PREVFinLit1 - IG (80p Protected Preview)

COPYRIGHTED MATERIAL

EXPLORING 21st CENTURY SKILLS AND ISSUES

Name: _____________________________________________________________________________

Careers in Cybersecurity In 2013, 40 million credit and debit card numbers were stolen when Target’s computers were hacked. Penney’s, Adobe, eBay and, most recently, Sony Pictures have all suffered serious and very damaging data breaches (hacks). Every year, billions of dollars are lost to hackers. Hackers pose a real and constant threat to the security of our nation in the form of a cyber attack on the money supply, air traffic control, telecommunications systems, nuclear facility, utilities, or banks. Cyber attacks are on the rise. Data breaches can also occur as a result of accidental or unintentional leaks. Cybersecurity refers to the technologies, processes and practices that protect networks, computers, programs and data from attack, damage or unauthorized access . Cybersecurity is so critical to commerce and our national defense, the National Security Administration (NSA) and Homeland Security are working with colleges to shape and promote cybersecurity education in order to increase the cybersecurity workforce. The EC-Council is an organization of IT (Information Technology) professionals who provide training and certification in all areas of cybersecurity. Want to become a CEH (Certified Ethical Hacker)? The EC-Council will train you. The U.S. military’s version of cybersecurity is called cyber operations (“cyber-ops”). Let’s investigate cybersecurity education and cyber-ops . Your resources for this assignment are: • Watchmojo.com 10 Cyber Security Facts (www.youtube.com/watch?v=0p3787JiFgQ) (8:52) • www.defense.gov/home/features/2013/0713_cyberdomain • www.eccouncil.org/certification Watch 10 Cyber Security Facts to answer questions 1 and 2. 1. Financial literacy includes knowing how to protect your online information. According to 10 Cyber Security Facts , what steps can you take to secure your online information? _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ 2. According to 10 Cyber Security Facts , what is shell shock? What other name is it known by? _ ______________________________________________________________________________ _ ______________________________________________________________________________ _ ______________________________________________________________________________ Go to reputable sites; make long, strong passwords; check Wifi networks; don’t share compromising information It is a potentially catastrophic virus. It is also known as Bash bug. It can take complete control of a computer. PRODUCT PREVIEW

46

Lesson 3 | Show Me the Medium of Exchange

Made with FlippingBook flipbook maker