Y10 05 P26 Activities

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 2

TOPIC 5: ISSUES AND IMPACTS

Hackers

ACTIVITIES FOR Y10-05-P26

Name ____________________________________________ Date __________________

Activity 1
Complete the sentences below with words from the following list to describe the role and
function of a firewall.

Network (LAN) Packet Vice versa


Monitors Software Logged
Discarded Traffic Internet (WAN)
Inside Rules Hardware

1 A firewall is a piece of __________.


2 It runs on a piece of __________ attached to a __________ on one side and the
__________ on the other.
3 It __________ the network __________ between the inside and the outside.
4 The software consists of a set of __________.
5 Each network __________ moving from __________ to outside and __________ has
the rules applied to it.
6 Unauthorised traffic is __________ and __________.

© Pearson Education Ltd 2020. Copying permitted for purchasing institution only. This material is not copyright free.
1
TOPIC 5: ISSUES AND IMPACTS

Hackers

Activity 2
Read this article: https://us.norton.com/internetsecurity-emerging-threats-what-is-the-
difference-between-black-white-and-grey-hat-hackers.html
Use this glossary to help you understand the terminology used in the article:
https://encyclopedia.kaspersky.com/glossary/
Complete the table using the information you’ve found.

Type of Legal or Definition


hacker illegal

Hacker

Black hat
hacker

White hat
hacker

Grey hat
hacker

Hacktivist

Script
kiddie

Bug
bounty

Pwn2Own

© Pearson Education Ltd 2020. Copying permitted for purchasing institution only. This material is not copyright free.
2

You might also like