Is a DOS Attack a Weapon?

Learning Resource Type

Classroom Resource

Subject Area

Digital Literacy and Computer Science

Grade(s)

9, 10, 11, 12

Overview

Denial of Service (DOS) and Distributed Denial of Service (DDOS) attacks take down servers by distracting them with meaningless traffic until they grind to a halt. Scientology, Westboro Baptist Church, and other controversial organizations have been hit by this form of attack. This video discusses how the way we talk about the results of a software program -- words like "attack" -- reflects how we view the online world.

Digital Literacy and Computer Science (2018) Grade(s): 09-12

DLCS18.HS.12

Describe how sensitive data can be affected by malware and other attacks.

UP:DLCS18.HS.12

Vocabulary

personal data, malware, cyber attacks

Knowledge

Students know:
  • how malware works.
  • how sensitive data can be affected by malware and other attacks.

Skills

Students are able to:
  • identify when a computer issue is potentially caused by malware.
  • remove malware from a computing device.
  • explain ways to protect computing devices from malware.

Understanding

Students understand that:
  • malware is harmful to computing devices and personal data.
  • software exists to remove malware from computing devices.
  • software exists to protect computing devices from a malware attack.
Digital Literacy and Computer Science (2018) Grade(s): 09-12

DLCS18.HS.33

Evaluate the scalability and reliability of networks by describing the relationship between routers, switches, servers, topology, packets, or addressing, as well as the issues that impact network functionality.

UP:DLCS18.HS.33

Vocabulary

  • scalability
  • reliability
  • bandwidth
  • load
  • delay
  • fault tolerance
  • redundancy
  • latency
a.
  • domain name
  • Domain Name System (DNS) server
  • IP address
  • DNS name resolution
b.
  • networking protocols
  • layers
  • packets

Knowledge

Students know:
  • how routers, switches, servers, network topology, packets, and IP addressing affect scalability and reliability of networks.
  • how to describe the issues that impact network functionality.
a.
  • that the DNS server function is to turn a user
  • friendly domain name into an IP address that machines use to identify each other on a network.
  • that the DNS server manages a database that maps domain names to IP addresses.
  • the typical format of an IP address.
  • computers communicate the IP address in binary form.
b.
  • that networking protocols are formal standards and policies that include procedures, formats and rules the define how two or more devices will communicate over a network.
  • there are several broad types of networking protocols including network communication protocols such as TCP/IP and HTTP, networking security protocols such as HTTPS and SSL, and network management protocols such as SNMP and ICMP.

Skills

Students are able to:
  • describe the relationships of routers, switches, servers, network topology, packets, and IP addressing.
  • describe scalability and reliability of networks.
  • describe issues that impact network functionality.
a.
  • explain the purpose of IP addresses.
  • identify what a typical IP address look like.
  • explain the difference between IP addresses expressed in decimal format and binary format.
  • explain how domain names are resolved to IP addresses through a DNS server.
b.
  • explain the significance of networking protocols.
  • provide examples of common networking protocols.
  • explain the uses of different networking protocols.

Understanding

Students understand that:
  • scalability and reliability of networks are dependent on relationships between routers, switches, servers, network topology, packets, and IP addressing, etc.
  • network functionality is impacted by bandwidth, load, delay, latency, firewalls, server capacity, etc.
a.
  • an Internet Protocol address is a unique identifying number for every machine on the internet.
  • the DNS server manages a massive database that maps user
  • friendly domain names to an IP address.
b.
  • networking protocols are needed to define rules for communication between network devices.
  • networking protocols include Internet protocols (IP, TCP, HTTP, FTP, SMTP, etc.), wireless network protocols (Wi-Fi, Bluetooth, LTE), and network routing protocols (OSPF, BGP, etc.).
  • networking security protocols, such as HTTPS and SSL, provide security over network communications.
  • network management protocols, such as SNMP and ICMP, provide network governance and maintenance.

CR Resource Type

Audio/Video

Resource Provider

PBS

License Type

Custom

Accessibility

Video resources: includes closed captioning or subtitles
ALSDE LOGO