This section provides a brief history of computers and explains the basic principles of human-computer interaction. After finishing this section, you should be able to:
• Recall significant developments in the history of modern computing. • Identify uses of computers in today’s world. • Identify the basic functions of computers. • Describe various roles for today’s supercomputers. • Describe the basic principles of human-computer interaction.
This section defines three overlapping disciplines: Information Technology, Information Systems, and Computer Science. It then provides a detailed overview of the entire course. After finishing this section, you should be able to:
• Recall key moments in the history of information technology. • Define Information Technology, Information Systems, and Computer Science. • Describe why “systems thinking” is important in designing information systems. • Describe the main objectives of the course. • Identify new concepts and skills that you will master after completing this course. • Explain how this course will help you achieve your career goals. • Conduct online research on a career that interests you in information technology.
This section introduces various ethical issues associated with computer technology. After finishing this section, you should be able to:
• Describe ethical considerations related to evolving forms of technology, including artificial intelligence, workplace automation, personal privacy, and green computing. • Identify health and productivity issues related to technology, including ergonomics, blue light exposure, cyberloafing, and employee monitoring. • Distinguish between the legal and ethical aspects of issues such as security breaches, criminal use of data encryption, and the dark web. • Discuss the arguments for and against net neutrality.
The student will summarize the techniques used in security assessments.
Resources:
See PowerPoint presentations 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx, 1.7.3 – SIEM and SOAR.pptx and PDF document Case Study – Bug Bounty.pdf
Assignment:
Begin reading the 1.7.1 – Threat Hunting.pptx, 1.7.2 – Vulnerability Scans.pptx and 1.7.3 – SIEM and SOAR.pptx presentations.
Familiarize yourself with methods of anticipating and detecting potential threats and vulnerabilities.
Read the Case Study – Bug Bounty.pdf document and be prepared to answer the questions at the end.
Answer the Case Study questions in the Google Form provided in today’s Assignment Post in our Google Classroom.
Please do your best to complete this Case Study by the end of the class period today.
Assigned: March 7th, 2023 Teacher Pacing Due Date: March 8th, 2023