Cybersecurity, Hackers, Hardware


  1. Analyze what needs to be considered when manipulating and storing data, such as size, security, and speed.
  2. List the various software and hardware used in implementing cyber security.
    1. List the human and computational aspects that comprise cyber security.
    2. Describe the people (“black hat” hackers, “white hat” hackers) and hardware (routers, modems, firewalls).
  3. Explain the workings and trade-offs of the Trust Model of the Internet (web of trust).

Download Lesson – Cybersecurity, Hackers, Hardware

About Author: py

Comments are closed.

Follow me on Twitter