Hackers & Cyber Attacks: Crash Course Computer Science #32

Learning Resource Type

Classroom Resource

Subject Area

Digital Literacy and Computer Science

Grade(s)

9, 10, 11, 12

Overview

Not all hackers are malicious cybercriminals intent on stealing your data (these people are known as Black Hats). There are also White Hats, who hunt for bugs, close security holes, and perform security evaluations for companies. And there are a lot of different motivations for hackers.

Digital Literacy and Computer Science (2018) Grade(s): 09-12

DLCS18.HS.12

Describe how sensitive data can be affected by malware and other attacks.

UP:DLCS18.HS.12

Vocabulary

personal data, malware, cyber attacks

Knowledge

Students know:
  • how malware works.
  • how sensitive data can be affected by malware and other attacks.

Skills

Students are able to:
  • identify when a computer issue is potentially caused by malware.
  • remove malware from a computing device.
  • explain ways to protect computing devices from malware.

Understanding

Students understand that:
  • malware is harmful to computing devices and personal data.
  • software exists to remove malware from computing devices.
  • software exists to protect computing devices from a malware attack.
Digital Literacy and Computer Science (2018) Grade(s): 09-12

DLCS18.HS.17

Discuss the ethical ramifications of malicious hacking and its impact on society.

UP:DLCS18.HS.17

Vocabulary

  • white hat hacking
  • black hat hacking
  • information
  • ransomware

Knowledge

Students know:
  • that not all people use technology in a legal or ethical manner.
  • that software and processes are created to elicit personal data for negative purposes.
  • that the negative behaviors associated with technology have impacts on society.

Skills

Students are able to:
  • identify malicious hacking.
  • discuss ethical ramifications of malicious hacking.
  • discuss the impacts on society of malicious hacking.

Understanding

Students understand that:
  • that not all people use technology in a legal or ethical manner.
  • that software and processes are created to elicit personal data for negative purposes.
  • that the negative behaviors associated with technology have impacts on society.

CR Resource Type

Audio/Video

Resource Provider

PBS

License Type

Custom

Accessibility

Video resources: includes closed captioning or subtitles
ALSDE LOGO