top of page

THEME 4

equipment protection

SESSIONS

S1 to S4-G- Make a presentation (VIDEOSCRIB, POWER POINT, PREZI,.....)  where  remain

          _cc781905-5cde-3194 -bb3b-136bad5cf58d_         reflejadas los siguientes contenidos_cc781905-5cde-3194-bb3b -136bad5cf58d_(GROUP NAME - THEME4):

         

  1. Concepts of integrity, availability and confidentiality.

  2. Concept of malware and its classification.

  3. Definition of passive safety and its types.

  4. Active security and type of antimalware programs.

  5. Wireless networks, how can we increase the level of security?

  6. Pros and cons in virtual_environment security.

  7. Make a Venn diagram with the similarities and differences between a hacker and a cracker.

send it by email.

S5-I -  Explain why these terms are called that way: trojan, virus and worms. What name would you give to a

          _cc781905-5cde-3194 -bb3b-136bad5cf58d_ malware that every time you empty the trash will delete ALL DOCUMENTS FROM YOUR

          _cc781905-5cde-3194 -bb3b-136bad5cf58d_ COMPUTER, showing the following message on the screen: "I was very hungry and that's why I

          _cc781905-5cde-3194 -bb3b-136bad5cf58d_ ate all your files".?.

Once you have searched for the information, you must complete the following formRemember that you can only complete it once.

  Do the activities in the section "The password expert" on page 60. 

The Science & 

Mathematics University

© 2023 by Personal Scientist. Proudly created withwix.com

  • Facebook Clean Grey
  • Twitter Clean Grey
  • LinkedIn Clean Grey
bottom of page