including fields, records, primary keys,
foreign keys, and one-to-many relationships.
Describe
the basic functions of a non-relational database.
Describe
the purpose of a database management system.
Use
Microsoft Access to explore database objects and create table relationships.
Database A structured set of data held in a computer, usually in a way that that is accessible in multiple ways.
Relational Database A database that is structured to recognize relationships between items of information.
Table A container in a relational database that is comprised of fields (columns) and records (rows).
Field A single attribute of each record in a table.
Record A single instance of an object stored in a database table.
Primary Key A field in a table that uniquely identifies a row.
Foreign Key A field in a second table that matches the primary key in another table.
Query A method of asking questions about the data stored in a database.
Form A graphical interface that allows users to query a database by filling in information on the form.
Report An easy-to-read listing of the results of a query.
Structured Query Language (SQL) A computer language used by most relational databases for creating queries.
Structured Data Data that can be divided into discrete categories.
Unstructured Data Data that doesn’t follow a clear pattern.
Semi-Structured Data Data that has some discrete categories but also other information that doesn’t follow a clear pattern.
Database Management System (DBMS) Software that allows users to define, manipulate, retrieve, and manage data stored in a database. Examples are Microsoft SQL Server, Oracle Database, MySQL, and Microsoft Access.
Topics Discussed:
What
databases do you interact with in your everyday life?
What
are the advantages to storing data in a relational database? Are there
disadvantages?
What
is the purpose of a database management system?
Assignment:
Access the TestOut Courseware through the provided link.
Study Section 3.1: Databases, and achieve a score of 80% or higher on the 14 question Exam to complete the Section.
Assigned: December 4th, 2019 Teacher Pacing Due Date: December 6th, 2019