Security

What to expect

The topic of network security, from the first internet “worm” to sophisticated state-sponsored cyberattacks and everything in between.

When Mary Queen of Scots plotted with Babington to assassinate her sister Queen Elizabeth I she replaced letters and common words with symbols in her messages to him (see Figure 10.2). Sadly for her the Queen’s cryptanalyst (code-breaker) Walsingham knew about frequency analysis and was able to decipher the messages. Despite a distraught Mary proclaiming, “I would never make shipwreck of my soul by conspiring the destruction of my dearest sister”, the decrypted messages and Babington’s confession ensured a guilty verdict and Mary paid the ultimate price in 1587.

References

Resources mentioned in the chapter:

NCCE resources for this topic including concept map and full teaching materials are here:
Security (teachcomputing.org)

DEFCON social engineering demonstration

Klez, Mydoom viruses etc. https://www.hp.com/us-en/shop/tech-takes/top-ten-worst-computer-viruses-in-history

Cloudflare lava lamps – the story https://blog.cloudflare.com/lavarand-in-production-the-nitty-gritty-technical-details/

Hacking a car through the stereo: https://www.computerworld.com/article/2748225/with-hacking–music-can-take-control-of-your-car.html

Password resources:

SWGFL password advice.

Open University Password Checker

Password Strength Checker (passwordmeter.com)

Coding a Password Checker | 101 Computing

SQL Injection resources

SQL Injection Tutorial (w3schools.com)

SQL Injection Demo (hacksplaining.com)

Phishing tests

Jigsaw/Google Phishing Quiz

What is Phishing? Take the OpenDNS Phishing Quiz

Encryption resources

My Python Caesar Cipher code – Replit

Symmetric vs. Asymmetric Encryption | 101 Computing

Unplugged resources

100 Ideas for Secondary Teachers: Outstanding Computing Lessons – Simon Johnson: Bloomsbury Education

Physical Computing ideas

If you have a networked Raspberry Pi you can create a web server with a page that is vulnerable to SQL Injection using these tutorials:

Project work – competitions

CyberFirst Girls Competition – NCSC.GOV.UK

CyberCenturion – Cyber Security Challenge UK

Cyber Discovery: HM Government’s Cyber Schools Programme (joincyberdiscovery.com)