0% found this document useful (0 votes)
22 views2 pages

Computers 2BE

The work consists of two parts that will have two different grades. Part A focuses on computers and topics like hardware, software, memory, and peripherals. Part B focuses on computer security topics like cybersecurity definitions, types of attacks, and security measures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views2 pages

Computers 2BE

The work consists of two parts that will have two different grades. Part A focuses on computers and topics like hardware, software, memory, and peripherals. Part B focuses on computer security topics like cybersecurity definitions, types of attacks, and security measures.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

COMPUTERS AND COMPUTER

SECURITY

The work consists of two parts that will have two different grades. In both cases, a presentation
must be made containing the information requested and then it must be presented in class. In total
the presentation should last about 5-7 minutes and may last up to 10 minutes.

The work is in pairs and you have until 10th of may to do it.

PART A: COMPUTERS
The available topics will be:

1)Definition of computer, hardware, software and units of measurement (bit, byte, kilobyte,...)
2)Motherboard and connections (controller cards)
3)Memory (RAM, ROM, BIOS, Cache)
4)Input peripherals (keyboard, mouse, microphone, scanner)
5)Output peripherals (printer, display, speaker)
6)Different microprocessors and types
7)History of computer science

PART B: COMPUTER SECURITY

In all groups you have to define: cybersecurity, logical security, active security and passive
security.

1. Form hijacking, watering hole attack, zero-day attack, brute force attack, man in the middle
attack, botnet, Security breach, DNS poisoning, DoS (Denial of Service Attack)

2. Data Leaking, Hijacking, Malvertising, Password spray,Pharming, Vulnerability, Catfishing,


Cyberbullying

3. Grooming, Hoax, Social Engineering, Pishing, Identity Theft, Sexting, Sextorsion, Smishing,
Spamming.

4. Spoofing (web), Spoofing (email), Stalking, Typosquatting, Vishing, Whaling, Adware,


Exploit, Computer worm
5. Keyloger, Malware, Ransomware, Rotkit, Trojan, Computer virus,Digital forensics, Antivirus.
Backup,

6. Cybersecurity, Informed consent, access control, parental control, Data masking, virtual IP
address, Firewall, Firewall rules, Geoblocking

7. Honeypot, Data integrity, network access control, security patch, penetration testing, privacy
policy, security policy, online privacy, content removal.

8. Online reputation, Secure boot, browser security, intrusion detection system, spam filter,
tunneling, VPN,Web application firewall, AES (Advanced encryption standard)

9. Authentication, Biometric authentication, Two-factor authentication (2FA), Certificate


authority, Captcha, Digital certificate, email encryption, end-to-end encryption, cryptography,

10. DES (Data encryption standard), Encrypt and decrypt, Digital signature,Hash, https, MD5,
PIN, Password, Password cracking.

11. RSA (Rivest, Shamir, Adleman), SHA, SSH (Secure shell), SSL (Secure socket layer),
Password security, TLS (transport layer security), WPA (secure WI-FI access), Bandwidth,
DNS (Domain Name System), Hacker, Sniffer (Packet Analyzer)

You might also like