SlideShare a Scribd company logo
1 of 13
L.O: STUDENTS WILL BE ABLE
TO EXPLAIN CRYPTOGRAPHY
AND INNOVATIONS.
110-120 minutes
DO NOW: READ
Unit 2 Lab 6: Encryption,
Page 5
FOR YOU TO DO:
1. Choose and research an innovation that
has some relation to cryptography. Two
suggestions are listed on the next page,
but you may choose a different
innovation, if you like—any innovation
that interests you.
For example, you might look into some recent stories
about hacking into car information systems, or stories of
people showing they can interfere with self-driving cars:
• Why driverless cars may never happen (from UK
Telegraph, 9/8/15)
• Counting on government to protect cars from
hackers isn't our best option (op-ed from
Washington Post, 8/26/15)
• Jeep owners urged to update their cars after
hackers take remote control (Guardian, 7/21/15)
you might research Bitcoin, a
"cryptocurrency":
• Bitcoin: The payment revolution (The Market
Mogul)
• 21 Things I Learned About Bitcoin From Living On It
For A Week (Forbes, 5/9/13)
• Bitcoin's Dark Side Could Get Darker (MIT Tech
Review, 8/13/15)
2. The following are prompts from the AP Explore
Task. Write about your innovation, responding to
each prompt in a separate paragraph. Remember to
cite your sources.
a. the innovation name and a description of the intended
purpose of the innovation (100 words max)
b. an explanation of the technical details of this innovation in
terms that someone completely unfamiliar with the
innovation would understand (100 words max)
c. a description of the role computing plays in implementing
the functionality associated with the innovation (100
words max)
d. a description of the relationship between data and the
innovation. For example, you could describe the data used
or produced by the innovation or any privacy issues
associated with the innovation data (100 words max).
3. When you’re done: Trade your paragraphs
with a partner. Read your partner's response
for each prompt. How well did the paragraphs
respond to the prompts?
HOMEWORK:
read Chapter 5 of “Blown to Bits”.
Reading through the entire chapter will be helpful,
especially to get a better understanding of the
evolution of encryption methods and some details of
public key encryption.
Learning Objectives:
1. LO 6.3.1 Identify existing cybersecurity
concerns and potential options to
address these issues with the Internet
and the systems built on it. [P1]
2. LO 7.5.2 Evaluate online and print
sources for appropriateness and
credibility [P5]
GIVE EXAMPLES OF THESE LEARNING OBJECTIVES IN THE LESSON
Enduring Understandings:
1. EU 6.3 Cybersecurity is an important
concern for the Internet and the systems
built on it.
2. EU 7.5 An investigative process is aided by
effective organization and selection of
resources. Appropriate technologies and
tools facilitate the accessing of information
and enable the ability to evaluate the
credibility of sources
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
1. EK 1.2.5A The context in which an artifact is used
determines the correctness, usability, functionality, and
suitability of the artifact.
2. EK 1.2.5B A computational artifact may have weaknesses,
mistakes, or errors depending on the type of artifact.
3. EK 1.2.5C The functionality of a computational artifact may
be related to how it is used or perceived.
4. EK 1.2.5D The suitability (or appropriateness) of a
computational artifact may be related to how it is used or
perceived.
5. EK 3.2.2D Maintaining privacy of large data sets containing
personal information can be challenging.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
• 6.EK 3.3.1A Digital data representations involve trade-
offs related to storage, security, and privacy concerns.
• 7.EK 3.3.1B Security concerns engender trade-offs in
storing and transmitting information.
• 8.EK 3.3.1F Security and privacy concerns arise with
data containing personal information.
• 9. EK 5.4.1L An explanation of a program helps people
understand the functionality and purpose of it.
• 10. EK 5.4.1M The functionality of a program is often
described by how a user interacts with it
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
• 11.EK 6.1.1A The Internet connects devices and
networks all over the world.
• 12.EK 6.1.1D The Internet and the systems built on it
facilitate collaboration.
• 13.EK 6.3.1A The trust model of the Internet involves
trade-offs.
• 14. EK 6.3.1B The DNS was not designed to be
completely secure.
• 15. EK 6.3.1C Implementing cybersecurity has
software, hardware, and human components.
• 16. EK 6.3.1D Cyber warfare and cyber crime have
widespread and potentially devastating effects
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
• 17. EK 6.3.1H Cryptography is essential to many
models of cybersecurity.
• 18. EK 6.3.1I Cryptography has a mathematical
foundation.
• 19. EK 6.3.1J Open standards help ensure
cryptography is secure.
• 20. EK 6.3.1K Symmetric encryption is a method of
encryption involving one key for encryption and
decryption.
• 21. EK 6.3.1L Public key encryption, which is not
symmetric, is an encryption method that is widely
used because of the functionality it provides.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”
Essential Knowledge:
• 22.EK 6.3.1M Certificate authorities (CAs) issue
digital certificates that validate the ownership of
encrypted keys used in secured communications and
are based on a trust model.
• 23.EK 7.3.1A Innovations enabled by computing raise
legal and ethical concerns.
• 24.EK 7.3.1G Privacy and security concerns arise in
the development and use of computational systems
and artifacts.
• 25.EK 7.3.1L Commercial and governmental curation
of information may be exploited if privacy and other
protections are ignored.
EXPLAIN THESE “ENDURING UNDERSTANDINGS”

More Related Content

What's hot

Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)Asif Iqbal
 
Learn hacking be saved
Learn hacking be savedLearn hacking be saved
Learn hacking be savedAli Hider
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Black Duck by Synopsys
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?DLabs
 
Challenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityTahseen Shabab
 
Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya ...
Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya ...Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya ...
Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya ...Kaseya
 
Data Analytics in Real World
Data Analytics in Real WorldData Analytics in Real World
Data Analytics in Real Worldgeetachauhan
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AIRaffael Marty
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Intel IT Center
 
Philly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by ConstructionPhilly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by Constructionjxyz
 
Welcome & The State of Open Source Security
Welcome & The State of Open Source SecurityWelcome & The State of Open Source Security
Welcome & The State of Open Source SecurityJerika Phelps
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsZoneFox
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018Pukhraj Singh
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for DevopsJerika Phelps
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thUnited Technology Group (UTG)
 
Open Source: The Legal & Security Implications for the Connected Car
Open Source: The Legal & Security Implications for the Connected CarOpen Source: The Legal & Security Implications for the Connected Car
Open Source: The Legal & Security Implications for the Connected CarJerika Phelps
 

What's hot (19)

Footprintig(Haching)
Footprintig(Haching)Footprintig(Haching)
Footprintig(Haching)
 
Learn hacking be saved
Learn hacking be savedLearn hacking be saved
Learn hacking be saved
 
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
Open Source Insight: Big Data Breaches, Costly Cyberattacks, Vuln Detection f...
 
Is AI going to provide safety for us?
Is AI going to provide safety for us?Is AI going to provide safety for us?
Is AI going to provide safety for us?
 
Challenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise CybersecurityChallenges in Applying AI to Enterprise Cybersecurity
Challenges in Applying AI to Enterprise Cybersecurity
 
Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya ...
Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya ...Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya ...
Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya ...
 
Data Analytics in Real World
Data Analytics in Real WorldData Analytics in Real World
Data Analytics in Real World
 
Understanding the "Intelligence" in AI
Understanding the "Intelligence" in AIUnderstanding the "Intelligence" in AI
Understanding the "Intelligence" in AI
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
 
10 things you should know about cybersecurity
10 things you should know about cybersecurity10 things you should know about cybersecurity
10 things you should know about cybersecurity
 
Philly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by ConstructionPhilly ETE 2016: Securing Software by Construction
Philly ETE 2016: Securing Software by Construction
 
AI cybersecurity
AI cybersecurityAI cybersecurity
AI cybersecurity
 
Welcome & The State of Open Source Security
Welcome & The State of Open Source SecurityWelcome & The State of Open Source Security
Welcome & The State of Open Source Security
 
ethics final project
ethics final projectethics final project
ethics final project
 
AI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and SolutionsAI In Cybersecurity – Challenges and Solutions
AI In Cybersecurity – Challenges and Solutions
 
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
 
Software Security Assurance for Devops
Software Security Assurance for DevopsSoftware Security Assurance for Devops
Software Security Assurance for Devops
 
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10thCYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
 
Open Source: The Legal & Security Implications for the Connected Car
Open Source: The Legal & Security Implications for the Connected CarOpen Source: The Legal & Security Implications for the Connected Car
Open Source: The Legal & Security Implications for the Connected Car
 

Viewers also liked

색채학 피피티
색채학 피피티색채학 피피티
색채학 피피티지수 정
 
Lesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLexume1
 
Lesson4.3 u4 l1 hexadecimal representation
Lesson4.3 u4 l1 hexadecimal representationLesson4.3 u4 l1 hexadecimal representation
Lesson4.3 u4 l1 hexadecimal representationLexume1
 
Lesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancyLesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancyLexume1
 
Lesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addressesLesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addressesLexume1
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLexume1
 

Viewers also liked (6)

색채학 피피티
색채학 피피티색채학 피피티
색채학 피피티
 
Lesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keysLesson2.9 n u2l6 public keys
Lesson2.9 n u2l6 public keys
 
Lesson4.3 u4 l1 hexadecimal representation
Lesson4.3 u4 l1 hexadecimal representationLesson4.3 u4 l1 hexadecimal representation
Lesson4.3 u4 l1 hexadecimal representation
 
Lesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancyLesson4.7 u4 l2 network redundancy
Lesson4.7 u4 l2 network redundancy
 
Lesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addressesLesson4.9 b u4l3 ip addresses
Lesson4.9 b u4l3 ip addresses
 
Lesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocolsLesson4.9 d u4l3 hierarchy of open protocols
Lesson4.9 d u4l3 hierarchy of open protocols
 

Similar to Lesson2.9 p u2l6 cryptography and innovations

Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLexume1
 
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Black Duck by Synopsys
 
Lesson2.9 l u2l6 secrets encoding and decoding
Lesson2.9 l u2l6 secrets encoding and decodingLesson2.9 l u2l6 secrets encoding and decoding
Lesson2.9 l u2l6 secrets encoding and decodingLexume1
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxdonnajames55
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hWilheminaRossi174
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Davide Cioccia
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud ComputingJulie May
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)ITCamp
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsAlan Tatourian
 
Lesson2.9 m u2l6 secret keys
Lesson2.9 m u2l6 secret keysLesson2.9 m u2l6 secret keys
Lesson2.9 m u2l6 secret keysLexume1
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Black Duck by Synopsys
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecuritySherif Mansour
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksDamaineFranklinMScBE
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Securityinside-BigData.com
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsJames '​-- Mckinlay
 
The Death Star & The Ultimate Vulnerability.pptx
The Death Star & The Ultimate Vulnerability.pptxThe Death Star & The Ultimate Vulnerability.pptx
The Death Star & The Ultimate Vulnerability.pptxJamie Coleman
 
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptxU11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx14941
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attacknewbie2019
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 

Similar to Lesson2.9 p u2l6 cryptography and innovations (20)

Lesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryptionLesson2.9 o u2l6 who cares about encryption
Lesson2.9 o u2l6 who cares about encryption
 
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
Open Source Insight: CVE-2017-2636 Vuln of the Week & UK National Cyber Secur...
 
Lesson2.9 l u2l6 secrets encoding and decoding
Lesson2.9 l u2l6 secrets encoding and decodingLesson2.9 l u2l6 secrets encoding and decoding
Lesson2.9 l u2l6 secrets encoding and decoding
 
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docxComputer ForensicsDiscussion 1Forensics Certifications Ple.docx
Computer ForensicsDiscussion 1Forensics Certifications Ple.docx
 
Chapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t hChapter 5Overview of SecurityTechnologiesWe can’t h
Chapter 5Overview of SecurityTechnologiesWe can’t h
 
Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server Inside TorrentLocker (Cryptolocker) Malware C&C Server
Inside TorrentLocker (Cryptolocker) Malware C&C Server
 
The Security Of Cloud Computing
The Security Of Cloud ComputingThe Security Of Cloud Computing
The Security Of Cloud Computing
 
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
Security Myths and Facts in Today's It World (Tudor Damian & Mihai Tataran)
 
Bulletproof IT Security
Bulletproof IT SecurityBulletproof IT Security
Bulletproof IT Security
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Lesson2.9 m u2l6 secret keys
Lesson2.9 m u2l6 secret keysLesson2.9 m u2l6 secret keys
Lesson2.9 m u2l6 secret keys
 
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
Open Source Insight: Securing IoT, Atlanta Ransomware Attack, Congress on Cyb...
 
The Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in SecurityThe Myth of The Iron Triangle in Security
The Myth of The Iron Triangle in Security
 
Formative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering AttacksFormative Task 3: Social Engineering Attacks
Formative Task 3: Social Engineering Attacks
 
Debunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN SecurityDebunking the Myths of SSL VPN Security
Debunking the Myths of SSL VPN Security
 
BsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devopsBsidesMCR_2016-what-can-infosec-learn-from-devops
BsidesMCR_2016-what-can-infosec-learn-from-devops
 
The Death Star & The Ultimate Vulnerability.pptx
The Death Star & The Ultimate Vulnerability.pptxThe Death Star & The Ultimate Vulnerability.pptx
The Death Star & The Ultimate Vulnerability.pptx
 
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptxU11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
U11..All.Past papers.TaskA.Activity1.RiskAssessment.pptx
 
Vulnerability threat and attack
Vulnerability threat and attackVulnerability threat and attack
Vulnerability threat and attack
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 

More from Lexume1

Lesson flow charts 2
Lesson flow charts 2Lesson flow charts 2
Lesson flow charts 2Lexume1
 
Lesson flow charts 1
Lesson flow charts 1Lesson flow charts 1
Lesson flow charts 1Lexume1
 
Ap exam big idea 7 global impact
Ap exam big idea 7 global impactAp exam big idea 7 global impact
Ap exam big idea 7 global impactLexume1
 
Lesson pseudocode
Lesson  pseudocodeLesson  pseudocode
Lesson pseudocodeLexume1
 
Ap exam big idea 6 the internet
Ap exam big idea 6 the internetAp exam big idea 6 the internet
Ap exam big idea 6 the internetLexume1
 
Ap exam big idea 5 programming
Ap exam big idea 5 programmingAp exam big idea 5 programming
Ap exam big idea 5 programmingLexume1
 
Ap exam big idea 4 algorithms
Ap exam big idea 4 algorithmsAp exam big idea 4 algorithms
Ap exam big idea 4 algorithmsLexume1
 
Ap exam big idea 3 data and information
Ap exam big idea 3 data and informationAp exam big idea 3 data and information
Ap exam big idea 3 data and informationLexume1
 
Ap exam big idea 2 abstraction
Ap exam big idea 2 abstractionAp exam big idea 2 abstraction
Ap exam big idea 2 abstractionLexume1
 
Lesson4.4 u4 l1 using hex
Lesson4.4 u4 l1 using hexLesson4.4 u4 l1 using hex
Lesson4.4 u4 l1 using hexLexume1
 
Lesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squencesLesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squencesLexume1
 
Lesson4.1 u4 l1 binary representation
Lesson4.1 u4 l1 binary representationLesson4.1 u4 l1 binary representation
Lesson4.1 u4 l1 binary representationLexume1
 
Lesson4.0 unit 4 the internet and global impact
Lesson4.0 unit 4  the internet and global impactLesson4.0 unit 4  the internet and global impact
Lesson4.0 unit 4 the internet and global impactLexume1
 
Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)Lexume1
 
Lesson4.9 a u4l2 html
Lesson4.9 a u4l2 htmlLesson4.9 a u4l2 html
Lesson4.9 a u4l2 htmlLexume1
 
Lesson4.8 u4 l2 address hierarchy
Lesson4.8 u4 l2 address hierarchyLesson4.8 u4 l2 address hierarchy
Lesson4.8 u4 l2 address hierarchyLexume1
 
Lesson4.6 u4 l2 what is the internet?
Lesson4.6 u4 l2 what is the internet?Lesson4.6 u4 l2 what is the internet?
Lesson4.6 u4 l2 what is the internet?Lexume1
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLexume1
 
117 ways regents_review_1of_2_sc
117 ways regents_review_1of_2_sc117 ways regents_review_1of_2_sc
117 ways regents_review_1of_2_scLexume1
 
Earthsciregentsreview(with explainations & examples)
Earthsciregentsreview(with explainations & examples)Earthsciregentsreview(with explainations & examples)
Earthsciregentsreview(with explainations & examples)Lexume1
 

More from Lexume1 (20)

Lesson flow charts 2
Lesson flow charts 2Lesson flow charts 2
Lesson flow charts 2
 
Lesson flow charts 1
Lesson flow charts 1Lesson flow charts 1
Lesson flow charts 1
 
Ap exam big idea 7 global impact
Ap exam big idea 7 global impactAp exam big idea 7 global impact
Ap exam big idea 7 global impact
 
Lesson pseudocode
Lesson  pseudocodeLesson  pseudocode
Lesson pseudocode
 
Ap exam big idea 6 the internet
Ap exam big idea 6 the internetAp exam big idea 6 the internet
Ap exam big idea 6 the internet
 
Ap exam big idea 5 programming
Ap exam big idea 5 programmingAp exam big idea 5 programming
Ap exam big idea 5 programming
 
Ap exam big idea 4 algorithms
Ap exam big idea 4 algorithmsAp exam big idea 4 algorithms
Ap exam big idea 4 algorithms
 
Ap exam big idea 3 data and information
Ap exam big idea 3 data and informationAp exam big idea 3 data and information
Ap exam big idea 3 data and information
 
Ap exam big idea 2 abstraction
Ap exam big idea 2 abstractionAp exam big idea 2 abstraction
Ap exam big idea 2 abstraction
 
Lesson4.4 u4 l1 using hex
Lesson4.4 u4 l1 using hexLesson4.4 u4 l1 using hex
Lesson4.4 u4 l1 using hex
 
Lesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squencesLesson4.2 u4 l1 binary squences
Lesson4.2 u4 l1 binary squences
 
Lesson4.1 u4 l1 binary representation
Lesson4.1 u4 l1 binary representationLesson4.1 u4 l1 binary representation
Lesson4.1 u4 l1 binary representation
 
Lesson4.0 unit 4 the internet and global impact
Lesson4.0 unit 4  the internet and global impactLesson4.0 unit 4  the internet and global impact
Lesson4.0 unit 4 the internet and global impact
 
Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)Lesson4.9 c u4l3 tcp (transmission control protocol)
Lesson4.9 c u4l3 tcp (transmission control protocol)
 
Lesson4.9 a u4l2 html
Lesson4.9 a u4l2 htmlLesson4.9 a u4l2 html
Lesson4.9 a u4l2 html
 
Lesson4.8 u4 l2 address hierarchy
Lesson4.8 u4 l2 address hierarchyLesson4.8 u4 l2 address hierarchy
Lesson4.8 u4 l2 address hierarchy
 
Lesson4.6 u4 l2 what is the internet?
Lesson4.6 u4 l2 what is the internet?Lesson4.6 u4 l2 what is the internet?
Lesson4.6 u4 l2 what is the internet?
 
Lesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovationsLesson2.9 p u2l6 cryptography and innovations
Lesson2.9 p u2l6 cryptography and innovations
 
117 ways regents_review_1of_2_sc
117 ways regents_review_1of_2_sc117 ways regents_review_1of_2_sc
117 ways regents_review_1of_2_sc
 
Earthsciregentsreview(with explainations & examples)
Earthsciregentsreview(with explainations & examples)Earthsciregentsreview(with explainations & examples)
Earthsciregentsreview(with explainations & examples)
 

Recently uploaded

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxnegromaestrong
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 

Lesson2.9 p u2l6 cryptography and innovations

  • 1. L.O: STUDENTS WILL BE ABLE TO EXPLAIN CRYPTOGRAPHY AND INNOVATIONS. 110-120 minutes DO NOW: READ Unit 2 Lab 6: Encryption, Page 5
  • 2. FOR YOU TO DO: 1. Choose and research an innovation that has some relation to cryptography. Two suggestions are listed on the next page, but you may choose a different innovation, if you like—any innovation that interests you.
  • 3. For example, you might look into some recent stories about hacking into car information systems, or stories of people showing they can interfere with self-driving cars: • Why driverless cars may never happen (from UK Telegraph, 9/8/15) • Counting on government to protect cars from hackers isn't our best option (op-ed from Washington Post, 8/26/15) • Jeep owners urged to update their cars after hackers take remote control (Guardian, 7/21/15)
  • 4. you might research Bitcoin, a "cryptocurrency": • Bitcoin: The payment revolution (The Market Mogul) • 21 Things I Learned About Bitcoin From Living On It For A Week (Forbes, 5/9/13) • Bitcoin's Dark Side Could Get Darker (MIT Tech Review, 8/13/15)
  • 5. 2. The following are prompts from the AP Explore Task. Write about your innovation, responding to each prompt in a separate paragraph. Remember to cite your sources. a. the innovation name and a description of the intended purpose of the innovation (100 words max) b. an explanation of the technical details of this innovation in terms that someone completely unfamiliar with the innovation would understand (100 words max) c. a description of the role computing plays in implementing the functionality associated with the innovation (100 words max) d. a description of the relationship between data and the innovation. For example, you could describe the data used or produced by the innovation or any privacy issues associated with the innovation data (100 words max). 3. When you’re done: Trade your paragraphs with a partner. Read your partner's response for each prompt. How well did the paragraphs respond to the prompts?
  • 6. HOMEWORK: read Chapter 5 of “Blown to Bits”. Reading through the entire chapter will be helpful, especially to get a better understanding of the evolution of encryption methods and some details of public key encryption.
  • 7. Learning Objectives: 1. LO 6.3.1 Identify existing cybersecurity concerns and potential options to address these issues with the Internet and the systems built on it. [P1] 2. LO 7.5.2 Evaluate online and print sources for appropriateness and credibility [P5] GIVE EXAMPLES OF THESE LEARNING OBJECTIVES IN THE LESSON
  • 8. Enduring Understandings: 1. EU 6.3 Cybersecurity is an important concern for the Internet and the systems built on it. 2. EU 7.5 An investigative process is aided by effective organization and selection of resources. Appropriate technologies and tools facilitate the accessing of information and enable the ability to evaluate the credibility of sources EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 9. Essential Knowledge: 1. EK 1.2.5A The context in which an artifact is used determines the correctness, usability, functionality, and suitability of the artifact. 2. EK 1.2.5B A computational artifact may have weaknesses, mistakes, or errors depending on the type of artifact. 3. EK 1.2.5C The functionality of a computational artifact may be related to how it is used or perceived. 4. EK 1.2.5D The suitability (or appropriateness) of a computational artifact may be related to how it is used or perceived. 5. EK 3.2.2D Maintaining privacy of large data sets containing personal information can be challenging. EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 10. Essential Knowledge: • 6.EK 3.3.1A Digital data representations involve trade- offs related to storage, security, and privacy concerns. • 7.EK 3.3.1B Security concerns engender trade-offs in storing and transmitting information. • 8.EK 3.3.1F Security and privacy concerns arise with data containing personal information. • 9. EK 5.4.1L An explanation of a program helps people understand the functionality and purpose of it. • 10. EK 5.4.1M The functionality of a program is often described by how a user interacts with it EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 11. Essential Knowledge: • 11.EK 6.1.1A The Internet connects devices and networks all over the world. • 12.EK 6.1.1D The Internet and the systems built on it facilitate collaboration. • 13.EK 6.3.1A The trust model of the Internet involves trade-offs. • 14. EK 6.3.1B The DNS was not designed to be completely secure. • 15. EK 6.3.1C Implementing cybersecurity has software, hardware, and human components. • 16. EK 6.3.1D Cyber warfare and cyber crime have widespread and potentially devastating effects EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 12. Essential Knowledge: • 17. EK 6.3.1H Cryptography is essential to many models of cybersecurity. • 18. EK 6.3.1I Cryptography has a mathematical foundation. • 19. EK 6.3.1J Open standards help ensure cryptography is secure. • 20. EK 6.3.1K Symmetric encryption is a method of encryption involving one key for encryption and decryption. • 21. EK 6.3.1L Public key encryption, which is not symmetric, is an encryption method that is widely used because of the functionality it provides. EXPLAIN THESE “ENDURING UNDERSTANDINGS”
  • 13. Essential Knowledge: • 22.EK 6.3.1M Certificate authorities (CAs) issue digital certificates that validate the ownership of encrypted keys used in secured communications and are based on a trust model. • 23.EK 7.3.1A Innovations enabled by computing raise legal and ethical concerns. • 24.EK 7.3.1G Privacy and security concerns arise in the development and use of computational systems and artifacts. • 25.EK 7.3.1L Commercial and governmental curation of information may be exploited if privacy and other protections are ignored. EXPLAIN THESE “ENDURING UNDERSTANDINGS”

Editor's Notes

  1. Page 5: Cryptography and Innovations. Be prepared for the Explore task: Know what good innovations are for the task. Know what good computational artifacts are and how to create them. Page 5: Cryptography and Innovations. Students choose an innovation that interests them. Many innovations have some issues regarding data security, even if it is not immediately obvious. Students might start with a topic that interests them, and then find a connection to cryptography that they did not expect. The prompts are taken directly from the "Innovation" section of "B. Written Requirements." You might let students know that these aren't the only written requirements, and that they will also have to produce a visual artifact and a reference list for the AP Explore Task. Depending on how comfortable students are with writing assignments, you have several options for how to present this task. Here's a video (Teaching Channel) and a written resource (from U.Michigan) about peer review. Students might be fine with the assignment as written and be able to write four paragraphs based on their independent research. They should do this, and then exchange their papers with a partner for a peer review. Students could choose from the four prompts, perhaps responding to just one or two of them. This might help them focus their research and be easier to enter into. Students can then either find a partner who worked on the same prompts to hone their understanding of how best to respond to their particular prompts. Or, students might be paired with someone who responded to different prompts in order to see what other questions the task is asking students to write about. If this is one of the first formal writing activities, you might have all students work on the first prompt, have students share their writing with each other, have a short class discussion, and then have students work on the rest of the prompts. This two-stage process can help students get a better sense of the expectations you have for their writing. After the writing activity, you might ask students to reflect on the process. Encourage students to be thinking of possible innovations they might want to write about in this way for the AP Explore Task.
  2. The details of encryption get complicated, but the overall idea is important. All bits, whether they are from confidential information or not, pass through the Internet the same way. To keep information secret, we can use encryption, an idea that has been around for millennia. In this lab, students learn about encryption and decryption methods, both enabled by technology. Students also consider why encryption is considered an issue with social implications. They will engage in a debate activity in which they consider the viewpoints of governments, civil liberties groups, and businesses regarding the availability of encryption software. Students also have the opportunity to choose and research an innovation that is affected by issues around encryption (there are many to choose among). They will do some online research and respond to prompts taken from the AP Explore Task, which they will do following Unit 4 in the course