Curated and Reviewed by
Lesson Planet
How can criminals get access to your personal information? Scholars learn how hackers penetrate computer systems. They watch a video that explains phishing, pretexting, Trojan horses, malware, Ransomware, buffer overflow, code injection, and distributed denial of service (DDoS) in the 32nd installment of a computer science series.
17 Views
9 Downloads
Concepts
Instructional Ideas
- Have pupils create a graphic organizer summarizing hacker strategies
- If possible, invite a local police department to give a talk about protecting information online
Classroom Considerations
- Requires knowledge of computer systems from previous videos in the Crash Crash Computer Science series
- This video is hosted on YouTube
Pros
- References some recent events, such as the Yahoo and Equifax breaches
- Explanations are easy to understand and thorough
Cons
- None