Loading color scheme

Personal Data Vulnerabilities

Personal Data VulnerabilitiesThe Information Security & The CIA Triad lesson will teach students to:

1) describe what information can be extracted from data and metadata,

2) explain how the information may be susceptible to attack by an adversary, and

3) describe consequent risks to privacy from collecting and storing personal data on a computer system.
 

 

 


Lesson Overview

 

File: Word file
Size: 83 k
Download (Word)

 

File: PDF file
Size: 513 k
Download (PDF)

 

 

Presentation

 

File: Powerpoint file
Size: 348 k
Download (Powerpoint)

 

 

Spokeo Activity

 

File: Word file
Size: 73 k
Download (Word)

 

File: PDF file
Size: 327 k
Download (PDF)

 

 

Who Is This Person Activity

 

File: Word file
Size: 828 k
Download (Word)

 

File: PDF file
Size: 527 k
Download (PDF)

 

 

Data Extraction Activity

 

File: Word file
Size: 192 k
Download (Word)

 

File: PDF file
Size: 390 k
Download (PDF)

 

File: Compressed Zip file
Personal Data Vulnerabilities Data Extraction Pictures-Photographic images for use within lesson
Size: 6.9 MB
Download (Zip file)

 
 

 

 

 

 

ALL Lesson Files

File: Compressed file containing all lesson files
Titles:
Personal Data Vulnerabilities Overview
Personal Data Vulnerabilities Presentation
Personal Data Vulnerabilities Spokeo Activity
Personal Data Vulnerabilities Who Is This Person Activity
Data Extraction Activity and Pictures

File: ZIP file
Size: 8.4 MB
Download (Zip file)

 

 

 

 

View All Cybersecurity Lessons