SlideShare a Scribd company logo
1 of 10
Keys to security
Computer Literacy – lesson 2
Warming up


Go to http://bit.ly/1fptDBR
What is the relation between
Mastermind and Passwords?
How do hackers find out your passwords?


Stealing



Social Engineering



Brute force hacking



Dictionary attacks
Back to mastermind


How can you make the game harder?
But how does that translate to
passwords?


Longer paswords



Mixing letters, numbers and symbols
Let’s try some passwords


http://bit.ly/18GwEZH
But wait a minute


A good password is normally hard to remember.



Check this website - http://bit.ly/KO7t1W



http://www.cs.cmu.edu/~helpext/security/choosing_passwords.html

Choosing a hard-to-guess, but easy-to-remember
password is important!
Kevin Mitnick
Get to work


Check this website - http://bit.ly/KO7t1W



Summarize on your blog one strategy given on the website and give a
suggestion of a possible good password, according to this strategy.



If your blog is NOT shared between Science and computer literacy, go to your
edublog’s dashboard and go to My Class > Join a Class



If your blog is shared between Science and computer literacy, create a
category “computer literacy” for your post, and email your blog’s URL to
mmuller@chapelschool.com

More Related Content

Viewers also liked

Basic Knowledge of Computer
Basic Knowledge of ComputerBasic Knowledge of Computer
Basic Knowledge of ComputerMonyarthy
 
Computer ownership and it's relation to skills, knowledge and attitude in CAD...
Computer ownership and it's relation to skills, knowledge and attitude in CAD...Computer ownership and it's relation to skills, knowledge and attitude in CAD...
Computer ownership and it's relation to skills, knowledge and attitude in CAD...Jessica Dawis
 
Computer Literacy Program
Computer Literacy ProgramComputer Literacy Program
Computer Literacy ProgramMahir Bathija
 
Computer knowledge
Computer knowledgeComputer knowledge
Computer knowledgeVenu Gopal
 
Computer Literacy
Computer LiteracyComputer Literacy
Computer Literacyebenimzo
 
Computer literacy in the workplace
Computer literacy in the workplaceComputer literacy in the workplace
Computer literacy in the workplaceChristian Macatangay
 
Computer Literacy Lesson 06
Computer Literacy Lesson 06Computer Literacy Lesson 06
Computer Literacy Lesson 06cpashke
 
Experiments with Computer literacy programs in rural communities - Understand...
Experiments with Computer literacy programs in rural communities - Understand...Experiments with Computer literacy programs in rural communities - Understand...
Experiments with Computer literacy programs in rural communities - Understand...Prasad Kantamneni
 
The Structure of Computer Science Knowledge Network
The Structure of Computer Science Knowledge NetworkThe Structure of Computer Science Knowledge Network
The Structure of Computer Science Knowledge NetworkPham Cuong
 
Computer literacy for ESL students
Computer literacy for ESL studentsComputer literacy for ESL students
Computer literacy for ESL studentsBarb Hauck-Mah
 
Computer Literacy Lesson 15
Computer Literacy Lesson 15Computer Literacy Lesson 15
Computer Literacy Lesson 15cpashke
 
Computer Literacy Lesson 5
Computer Literacy Lesson 5Computer Literacy Lesson 5
Computer Literacy Lesson 5cpashke
 
Computer Literacy Lesson Three
Computer Literacy Lesson ThreeComputer Literacy Lesson Three
Computer Literacy Lesson Threecpashke
 

Viewers also liked (15)

Basic Knowledge of Computer
Basic Knowledge of ComputerBasic Knowledge of Computer
Basic Knowledge of Computer
 
Computer ownership and it's relation to skills, knowledge and attitude in CAD...
Computer ownership and it's relation to skills, knowledge and attitude in CAD...Computer ownership and it's relation to skills, knowledge and attitude in CAD...
Computer ownership and it's relation to skills, knowledge and attitude in CAD...
 
Computer knowledge widens day by day.
Computer knowledge widens day by day.Computer knowledge widens day by day.
Computer knowledge widens day by day.
 
Computer Literacy Program
Computer Literacy ProgramComputer Literacy Program
Computer Literacy Program
 
Computer knowledge
Computer knowledgeComputer knowledge
Computer knowledge
 
Computer Literacy
Computer LiteracyComputer Literacy
Computer Literacy
 
Computer literacy in the workplace
Computer literacy in the workplaceComputer literacy in the workplace
Computer literacy in the workplace
 
Computer Literacy Lesson 06
Computer Literacy Lesson 06Computer Literacy Lesson 06
Computer Literacy Lesson 06
 
Experiments with Computer literacy programs in rural communities - Understand...
Experiments with Computer literacy programs in rural communities - Understand...Experiments with Computer literacy programs in rural communities - Understand...
Experiments with Computer literacy programs in rural communities - Understand...
 
The Structure of Computer Science Knowledge Network
The Structure of Computer Science Knowledge NetworkThe Structure of Computer Science Knowledge Network
The Structure of Computer Science Knowledge Network
 
Computer literacy for ESL students
Computer literacy for ESL studentsComputer literacy for ESL students
Computer literacy for ESL students
 
Computer Literacy Lesson 15
Computer Literacy Lesson 15Computer Literacy Lesson 15
Computer Literacy Lesson 15
 
Computer Literacy Lesson 5
Computer Literacy Lesson 5Computer Literacy Lesson 5
Computer Literacy Lesson 5
 
Computer literacy
Computer literacyComputer literacy
Computer literacy
 
Computer Literacy Lesson Three
Computer Literacy Lesson ThreeComputer Literacy Lesson Three
Computer Literacy Lesson Three
 

Similar to Computer literacy - Lesson 2

Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Mike Barker
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Kimberley Dray
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdfAngela Baxter
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdfBrooke Lord
 
Machine Learning in Cybersecurity.pdf
Machine Learning in Cybersecurity.pdfMachine Learning in Cybersecurity.pdf
Machine Learning in Cybersecurity.pdfWaiYipLiew
 
Internet Security - Protecting your critical assets
Internet Security - Protecting your critical assetsInternet Security - Protecting your critical assets
Internet Security - Protecting your critical assetsAndre Jankowitz
 
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?CiNPA Security SIG
 
IBM Skills - Practical & Digital Skills for the Future of Work
IBM Skills - Practical & Digital Skills for the Future of WorkIBM Skills - Practical & Digital Skills for the Future of Work
IBM Skills - Practical & Digital Skills for the Future of WorkDr. Melissa Sassi
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?Robert Smith
 
Agriculture and Social Media: Expanding Your Impact Through the Use of Blogging
Agriculture and Social Media: Expanding Your Impact Through the Use of BloggingAgriculture and Social Media: Expanding Your Impact Through the Use of Blogging
Agriculture and Social Media: Expanding Your Impact Through the Use of BloggingAndy Kleinschmidt
 
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?CiNPA Security SIG
 
Guy Rombaut - Security in the IoT generation & End of Cloud - Codemotion Mila...
Guy Rombaut - Security in the IoT generation & End of Cloud - Codemotion Mila...Guy Rombaut - Security in the IoT generation & End of Cloud - Codemotion Mila...
Guy Rombaut - Security in the IoT generation & End of Cloud - Codemotion Mila...Codemotion
 
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...TechSoup
 
Beyond Passwords: The Future of Cybersecurity
Beyond Passwords: The Future of CybersecurityBeyond Passwords: The Future of Cybersecurity
Beyond Passwords: The Future of CybersecurityCurtis Brazzell
 
How Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in CybersecurityHow Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in CybersecurityTechinator
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityKevin Duffey
 
Computational thinking in the final presentation Leicester Uni.
Computational thinking in the final presentation Leicester Uni.Computational thinking in the final presentation Leicester Uni.
Computational thinking in the final presentation Leicester Uni.Ahmed El-gendy
 

Similar to Computer literacy - Lesson 2 (20)

Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.Computer Privacy:Passwords-Mike B.
Computer Privacy:Passwords-Mike B.
 
Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019Password and Account Management Strategies - April 2019
Password and Account Management Strategies - April 2019
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
 
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
😊 Good Closing Paragraph. What Are The Best Ways To Start A Conclusion .pdf
 
Machine Learning in Cybersecurity.pdf
Machine Learning in Cybersecurity.pdfMachine Learning in Cybersecurity.pdf
Machine Learning in Cybersecurity.pdf
 
Internet Security - Protecting your critical assets
Internet Security - Protecting your critical assetsInternet Security - Protecting your critical assets
Internet Security - Protecting your critical assets
 
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
BSides Cleveland: Phishing Forensics - Is it just suspicious or is it malicious?
 
IBM Skills - Practical & Digital Skills for the Future of Work
IBM Skills - Practical & Digital Skills for the Future of WorkIBM Skills - Practical & Digital Skills for the Future of Work
IBM Skills - Practical & Digital Skills for the Future of Work
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your BusinessConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
 
Agriculture and Social Media: Expanding Your Impact Through the Use of Blogging
Agriculture and Social Media: Expanding Your Impact Through the Use of BloggingAgriculture and Social Media: Expanding Your Impact Through the Use of Blogging
Agriculture and Social Media: Expanding Your Impact Through the Use of Blogging
 
Password Security
Password SecurityPassword Security
Password Security
 
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
Circle City Con: Phishing Forensics - Is it just suspicious or is it malicious?
 
Guy Rombaut - Security in the IoT generation & End of Cloud - Codemotion Mila...
Guy Rombaut - Security in the IoT generation & End of Cloud - Codemotion Mila...Guy Rombaut - Security in the IoT generation & End of Cloud - Codemotion Mila...
Guy Rombaut - Security in the IoT generation & End of Cloud - Codemotion Mila...
 
How to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tipsHow to Secure your ecommerce website-Threats and tips
How to Secure your ecommerce website-Threats and tips
 
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
Cybersecurity in Low-Risk Organizations: Understanding Your Risk and Making P...
 
Beyond Passwords: The Future of Cybersecurity
Beyond Passwords: The Future of CybersecurityBeyond Passwords: The Future of Cybersecurity
Beyond Passwords: The Future of Cybersecurity
 
How Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in CybersecurityHow Artificial Intelligence (AI) use in Cybersecurity
How Artificial Intelligence (AI) use in Cybersecurity
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
 
Computational thinking in the final presentation Leicester Uni.
Computational thinking in the final presentation Leicester Uni.Computational thinking in the final presentation Leicester Uni.
Computational thinking in the final presentation Leicester Uni.
 

More from mmuller_edtech

More from mmuller_edtech (16)

Computer literacy final assignment
Computer literacy final assignmentComputer literacy final assignment
Computer literacy final assignment
 
Computer literacy final assignment
Computer literacy final assignmentComputer literacy final assignment
Computer literacy final assignment
 
Lessons 5+
Lessons 5+Lessons 5+
Lessons 5+
 
Image adjustments
Image adjustmentsImage adjustments
Image adjustments
 
Image adjustments
Image adjustmentsImage adjustments
Image adjustments
 
Image adjustments
Image adjustmentsImage adjustments
Image adjustments
 
Pathfinder 2
Pathfinder 2Pathfinder 2
Pathfinder 2
 
Citing online sources
Citing online sourcesCiting online sources
Citing online sources
 
Lesson 6
Lesson 6Lesson 6
Lesson 6
 
Academic honesty
Academic honestyAcademic honesty
Academic honesty
 
Academic honesty
Academic honestyAcademic honesty
Academic honesty
 
Searching for images
Searching for imagesSearching for images
Searching for images
 
Lesson 6
Lesson 6Lesson 6
Lesson 6
 
Phishing and 1st assignment
Phishing and 1st assignmentPhishing and 1st assignment
Phishing and 1st assignment
 
Catching up
Catching upCatching up
Catching up
 
Malware - Lesson 3
Malware - Lesson 3Malware - Lesson 3
Malware - Lesson 3
 

Recently uploaded

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfchloefrazer622
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 

Recently uploaded (20)

Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Disha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdfDisha NEET Physics Guide for classes 11 and 12.pdf
Disha NEET Physics Guide for classes 11 and 12.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 

Computer literacy - Lesson 2

  • 1.
  • 2. Keys to security Computer Literacy – lesson 2
  • 3. Warming up  Go to http://bit.ly/1fptDBR
  • 4. What is the relation between Mastermind and Passwords?
  • 5. How do hackers find out your passwords?  Stealing  Social Engineering  Brute force hacking  Dictionary attacks
  • 6. Back to mastermind  How can you make the game harder?
  • 7. But how does that translate to passwords?  Longer paswords  Mixing letters, numbers and symbols
  • 8. Let’s try some passwords  http://bit.ly/18GwEZH
  • 9. But wait a minute  A good password is normally hard to remember.  Check this website - http://bit.ly/KO7t1W  http://www.cs.cmu.edu/~helpext/security/choosing_passwords.html Choosing a hard-to-guess, but easy-to-remember password is important! Kevin Mitnick
  • 10. Get to work  Check this website - http://bit.ly/KO7t1W  Summarize on your blog one strategy given on the website and give a suggestion of a possible good password, according to this strategy.  If your blog is NOT shared between Science and computer literacy, go to your edublog’s dashboard and go to My Class > Join a Class  If your blog is shared between Science and computer literacy, create a category “computer literacy” for your post, and email your blog’s URL to mmuller@chapelschool.com