Curated OER
Hector's World
Students discover how they can protect a computer from a virus. In this computer awareness lesson, students discover that strong passwords can protect computer files. Students watch a video regarding technology in their world...
Curated OER
Computer Security Day
In this computer security day worksheet, students match phrases, fill in the blanks, choose the correct words, unscramble words and sentences, write discussion questions and conduct a survey.
Massachusetts Institute of Technology
Mit: Open Course Ware: Network and Computer Security
This MIT course on network and computer security covers topics such as security in multi-user distributed systems, cryptography, authentication, intrusion detection, and many other security topics.
Education Development Center
The Fun Works: Technology Career Choices
This resource provides information about some technology careers you've probably never thought of.
National Institute of Standards and Technology (NIST)
Nist: Virus Information
This resource provides information about computer security and viruses.
NC State University
North Carolina State University: Ethics in Computing
This site contains a repository of information about a variety of computer ethics topics.
Other
The World Wide Web Security Faq
Answers frequently asked questions relating to the security implications of running a Web server and using Web browsers.
Other
The Cookie Controversy
This site presents an overview of issues relating to cookies - their purpose, privacy concerns, available software, and more.
Other
Pc World: Privacy 2000 in Web We Trust?
PC World provides an enormous article on internet privacy. Includes examples, problem areas, and tips and solutions resulting in more safety and privacy on the Internet.
Other
National Conference of State Legislatures: Computer Crime Statutes
This resource contains a listing by state of laws concerning computer hacking and unauthorized access.
Indiana University
Indiana University: Drive by Pharming
This document provides a detailed description of drive-by pharming and recommended countermeasures.
National Institute of Standards and Technology (NIST)
Fipsp: Authentication Technology Alternatives
These guidelines describes the primary alternative methods for verifying the identities of computer system users, and provides recommendations toFederal agencies and departments for the acquisition and use of technology which supports...
Federal Trade Commission
On Guard Online: Protect Kids Online
Become cyber smart! Learn some practical tips that will help guard you against Internet fraud and protect your personal information. Topics include kids' privacy laws, computer security, informational videos, and internet quizzes.
US Department of Justice
U.s. Department of Justice: Computer Crime and Intellectual Property Section
Discover information about computer crime, intellectual property, electronic evidence and other high-tech legal issues. Explore documents, reports, white papers, manuals, etc.
Other
Dfrws (Digital Forensic Research Workshop)
This site provides a variety of resources and information about digital forensics.
Other
International High Technology Crime Investigation Association
This site is devoted to high technology crime investigations and contains training and seminars as well as a variety of resources.
BBC
Bbc News: Heartbleed Bug: What You Need to Know
Learn about the ways in which the Heartbleed bug has impacted internet security and what you can do to browse more safely.
Other
National Cyber Forensics & Training Alliance
This site contains information about advanced training, security awareness in an effort to reduce cyber vulnerability, forensic and predictive analysis and lab analysis.
Department of Defense
Do Dea: Spreadsheet Software Applications: M1: L1: Computer Essentials
In Module 1 Lesson 1 of this course, students are introduced to the basic functions of computer system components, to some technical vocabulary, and they will learn about computer security, privacy, and crimes. They will also learn how...
National Institute of Standards and Technology (NIST)
Nist Computer Security Division's Csrc Home Page
This site is devoted to information systems security and contains publications, security warnings and guidelines.
Other
Welcome to Phishing info.org. Learn How to Fight Email Scams Here
This site provides information about how phishing works, how to protect yourself and where to go for help.
Federal Trade Commission
On Guard Online: Phishing
This site contains an overview of phishing as well as a list of suggestions for avoiding phishing scams.
Khan Academy
Khan Academy: Unit: Online Data Security
Readings and practice problems about online data security.
University of North Carolina
University of North Carolina: Pixel Flow Code Cracking
This article reveals some techniques and vulnerabilities in Unix-based computer networks.