Computer Crime Hackers Lesson Activity
What educators are saying
Description
This resource includes links to videos and online articles about cyber crime that you and your students access online. It includes summary slides as well as questions and activities that you can do with your students.
UPDATE: This resource has recently been redesigned to investigate current Computer Crime and Hacking topics and trends and includes new videos and online articles!
NEW TOPICS
1. 3 Types of Hackers
2. Computer Bug Bounties
3. Ransomware
4. How Hackers stole $45 Million in 2 Days
5. North Korea Sony Cyber Attack
6. Companies Storing Data About You
7. Governments Monitoring Citizens
8. Smart Phones Track Our Movement
9. Company ID Badges with Embedded Sensors
10. High Tech City - Songdo South Korea
11. Tor Onion Browser
12. Wayback Machine Internet Archive
13. Top Hacker Shows Us How It's Done
14. 8 Biggest Viruses of All Time
15. Mafiaboy - 15 Year Old Hacker
16. Computer Crime Definitions
Note: You will receive this lesson in both PowerPoint (editable) and PDF formats
BONUS: RISE OF THE HACKERS VIDEO QUESTIONS
• This lesson is based on the video Rise of the Hackers (Kate Dart and Zoe Heron, Nova)
• It contains cutting edge, up-to-date information about computer viruses, hacking and encryption
• You can view this video online for free right now through several links, through Netflix or by purchasing it at Amazon.com
• It is great video for a computer, business or math class
• The video has 4 segments. Questions and summary information are included for each segment
TOPICS
1. Social Engineering Attacks
2. Stuxnet Virus
3. Encryption
4. Keeping Our Data Safe
UPDATE: I have added a new video and questions to this bundle. The video is Rise of the Hackers. It contains cutting edge, up-to-date information about computer viruses, hacking and encryption.
UPDATE #2: A new lesson plan has been added to this resource (PDF and editable PowerPoint copies)
UPDATE #3 This resource has been completely redesigned to investigate current Computer Crime and Hacking topics and trends.
This resource is also sold as part of a Computers Course. Click on the link below to view this bundle...
***********************************************************************
Terms of Use:
Purchase of this product is for single classroom use by the purchaser only. It is a violation for individuals, schools, and districts to redistribute, edit, sell, or post this item on the internet or to other individuals.
Teachers can post TEACH WITH TECH ™ INC. resources to Google Classroom or another secure online platform, that is accessed only by their students and parents.
Created by Gavin Middleton © TEACH WITH TECH ™ INC.
Thanks for visiting my store! If you decide to make a purchase, please do not forget to leave feedback. I am very interested to read your thoughts about my products!
Also, don't forget to "FOLLOW" me for exciting new product announcements, sales, promotions and updates!
Gavin Middleton
TEACH WITH TECH ™ INC.