Business Studies
How it works and how it can be used to acquire/steal user private data (for example a key logger) then give counter measures that users can take to protect against the same.
Lab1 assignment- to be presented next Tue 02/22 for 5 minutes presentation
Form groups of two and Make a presentation (Give the 6W /use screen shots/voice etc/visuals) to high school students showing the following
Description
One interesting PII data stealing/acquiring/tricking/manipulating app or website or software used by hackers, government, business, criminals, employer etc . How it works and how it can be used to acquire/steal user private data (for example a key logger) then give counter measures that users can take to protect against the same.
Grading criteria
The WOW factor
Ability to raise user awareness
Ability to explain technical details in an easy way!
Ability to help users protect themselves