CyberEthics: Hacking
Web link opens in a new tab; file link initiates download.
In this lesson, students will explore how hackers exploit network vulnerabilities to gain information and access to various systems that provide critical infrastructure for the country, by looking at past events, or case studies.
Students will be guided to use a problem-based decision making framework to choose preventative measures that would stop a hacker.