SlideShare a Scribd company logo
1 of 16
L.O: STUDENTS WILL
EXPLORE WHO CARES
ABOUT ENCRYPTION.
65-75 minutes
DO NOW:
READ Unit 2 Lab 6: Encryption,
Page 4
WHO SHOULD CARE ABOUT ENCRYPTION?
Governments, Civil Liberties Groups,
Businesses AND you should all care about
protecting information!
For You To Do
1. Read "Encryption in the Hands of Terrorists, and
Everyone Else" and "Why Not Regulate
Encryption? (Blown to Bits pages 161-165).
2. Read "Cryptography Unsettled" (Blown to Bits
pages 191- top of 193)
3. Do the following debate activity on the
issue of the availability of encryption
software. You will be representing either
the government, a civil liberties group, or
the business community.
First, as a class, discuss the position each
of these groups will take on the issue.
What will the government claim is the
right thing to do regarding encryption
software? What would civil liberties
advocates say should be done? The
business community? Each group should
have a clear position statement that
everyone in the class knows.
• Split into three groups - government,
civil liberty groups, and businesses.
In each group, write the two most
convincing reasons or pieces of
evidence that support your position.
Then write one reason against the
position of each of the other two
groups.
For example, the government group
would write:
• Government's position: ______________
• Reasons for supporting our position:
a. ______________
b. ______________
• We are against the civil liberty group's
position because ______________
• We are against the business' position because
______________
Take It Further (Extension Activities)
A.Which group's reasons were you
most convinced by today (even if
you don't actually agree with their
position)? Why were they so
convincing? What made it hard to
argue against their position?
Take It Further (Extension Activities)
B. The debate continues:
• FBI: Weaker Encryption is a Worthwhile Tradeoff for Law
Enforcement Access to Data (on nextgov.com, 9/15/15)
• Most Americans Support Government Backdoors, Even
Though They Know The Risks (on forbes.com, 9/11/15)
• Why the Fear Over Ubiquitous Data Encryption is
Overblown (on WashingtonPost.com, 7/28/15)
• Obama Administration Explored Ways to Bypass
Smartphone Encryption (on WashingtonPost.com,
9/24/15)
HOMEWORK:
read Chapter 5 of “Blown to Bits”.
Reading through the entire chapter will be helpful,
especially to get a better understanding of the
evolution of encryption methods and some details of
public key encryption.
Learning Objectives:
1. LO 6.3.1 Identify existing cybersecurity
concerns and potential options to
address these issues with the Internet
and the systems built on it. [P1]
2. LO 7.5.2 Evaluate online and print
sources for appropriateness and
credibility [P5]
GIVE EXAMPLES OF THESE LEARNING OBJECTIVES IN THE LESSON
Enduring Understandings:
1. EU 6.3 Cybersecurity is an important
concern for the Internet and the systems
built on it.
2. EU 7.5 An investigative process is aided by
effective organization and selection of
resources. Appropriate technologies and
tools facilitate the accessing of information
and enable the ability to evaluate the
credibility of sources
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
1. EK 1.2.5A The context in which an artifact is used
determines the correctness, usability, functionality, and
suitability of the artifact.
2. EK 1.2.5B A computational artifact may have weaknesses,
mistakes, or errors depending on the type of artifact.
3. EK 1.2.5C The functionality of a computational artifact may
be related to how it is used or perceived.
4. EK 1.2.5D The suitability (or appropriateness) of a
computational artifact may be related to how it is used or
perceived.
5. EK 3.2.2D Maintaining privacy of large data sets containing
personal information can be challenging.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
• 6.EK 3.3.1A Digital data representations involve trade-
offs related to storage, security, and privacy concerns.
• 7.EK 3.3.1B Security concerns engender trade-offs in
storing and transmitting information.
• 8.EK 3.3.1F Security and privacy concerns arise with
data containing personal information.
• 9. EK 5.4.1L An explanation of a program helps people
understand the functionality and purpose of it.
• 10. EK 5.4.1M The functionality of a program is often
described by how a user interacts with it
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
• 11.EK 6.1.1A The Internet connects devices and
networks all over the world.
• 12.EK 6.1.1D The Internet and the systems built on it
facilitate collaboration.
• 13.EK 6.3.1A The trust model of the Internet involves
trade-offs.
• 14. EK 6.3.1B The DNS was not designed to be
completely secure.
• 15. EK 6.3.1C Implementing cybersecurity has
software, hardware, and human components.
• 16. EK 6.3.1D Cyber warfare and cyber crime have
widespread and potentially devastating effects
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
• 17. EK 6.3.1H Cryptography is essential to many
models of cybersecurity.
• 18. EK 6.3.1I Cryptography has a mathematical
foundation.
• 19. EK 6.3.1J Open standards help ensure
cryptography is secure.
• 20. EK 6.3.1K Symmetric encryption is a method of
encryption involving one key for encryption and
decryption.
• 21. EK 6.3.1L Public key encryption, which is not
symmetric, is an encryption method that is widely
used because of the functionality it provides.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
• 22.EK 6.3.1M Certificate authorities (CAs) issue
digital certificates that validate the ownership of
encrypted keys used in secured communications and
are based on a trust model.
• 23.EK 7.3.1A Innovations enabled by computing raise
legal and ethical concerns.
• 24.EK 7.3.1G Privacy and security concerns arise in
the development and use of computational systems
and artifacts.
• 25.EK 7.3.1L Commercial and governmental curation
of information may be exploited if privacy and other
protections are ignored.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”

More Related Content

What's hot

Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power pointjessicafay2010
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahadaliuet
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat Mishra
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorismAccenture
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceDr David Probert
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorismKirti Temani
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic ViewCisco Canada
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...ClubHack
 

What's hot (19)

Cyber terrorism power point
Cyber terrorism power pointCyber terrorism power point
Cyber terrorism power point
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Cyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_FahadCyber terrorism by_Ali_Fahad
Cyber terrorism by_Ali_Fahad
 
Case study 11
Case study 11Case study 11
Case study 11
 
Shubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.pptShubhrat.presentationfor cybercrime.ppt
Shubhrat.presentationfor cybercrime.ppt
 
cyber terrorism
cyber terrorismcyber terrorism
cyber terrorism
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
CYBER TERRORISM
     CYBER TERRORISM     CYBER TERRORISM
CYBER TERRORISM
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in CyberspaceCyberterrorism - Conflict in Cyberspace
Cyberterrorism - Conflict in Cyberspace
 
document on cyber terrorism
document on cyber terrorismdocument on cyber terrorism
document on cyber terrorism
 
Cyber Security: The Strategic View
Cyber Security: The Strategic ViewCyber Security: The Strategic View
Cyber Security: The Strategic View
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
Cybercrime, cyber war, infowar - what's this all about from an hacker's persp...
 
Case study 13
Case study 13Case study 13
Case study 13
 
1358619756 cyber terrorism
1358619756 cyber terrorism1358619756 cyber terrorism
1358619756 cyber terrorism
 
Cyber terrorism
Cyber terrorismCyber terrorism
Cyber terrorism
 

Viewers also liked

كيفية معالجة تحميل وثيقة تم اغفالها
كيفية معالجة تحميل وثيقة تم اغفالهاكيفية معالجة تحميل وثيقة تم اغفالها
كيفية معالجة تحميل وثيقة تم اغفالهاHamid Sabik
 
الدليل المسطري المبسط في التعاونية المدرسية
الدليل المسطري المبسط في التعاونية المدرسيةالدليل المسطري المبسط في التعاونية المدرسية
الدليل المسطري المبسط في التعاونية المدرسيةHamid Sabik
 
Cuadro resumen filososofia
Cuadro resumen filososofiaCuadro resumen filososofia
Cuadro resumen filososofiapadresojo
 
Gerardocañizalez,ci 7300311
Gerardocañizalez,ci 7300311Gerardocañizalez,ci 7300311
Gerardocañizalez,ci 73003117300311
 
Texto reflexivo a partir del análisis de textos producidos por los alumnos
Texto reflexivo a partir del análisis de textos producidos por los alumnosTexto reflexivo a partir del análisis de textos producidos por los alumnos
Texto reflexivo a partir del análisis de textos producidos por los alumnosMaritza Vega
 
Team-Based Opioid Project. Group Health
Team-Based Opioid Project. Group HealthTeam-Based Opioid Project. Group Health
Team-Based Opioid Project. Group HealthPaul Coelho, MD
 
arquitectura colonial venezolana
arquitectura colonial venezolanaarquitectura colonial venezolana
arquitectura colonial venezolanamcjefre
 
Actividad 3 presentacion electronica uso bibliotecas gbi
Actividad 3 presentacion electronica uso bibliotecas gbiActividad 3 presentacion electronica uso bibliotecas gbi
Actividad 3 presentacion electronica uso bibliotecas gbimprada0710
 
ENTREVISTA MEDICO PACIENTE
ENTREVISTA MEDICO PACIENTEENTREVISTA MEDICO PACIENTE
ENTREVISTA MEDICO PACIENTEViviana Granja
 
FARMACOS ANTIFLATULENTOS
FARMACOS ANTIFLATULENTOSFARMACOS ANTIFLATULENTOS
FARMACOS ANTIFLATULENTOSViviana Granja
 
U2 a7 germán santos mejía (201353178)
U2 a7 germán santos mejía (201353178)U2 a7 germán santos mejía (201353178)
U2 a7 germán santos mejía (201353178)german santos mejia
 

Viewers also liked (14)

كيفية معالجة تحميل وثيقة تم اغفالها
كيفية معالجة تحميل وثيقة تم اغفالهاكيفية معالجة تحميل وثيقة تم اغفالها
كيفية معالجة تحميل وثيقة تم اغفالها
 
الدليل المسطري المبسط في التعاونية المدرسية
الدليل المسطري المبسط في التعاونية المدرسيةالدليل المسطري المبسط في التعاونية المدرسية
الدليل المسطري المبسط في التعاونية المدرسية
 
Arq. religiosa v
Arq. religiosa vArq. religiosa v
Arq. religiosa v
 
Cuadro resumen filososofia
Cuadro resumen filososofiaCuadro resumen filososofia
Cuadro resumen filososofia
 
Westside pizza
Westside pizzaWestside pizza
Westside pizza
 
Gerardocañizalez,ci 7300311
Gerardocañizalez,ci 7300311Gerardocañizalez,ci 7300311
Gerardocañizalez,ci 7300311
 
Texto reflexivo a partir del análisis de textos producidos por los alumnos
Texto reflexivo a partir del análisis de textos producidos por los alumnosTexto reflexivo a partir del análisis de textos producidos por los alumnos
Texto reflexivo a partir del análisis de textos producidos por los alumnos
 
Team-Based Opioid Project. Group Health
Team-Based Opioid Project. Group HealthTeam-Based Opioid Project. Group Health
Team-Based Opioid Project. Group Health
 
arquitectura colonial venezolana
arquitectura colonial venezolanaarquitectura colonial venezolana
arquitectura colonial venezolana
 
Actividad 3 presentacion electronica uso bibliotecas gbi
Actividad 3 presentacion electronica uso bibliotecas gbiActividad 3 presentacion electronica uso bibliotecas gbi
Actividad 3 presentacion electronica uso bibliotecas gbi
 
ENTREVISTA MEDICO PACIENTE
ENTREVISTA MEDICO PACIENTEENTREVISTA MEDICO PACIENTE
ENTREVISTA MEDICO PACIENTE
 
Буква К
Буква КБуква К
Буква К
 
FARMACOS ANTIFLATULENTOS
FARMACOS ANTIFLATULENTOSFARMACOS ANTIFLATULENTOS
FARMACOS ANTIFLATULENTOS
 
U2 a7 germán santos mejía (201353178)
U2 a7 germán santos mejía (201353178)U2 a7 germán santos mejía (201353178)
U2 a7 germán santos mejía (201353178)
 

Similar to Encryption Debate: Gov't vs. Civil Liberties vs. Business

Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLexume1
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLexume1
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Black Duck by Synopsys
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)JIEMS Akkalkuwa
 
Lesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLexume1
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundohdbundo
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hWilheminaRossi174
 
Lesson2.9 l u2l6 secrets encoding and decoding
Lesson2.9 l u2l6 secrets encoding and decodingLesson2.9 l u2l6 secrets encoding and decoding
Lesson2.9 l u2l6 secrets encoding and decodingLexume1
 
Quality of Information and Malware by Ashok Panwar
Quality of Information and Malware by Ashok PanwarQuality of Information and Malware by Ashok Panwar
Quality of Information and Malware by Ashok PanwarAshok Panwar
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxjustine1simpson78276
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxhartrobert670
 

Similar to Encryption Debate: Gov't vs. Civil Liberties vs. Business (20)

Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
 
The Cybersecurity Mess
The Cybersecurity MessThe Cybersecurity Mess
The Cybersecurity Mess
 
Case Study.pdf
Case Study.pdfCase Study.pdf
Case Study.pdf
 
Forensics
ForensicsForensics
Forensics
 
A01450131
A01450131A01450131
A01450131
 
4.content (computer forensic)
4.content (computer forensic)4.content (computer forensic)
4.content (computer forensic)
 
Lesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keys
 
Cyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David BundoCyber Security Matters a book by Hama David Bundo
Cyber Security Matters a book by Hama David Bundo
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
 
Lesson2.9 l u2l6 secrets encoding and decoding
Lesson2.9 l u2l6 secrets encoding and decodingLesson2.9 l u2l6 secrets encoding and decoding
Lesson2.9 l u2l6 secrets encoding and decoding
 
Hacking 10 2010
Hacking 10 2010Hacking 10 2010
Hacking 10 2010
 
Quality of Information and Malware by Ashok Panwar
Quality of Information and Malware by Ashok PanwarQuality of Information and Malware by Ashok Panwar
Quality of Information and Malware by Ashok Panwar
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
Hamza
HamzaHamza
Hamza
 
Answer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docxAnswer each question in one to two paragraphs.Question 1 .docx
Answer each question in one to two paragraphs.Question 1 .docx
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
Brian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docxBrian Wrote There is a wide range of cybersecurity initiatives .docx
Brian Wrote There is a wide range of cybersecurity initiatives .docx
 

More from Lexume1

Lesson flow charts 2
Lesson flow charts 2Lesson flow charts 2
Lesson flow charts 2Lexume1
 
Lesson flow charts 1
Lesson flow charts 1Lesson flow charts 1
Lesson flow charts 1Lexume1
 
Ap exam big idea 7 global impact
Ap exam big idea 7 global impactAp exam big idea 7 global impact
Ap exam big idea 7 global impactLexume1
 
Lesson pseudocode
Lesson  pseudocodeLesson  pseudocode
Lesson pseudocodeLexume1
 
Ap exam big idea 6 the internet
Ap exam big idea 6 the internetAp exam big idea 6 the internet
Ap exam big idea 6 the internetLexume1
 
Ap exam big idea 5 programming
Ap exam big idea 5 programmingAp exam big idea 5 programming
Ap exam big idea 5 programmingLexume1
 
Ap exam big idea 4 algorithms
Ap exam big idea 4 algorithmsAp exam big idea 4 algorithms
Ap exam big idea 4 algorithmsLexume1
 
Ap exam big idea 3 data and information
Ap exam big idea 3 data and informationAp exam big idea 3 data and information
Ap exam big idea 3 data and informationLexume1
 
Ap exam big idea 2 abstraction
Ap exam big idea 2 abstractionAp exam big idea 2 abstraction
Ap exam big idea 2 abstractionLexume1
 
Lesson4.4 u4 l1 using hex
Lesson4.4 u4 l1 using hexLesson4.4 u4 l1 using hex
Lesson4.4 u4 l1 using hexLexume1
 
Lesson4.3 u4 l1 hexadecimal representation
Lesson4.3 u4 l1 hexadecimal representationLesson4.3 u4 l1 hexadecimal representation
Lesson4.3 u4 l1 hexadecimal representationLexume1
 
Lesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squencesLesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squencesLexume1
 
Lesson4.1 u4 l1 binary representation
Lesson4.1 u4 l1 binary representationLesson4.1 u4 l1 binary representation
Lesson4.1 u4 l1 binary representationLexume1
 
Lesson4.0 unit 4 the internet and global impact
Lesson4.0 unit 4  the internet and global impactLesson4.0 unit 4  the internet and global impact
Lesson4.0 unit 4 the internet and global impactLexume1
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLexume1
 
Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)Lexume1
 
Lesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addressesLesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addressesLexume1
 
Lesson4.9 a u4l2 html
Lesson4.9 a u4l2 htmlLesson4.9 a u4l2 html
Lesson4.9 a u4l2 htmlLexume1
 
Lesson4.8 u4 l2 address hierarchy
Lesson4.8 u4 l2 address hierarchyLesson4.8 u4 l2 address hierarchy
Lesson4.8 u4 l2 address hierarchyLexume1
 
Lesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancyLesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancyLexume1
 

More from Lexume1 (20)

Lesson flow charts 2
Lesson flow charts 2Lesson flow charts 2
Lesson flow charts 2
 
Lesson flow charts 1
Lesson flow charts 1Lesson flow charts 1
Lesson flow charts 1
 
Ap exam big idea 7 global impact
Ap exam big idea 7 global impactAp exam big idea 7 global impact
Ap exam big idea 7 global impact
 
Lesson pseudocode
Lesson  pseudocodeLesson  pseudocode
Lesson pseudocode
 
Ap exam big idea 6 the internet
Ap exam big idea 6 the internetAp exam big idea 6 the internet
Ap exam big idea 6 the internet
 
Ap exam big idea 5 programming
Ap exam big idea 5 programmingAp exam big idea 5 programming
Ap exam big idea 5 programming
 
Ap exam big idea 4 algorithms
Ap exam big idea 4 algorithmsAp exam big idea 4 algorithms
Ap exam big idea 4 algorithms
 
Ap exam big idea 3 data and information
Ap exam big idea 3 data and informationAp exam big idea 3 data and information
Ap exam big idea 3 data and information
 
Ap exam big idea 2 abstraction
Ap exam big idea 2 abstractionAp exam big idea 2 abstraction
Ap exam big idea 2 abstraction
 
Lesson4.4 u4 l1 using hex
Lesson4.4 u4 l1 using hexLesson4.4 u4 l1 using hex
Lesson4.4 u4 l1 using hex
 
Lesson4.3 u4 l1 hexadecimal representation
Lesson4.3 u4 l1 hexadecimal representationLesson4.3 u4 l1 hexadecimal representation
Lesson4.3 u4 l1 hexadecimal representation
 
Lesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squencesLesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squences
 
Lesson4.1 u4 l1 binary representation
Lesson4.1 u4 l1 binary representationLesson4.1 u4 l1 binary representation
Lesson4.1 u4 l1 binary representation
 
Lesson4.0 unit 4 the internet and global impact
Lesson4.0 unit 4  the internet and global impactLesson4.0 unit 4  the internet and global impact
Lesson4.0 unit 4 the internet and global impact
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 
Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)
 
Lesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addressesLesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addresses
 
Lesson4.9 a u4l2 html
Lesson4.9 a u4l2 htmlLesson4.9 a u4l2 html
Lesson4.9 a u4l2 html
 
Lesson4.8 u4 l2 address hierarchy
Lesson4.8 u4 l2 address hierarchyLesson4.8 u4 l2 address hierarchy
Lesson4.8 u4 l2 address hierarchy
 
Lesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancyLesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancy
 

Recently uploaded

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayMakMakNepo
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 

Recently uploaded (20)

Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Quarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up FridayQuarter 4 Peace-education.pptx Catch Up Friday
Quarter 4 Peace-education.pptx Catch Up Friday
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 

Encryption Debate: Gov't vs. Civil Liberties vs. Business

  • 1. L.O: STUDENTS WILL EXPLORE WHO CARES ABOUT ENCRYPTION. 65-75 minutes DO NOW: READ Unit 2 Lab 6: Encryption, Page 4
  • 2. WHO SHOULD CARE ABOUT ENCRYPTION? Governments, Civil Liberties Groups, Businesses AND you should all care about protecting information!
  • 3. For You To Do 1. Read "Encryption in the Hands of Terrorists, and Everyone Else" and "Why Not Regulate Encryption? (Blown to Bits pages 161-165). 2. Read "Cryptography Unsettled" (Blown to Bits pages 191- top of 193)
  • 4. 3. Do the following debate activity on the issue of the availability of encryption software. You will be representing either the government, a civil liberties group, or the business community. First, as a class, discuss the position each of these groups will take on the issue. What will the government claim is the right thing to do regarding encryption software? What would civil liberties advocates say should be done? The business community? Each group should have a clear position statement that everyone in the class knows.
  • 5. • Split into three groups - government, civil liberty groups, and businesses. In each group, write the two most convincing reasons or pieces of evidence that support your position. Then write one reason against the position of each of the other two groups.
  • 6. For example, the government group would write: • Government's position: ______________ • Reasons for supporting our position: a. ______________ b. ______________ • We are against the civil liberty group's position because ______________ • We are against the business' position because ______________
  • 7. Take It Further (Extension Activities) A.Which group's reasons were you most convinced by today (even if you don't actually agree with their position)? Why were they so convincing? What made it hard to argue against their position?
  • 8. Take It Further (Extension Activities) B. The debate continues: • FBI: Weaker Encryption is a Worthwhile Tradeoff for Law Enforcement Access to Data (on nextgov.com, 9/15/15) • Most Americans Support Government Backdoors, Even Though They Know The Risks (on forbes.com, 9/11/15) • Why the Fear Over Ubiquitous Data Encryption is Overblown (on WashingtonPost.com, 7/28/15) • Obama Administration Explored Ways to Bypass Smartphone Encryption (on WashingtonPost.com, 9/24/15)
  • 9. HOMEWORK: read Chapter 5 of “Blown to Bits”. Reading through the entire chapter will be helpful, especially to get a better understanding of the evolution of encryption methods and some details of public key encryption.
  • 10. Learning Objectives: 1. LO 6.3.1 Identify existing cybersecurity concerns and potential options to address these issues with the Internet and the systems built on it. [P1] 2. LO 7.5.2 Evaluate online and print sources for appropriateness and credibility [P5] GIVE EXAMPLES OF THESE LEARNING OBJECTIVES IN THE LESSON
  • 11. Enduring Understandings: 1. EU 6.3 Cybersecurity is an important concern for the Internet and the systems built on it. 2. EU 7.5 An investigative process is aided by effective organization and selection of resources. Appropriate technologies and tools facilitate the accessing of information and enable the ability to evaluate the credibility of sources EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 12. Essential Knowledge: 1. EK 1.2.5A The context in which an artifact is used determines the correctness, usability, functionality, and suitability of the artifact. 2. EK 1.2.5B A computational artifact may have weaknesses, mistakes, or errors depending on the type of artifact. 3. EK 1.2.5C The functionality of a computational artifact may be related to how it is used or perceived. 4. EK 1.2.5D The suitability (or appropriateness) of a computational artifact may be related to how it is used or perceived. 5. EK 3.2.2D Maintaining privacy of large data sets containing personal information can be challenging. EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 13. Essential Knowledge: • 6.EK 3.3.1A Digital data representations involve trade- offs related to storage, security, and privacy concerns. • 7.EK 3.3.1B Security concerns engender trade-offs in storing and transmitting information. • 8.EK 3.3.1F Security and privacy concerns arise with data containing personal information. • 9. EK 5.4.1L An explanation of a program helps people understand the functionality and purpose of it. • 10. EK 5.4.1M The functionality of a program is often described by how a user interacts with it EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 14. Essential Knowledge: • 11.EK 6.1.1A The Internet connects devices and networks all over the world. • 12.EK 6.1.1D The Internet and the systems built on it facilitate collaboration. • 13.EK 6.3.1A The trust model of the Internet involves trade-offs. • 14. EK 6.3.1B The DNS was not designed to be completely secure. • 15. EK 6.3.1C Implementing cybersecurity has software, hardware, and human components. • 16. EK 6.3.1D Cyber warfare and cyber crime have widespread and potentially devastating effects EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 15. Essential Knowledge: • 17. EK 6.3.1H Cryptography is essential to many models of cybersecurity. • 18. EK 6.3.1I Cryptography has a mathematical foundation. • 19. EK 6.3.1J Open standards help ensure cryptography is secure. • 20. EK 6.3.1K Symmetric encryption is a method of encryption involving one key for encryption and decryption. • 21. EK 6.3.1L Public key encryption, which is not symmetric, is an encryption method that is widely used because of the functionality it provides. EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 16. Essential Knowledge: • 22.EK 6.3.1M Certificate authorities (CAs) issue digital certificates that validate the ownership of encrypted keys used in secured communications and are based on a trust model. • 23.EK 7.3.1A Innovations enabled by computing raise legal and ethical concerns. • 24.EK 7.3.1G Privacy and security concerns arise in the development and use of computational systems and artifacts. • 25.EK 7.3.1L Commercial and governmental curation of information may be exploited if privacy and other protections are ignored. EXPLAIN THESE “ENDURING UNDERSTANDINGS”

Editor's Notes

  1. Page 4: Who Cares About Encryption? Understand the social implications of public key encryption, and be able to detail positive and negative affects. Page 4: Who Cares about Encryption? Students read sections of Blown to Bits to prepare for a debate activity about the availability of encryption software. The student page suggests a class discussion to help make sure that everyone is clear on the position that each of the three groups (governments, civil liberties groups, businesses) will take. Depending on the size of the class, it may make sense to split into 6 groups or more, with multiple groups representing each position. Having more than one group per position can also add interest, by letting groups compare the reasons they thought made the most convincing arguments. If you wish, you can make this into a more full-fledged debate. Visit the Boston Debate League for resources, like this guide for a full-class multi-perspective debate. This can also be a simpler activity in which each group presents its case. Each group can first share its reasons for supporting its position. Then, the government and business groups can share their reason they are against the civil liberties position, and the civil liberties groups could have the opportunity to respond. Each position gets its turn to hear the reasons others are against its position and gets the opportunity to defend itself. The Take It Further prompts include an opportunity for students to reflect on their learning through the debate activity.
  2. Page 4: Who Cares about Encryption? Students read sections of Blown to Bits to prepare for a debate activity about the availability of encryption software. The student page suggests a class discussion to help make sure that everyone is clear on the position that each of the three groups (governments, civil liberties groups, businesses) will take. Depending on the size of the class, it may make sense to split into 6 groups or more, with multiple groups representing each position. Having more than one group per position can also add interest, by letting groups compare the reasons they thought made the most convincing arguments. If you wish, you can make this into a more full-fledged debate. Visit the Boston Debate League for resources, like this guide for a full-class multi-perspective debate. This can also be a simpler activity in which each group presents its case. Each group can first share its reasons for supporting its position. Then, the government and business groups can share their reason they are against the civil liberties position, and the civil liberties groups could have the opportunity to respond. Each position gets its turn to hear the reasons others are against its position and gets the opportunity to defend itself. The Take It Further prompts include an opportunity for students to reflect on their learning through the debate activity.