Can you Hack the Cyber Attack? The Who, What, Where, and Why of Cyberattacks.
Web link opens in a new tab; file link initiates download.
Networks, hosts, clients, and servers are components of computer communication. Each component is vulnerable in different ways to cyberattacks that can result in personal and monetary loss.
Students will demonstrate their learning through a game of Kahoot. Students will also complete a virtual cybersecurity lab while taking notes. They will also create an action plan for when a cyberattack occurs on a personal level.