Hi, what do you want to do?
Get Safe Online
Get Safe Online: Get Safe Top Ten
Using the internet can be risky if safety precautions are not followed. This article provides an internet safety assessment to help users identify critical security actions that should be taken to protect a computer that is connected to...
Get Safe Online
Get Safe Online: What Are the Risks?
There are many ways for online criminals to take advantage of internet users. They may invade your privacy, steal your identity, rob you of your wealth, and infect your computer. This site provides links to information that can be used...
Wikimedia
Wikipedia: Software Cracking
This site contains a Wikipedia description of software cracking.
Wikimedia
Wikipedia: Disk Encryption
A very brief encyclopedia article on disk encryption that defines the term and lists some common disk encryption software. Links to related information are also available.
Other
Freedom to Tinker: Pharming
This blog article includes a description of pharming scams and user responses to the article.
Khan Academy
Khan Academy: Public Key Encryption
Public Key Encryption, an asymmetric encryption technique, is used to allow computers to securely communicate. The high level process is explained in this article.
Khan Academy
Khan Academy: Smart Buildings, Transport, and Grids
The advantages and security risks of "Smart" uses of technology in buildings, transportation, and grids are discussed.
Khan Academy
Khan Academy: The Need for Encryption
A huge amount of private data is sent around the Internet every day: emails with details about our personal lives, passwords that we type into login screens, tax documents that we upload to servers. Learn more about the need for data...
Microsoft
Microsoft: Password Checker
This handy online tool helps you determine the strength of a password. Enter a password and Password Checker will rate it Weak, Medium, Strong, or Best.
Get Safe Online
Get Safe Online: Use Strong Passwords
Almost everyone that uses the internet accesses a site that requires a password. This site describes how to create strong passwords that are not easily guessed or cracked.
Other
Sprk: Sphero Chariot Stem Challenge [Pdf]
SPRK STEM challenges are fun, interactive activities that challenge students to use creativity and team-work to move through simple steps of the design process in order to build Sphero-based creations. In this challenge, there are...
Other
Ryerson University: Safety Online: Understanding Online Risks [Pdf]
This resource offers information on safety awareness, to empower students with the skills they need to understand the risks to both themselves and their devices when online - so they don't fall victim to scams or identity theft, or find...
PBS
Pbs Teachers:cyber War
Examine the extent to which the critical infrastructure of the U.S., including electrical power, finance, telecommunications, health care, transportation, water, defense and the Internet, is vulnerable to cyber attack.
TeachEngineering
Teach Engineering: An Implementation of Steganography
Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated...
Youngzine
Youngzine: Yahoo: A Breach From the Past
Everyday companies are being hacked. A recent hack was done to Yahoo! databases. Find out how easily hackers break into websites and ways we can protect ourselves from online theft.
Learn My Way
Learn My Way: Keeping Your Device Safe
In this course, you will learn how to protect your device and the information on it. You will learn how to keep your devices safe from possible threats, and how to use screen locks. You will also learn how to save a backup of the...
Get Safe Online
Get Safe Online: Spam and Scam Email
Virtually everyone with an email account can relate to the frustration of having to deal with suspicious email messages. This site provides some advice on how to deal with unwanted spam and phishing scams.
Other popular searches
- Firewalls, Computer Security
- Cyber Computer Security
- Computer Security Threats
- Cyb Computer Security
- Firewalls Computer Security