1.2+Security

1.2 Security Security refers to the protection of hardware, software, machines and networks from unauthorized access. Security measures include restricted access to machines and networks for certain employees or to prevent access by hackers. The degree of security of information systems largely determines society’s confidence in the information contained in the systems.

**Learning Goals** common security problems and their impacts. good security practices (preventative measures). solutions to common security problems (corrective measures). the appropriate security software based on the risks a user faces. how bio metric technologies work using ITGS key terms and technical language. how encryption technologies work using ITGS key terms and technical language. the ethical issues related to encryption and bio metrics.

ITGS 1.2 Key Terms http://itgsopedia.wikispaces.com/1.2+Security @http://www.itgstextbook.com/chapter5-security.html
 * Learning Resources**

media type="custom" key="24909830" media type="custom" key="24909840" media type="custom" key="24909846" media type="custom" key="24909850" media type="custom" key="24909854" media type="custom" key="27829817" media type="custom" key="28361803"

Information Technology in a Global Society, Stuart Gray. 1st Edition. © 2012 Stuart Gray. ISBN 9781468023619. **Pages 90-111**. Gift of Fire, Sara Baase. 4th Edition. (C) 2013 Pearson Education. ISBN 978013249267-6. **Pages 230-273**. Digital Planet: Tomorrow’s Technology And You, George and Ben Beekman. 10th Edition. © 2012 Pearson Education. ISBN 9780132091251. **Pages 358-397.**
 * Required Reading **

**1.2 Security Vocabulary Flash Card Game:** https://www.goconqr.com/en-US/p/8223231-Chapter-4-Security-flash_card_decks Changing the Way You Learn." //GoConqr //. N.p., 22 Mar. 2017. Web. 22 Mar. 2017. >>Listen to the Radiolab Darkode Podcast. During the podcast we will split up into two focus groups to help with our analysis. (Last names A-M Terminology Focus Group) >>>IDENTIFY all of the ITGS terminology in the video. Include IT terminology and the terminology that refers to social and ethical considerations. Record responses on Google Doc or Backchannel. (Last names N-Z Social Issues and Ethical Considerations Focus Group) >>>STATE the social issues and ethical considerations raised in the video. Record responses on Google Doc or Backchannel. media type="custom" key="27919915" HOMEWORK LEARNING ACTIVITIES Read ITGS pages 90-111. Begin studying the ITGSopdedia Strand 1.2 and ITGS Textbook online learning resources.
 * Learning Activities**

1.2B. GUIDED LEARNING ACTIVITIES Complete an ITGS Triangle Film Analysis based on Code 2600 or WarGames as directed on the ITGS Triangle Film Analysis Template. Save as 1.2B Your Last Name. Submit via Edmodo (1.2B).

// CODE 2600 documents the rise of the Information Technology Age as told through the events and people who helped build and manipulate it. The film explores the impact this new connectivity has on our ability to remain human while maintaining our personal privacy and security. //

//As we struggle to comprehend the wide-spanning socio-technical fallout caused by data collection and social networks, our modern culture is caught in an undercurrent of cyber-attacks, identity theft and privacy invasion. Both enlightening and disturbing, CODE 2600 is a provocative wake-up call for a society caught in the grips of a global technology takeover.//

Source: "Code 2600 The Documentary Film by Jeremy Zerechak." Code 2600 The Documentary Film by Jeremy Zerechak. N.p., n.d. Web. 14 Apr. 2015.

HOMEWORK LEARNING ACTIVITIES Read Digital Planet pages 358-378. Continue to study the ITGSopdedia Strand 1.2 and ITGS Textbook online learning resources.

1.2C Security GUIDED LEARNING ACTIVITIES: Late day passes will not be accepted for this assignment.Study Chapter 5 (ITGS Security) and complete the following tasks HANDWRITTEN on a piece of notebook paper. Label each response accordingly. Complete 5-4 and 5-7 prior to class Wednesday and 5-12 through 5-16 prior to class Thursday. >>>Exercise 5-4 p. 112 [6 marks] Assume 25 symbols for part c. Answers should be presented in seconds and years. >>>Exercise 5-7 p. 112 [4 marks] >>>Exercises 5-12 through 5-16 p. 113 [10 marks each] [60 marks possible]

HOMEWORK LEARNING ACTIVITIES: Finish 1.2C Read Digital Planet pages 379-397.

1.2D Group Wiki Project GUIDED LEARNING ACTIVITIES: Design and develop a 7 page Wiki. Name the Wiki ITGS Security Class of 2017. Name the pages Security Problems, Preventable Measures, Corrective Measures, Security Software, Biometrics, Encryption, and Ethical Issues. Submit via Edmodo (1.2D).
 * Create a student Wikispaces account if you have not already. Sign in to your student Wikispaces account.
 * Design and develop a 7 page Wiki. Name the Wiki ITGS Security Wiki Class of 2017. Name the pages Security Problems, Preventable Measures, Corrective Measures, Security Software, Biometrics, Encryption, and Ethical Issues
 * Project Manager: Swati
 * //Security Problems//: Hala, Nuha
 * //Preventable Measures//: Jacob, Nicole
 * //Corrective Measures//: Nick, Veronica, Nitish
 * //Security Software//: Nyla, Rishi
 * //Biometrics//: Kashaf, Firas, Declan
 * //Encryption:// Grace, Dakota, Alex
 * //Ethical Issues//: Likitha, Austin, Irshad
 * Each respective page should include
 * an overview of the topic under a heading named Overview
 * all relevant key terms (DEFINED) under a heading named Key Terms
 * at least three relevant embedded videos and three relevant images placed appropriately throughout the page
 * five recent and relevant articles linked and tagged with 1.2_security to the HHS ITGS Diigo Group under a heading named Recent Articles
 * at least THREE really detailed DESCRIPTIONS (bullet points) of how an IT system related to your topic works placed appropriately throughout the page
 * all sources cited appropriately with Easybib at the bottom of the page under a heading named Sources.

Example of Student Generated 1.2 Security Wiki by ITGS Class of 2016. Example of Student Generated 1.2 Security Wiki by ITGS Class of 2017.

HOMEWORK LEARNING ACTIVITIES: Read Gift of Fire pages 230-250.

<span style="font-family: Arial,Helvetica,sans-serif;">1.2E <span style="font-family: Arial,Helvetica,sans-serif;">GUIDED LEARNING ACTIVITIES <span style="font-family: Arial,Helvetica,sans-serif;">Open the 1.2E Template. Resave as 1.2E Your Last Name. Complete as directed. Submit via Edmodo (1.2E).

<span style="font-family: Arial,Helvetica,sans-serif;">HOMEWORK LEARNING ACTIVITIES: <span style="font-family: Arial,Helvetica,sans-serif;">Read Gift of Fire pages 251-273. <span style="font-family: Arial,Helvetica,sans-serif;">Begin studying for the 1.2 Key Terms Test.

1.2F GUIDED LEARNING ACTIVITIES: Find 3-4 recent news article that involve social/ethical issues involving the security of personal data in a particular scenario and the involvement of different stakeholders. Read the articles. Tag the articles to the HHS ITGS Diigo Group using the 1.2_security tag.

HOMEWORK LEARNING ACTIVIITIES: Complete a Triangle Analysis of one of the articles that a classmate posted to the HHS ITGS Diigo Group with the 1.2_security tag using the ITGS Article Analysis Template. Be sure to include 1.2 Key Terms throughout your analysis. Submit via Edmodo (1.2F)

1.2G Key Terms Test. ITGS 1.2 Practice Key Terms Test media type="custom" key="26182662"

1.2H Security & Surveillance Podcast Activity. Due Thursday before class. [12 marks]. >>>Listen to the Note to Self Podcast: Is My Phone Listening to Me? (27 minutes) and complete the following activities handwritten on a piece of notebook paper: media type="custom" key="27974237" >>>IDENTIFY the ITGS Key Terms used throughout the podcast. >>>STATE the related ITGS strand next to the key term. Example: STATE your name, STATE your hour, STATE today's Date pharming, 1.2 security social engineering, 1.2 security smartphone, 3.1 hardware cloud computing, 3.2 software surveillance, 1.7 surveillance

1.2G Paper 1 and/or Paper 2 style Assessments (100 marks).