Learning Resource Type

Classroom Resource

Hackers & Cyber Attacks: Crash Course Computer Science #32

Subject Area

Digital Literacy and Computer Science

Grade(s)

9, 10, 11, 12

Overview

Not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White Hats, who hunt for bugs, close security holes, and perform security evaluations for companies. And there are a lot of different motivations for hackers.

    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.12

    Describe how sensitive data can be affected by malware and other attacks.

    Unpacked Content

    UP:DLCS18.HS.12

    Vocabulary

    personal data, malware, cyber attacks

    Knowledge

    Students know:
    • how malware works.
    • how sensitive data can be affected by malware and other attacks.

    Skills

    Students are able to:
    • identify when a computer issue is potentially caused by malware.
    • remove malware from a computing device.
    • explain ways to protect computing devices from malware.

    Understanding

    Students understand that:
    • malware is harmful to computing devices and personal data.
    • software exists to remove malware from computing devices.
    • software exists to protect computing devices from a malware attack.
    Digital Literacy and Computer Science (2018) Grade(s): 09-12

    DLCS18.HS.17

    Discuss the ethical ramifications of malicious hacking and its impact on society.

    Unpacked Content

    UP:DLCS18.HS.17

    Vocabulary

    • white hat hacking
    • black hat hacking
    • information
    • ransomware

    Knowledge

    Students know:
    • that not all people use technology in a legal or ethical manner.
    • that software and processes are created to elicit personal data for negative purposes.
    • that the negative behaviors associated with technology have impacts on society.

    Skills

    Students are able to:
    • identify malicious hacking.
    • discuss ethical ramifications of malicious hacking.
    • discuss the impacts on society of malicious hacking.

    Understanding

    Students understand that:
    • that not all people use technology in a legal or ethical manner.
    • that software and processes are created to elicit personal data for negative purposes.
    • that the negative behaviors associated with technology have impacts on society.
    Link to Resource

    CR Resource Type

    Audio/Video

    Resource Provider

    PBS
    Accessibility

    Accessibility

    Video resources: includes closed captioning or subtitles
    License

    License Type

    Custom
    ALSDE LOGO