Week+7+-+Networks+Security+-+Encryption+and+Log+in

=Week 7 =

Topic(s)

 * Network Security
 * Encryption


 * Objective(s) **
 * **You will be able to explain which are the security flaws in any kind of network.**
 * You will be able to identify different kind of security flaws.
 * You will identify and describe the log-in process.
 * You will be able to breach a log in.
 * ** You will be able to explain the use of encryption for securying a nwetork. **
 * You will be able to identify and describe the different kinds of encryption systems.
 * You will be able to encrypt and decrypt a message.
 * You will be able to describe advantages and disadvantages of using encryption.

**Activities / Strategies**
 * **Name** || **Level** || **Description -** ** Instructions ** || **Type** || **Handout / File** ||
 * Breaching a network || S || You will need to describe the process you need to follow in order to breach a network. || Individual ||  ||
 * Breach a Log in || H || You will watch a couple of videos related to highjacking. From the video you will create a diagram that explains how this technique works and a propose a possible solution. || Group ||  ||
 * Encrypting || S || You will encrypt different messages and files using different encryption techniques. First you will encrypt a single text message with one key. Then using GPG program, you will create a public and a private key and will encrypt a message using somebodys else public key. You will decrypt messages sent to you. || Individual ||  ||
 * Is encryption always good? || S || You will need to come up with a written explanation of the advantages and the disadvantages of using encryption. || In pairs ||  ||


 * ~ Level Key ||
 * H . || Higher achiever ||
 * S || Standard achiever ||
 * L || Lower achiever ||


 * ~ Type Key ||
 * Individual . || Activity performed completely by the student himself. ||
 * Pairs || Acitivty performed in pairs to either to share, check or generate results. ||
 * Group || Activity performed in groups, strongly recommended in groups of 3 or 4 and assigned by the teacher. ||
 * Peer-Assess . || Activity that will be marked by peers. mark scheme should be provided before hand and explained. ||
 * Self Assess . || Activity that will be marked by one self. Mark scheme should be provided before hand and explained. ||

**Assessment**
 * **Name** || **Description** || **Link / File** || **Mark scheme** || **Example** ||
 * Exam Question || You will be given a description of a network. You will need to identify and describe the possible security flaws found in it and suggest one solution for each one. ||  ||   ||   ||

**Homework**
 * **Objective** || You will be able to describe advantages and disadvantages of other different mechanisms for encrypting information. ||
 * **Outcome** || A written document of at least fourcomplete paragraphs where you describe the adv. and disadv. of each of the two mechanisms of encrypting. ||
 * **Instructions** || Watch the video and read the article provided. They describe two different mechanisms for encrypting information in images. Then proceed to write a description of the advantages and disadvantages of using each one. ||
 * **Example** ||  ||
 * **Link / File** ||  ||

**Resources**
 * **Name** || **Description** **/ Link** ||

**Cross- curricular links**
 * **Subject** || **Description** ||
 * Maths || Prime numbers. ||