GS

Explore careers in cybersecurity

There are lots of careers in cybersecurity: digital forensics expert, cryptographer, cybercrime investigator, security architect, or ethical hacker. Each kind of job plays an important role in creating secure computer systems. Some of the jobs are more public, while others are behind the scenes. All of them require good problem-solving and people skills. Careers in …

Explore careers in cybersecurity Read More »

Learn cyberwarfare strategies

Spying in the 21st century goes beyond dead drops, safe houses, and secret meetings. Today, spying can mean monitoring or hacking into a target’s computer systems. Cyberwarfare means launching a cyberattack against another country to disrupt or spy on their computer systems. What does it mean to engage in cyberwarfare? What are the risks and …

Learn cyberwarfare strategies Read More »

Debate the ethics of hacking

What does privacy mean? Do you have a right to keep all your information private? When should a company, like a phone or credit card company, keep your information private? When, if ever, should they share it with the government or other people or organizations? Should a library have to keep the record of the …

Debate the ethics of hacking Read More »

Words to Know

Internet of things  – the interconnection of everyday objects, such as microwaves, refrigerators, TVs, etc., that can send and receive data via the internet Phishing  – a type of cyberattack in which a hacker sends an email that contains bad links, harmful attachments, or requests for money  Social engineering  – a cyberattack strategy that attempts to manipulate or …

Words to Know Read More »

Hide a message in plain sight

Changing messages into a secret code, or encrypting them, is a way to hide messages from people. Another approach is to put the message right where people can see it, but in a way, they don’t notice it. This is called steganography. It’s the practice of hiding secret messages in an otherwise non-secret medium.  Here …

Hide a message in plain sight Read More »

Words to Know

Black hat hacker  – someone who uses illegal or unethical means to break into computer systems for personal or financial gain Cybersecurity   – the protection of digital devices, such as phones or computers, against attacks Gray hat hacker   – a hacker whose motives and tactics fall somewhere in between black hat and white hat hackers. They …

Words to Know Read More »

Learn about different kinds of hackers

Cybersecurity professionals hack, or break into, computer systems to find weaknesses before others can. They do that with the knowledge and permission of the company whose computers are being hacked. They’re hacking for good. Criminal hackers break into computer systems without the knowledge or permission of the company being hacked. They aim to make money, …

Learn about different kinds of hackers Read More »

Where are you?

Did you know that your smartphone or tablet apps may be collecting and selling data about your location even when you aren’t using them? This is called location aggregation. Businesses use this data to send ads and develop new products.  For example, a fast-food restaurant chain may track where its customers go to see what …

Where are you? Read More »

Facial Recognition

Facial recognition software can identify people by analyzing and comparing photographs. It uses algorithms to measure parts of a person’s face, like the distance between their eyes. It can then make a “face print” or digital code of a face. Some software also analyzes people’s skin texture and creates a unique “skin print.” Those prints …

Facial Recognition Read More »