Updating search results...

Search Resources

5 Results

View
Selected filters:
  • security
Attacks on American Soil: Pearl Harbor and September 11
Unrestricted Use
CC BY
Rating
0.0 stars

This collection uses primary sources to compare American responses to Pearl Harbor and September 11. Digital Public Library of America Primary Source Sets are designed to help students develop their critical thinking skills and draw diverse material from libraries, archives, and museums across the United States. Each set includes an overview, ten to fifteen primary sources, links to related resources, and a teaching guide. These sets were created and reviewed by the teachers on the DPLA's Education Advisory Committee.

Subject:
Social Science
Social Studies
Material Type:
Primary Source
Provider:
Digital Public Library of America
Provider Set:
Primary Source Sets
Author:
Albert Robertson
Date Added:
01/20/2016
Ethical Hacking for Effective Defense (Modules, Labs, and Lectures)
Unrestricted Use
CC BY
Rating
0.0 stars

The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:

https://oer.galileo.usg.edu/compsci-collections/8/

Topics include:

TCP/IP Level Attacks
Port Scanning
DDoS
Footprinting and Social Engineering
Enumeration
Programming for Security Professionals
Operating System Vulnerabilities
Embedded System Security
Hacking Web Servers
Hacking Wireless Networks
Cryptography
Protecting Networks with Security Devices

Material Type:
Full Course
Provider:
University System of Georgia
Provider Set:
Galileo Open Learning Materials
Author:
Hossain Shahriar
Date Added:
06/20/2018
Hidden in Plain Sight
Read the Fine Print
Educational Use
Rating
0.0 stars

Steganography is the science and art of hiding messages in plain sight so only the sender and intended recipient know the existence of a message. Steganography can be characterized as security through obscurity. Through this lesson, students experience a portion of the engineering design process as they research steganography and steganographic methods; identify problems, criteria and constraints; brainstorm possible solutions; and generate ideas. These are the critical first steps in the engineering design process, often overlooked by students who want to get to the "doing" phases—designing, building and testing. In computer science, a thorough design phase makes program implementation much easier and more effective. Students obtain practice with a portion of the design process that may be less exciting, but is just as important as the other steps in the process.

Subject:
Engineering and Information Technologies
Material Type:
Lesson Plan
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Derek Babb
Date Added:
09/18/2014
An Implementation of Steganography
Read the Fine Print
Educational Use
Rating
0.0 stars

Students apply the design process to the problem of hiding a message in a digital image using steganographic methods, a PictureEdit Java class, and API (provided as an attachment). They identify the problems and limitations associated with this task, brainstorm solutions, select a solution, and implement it. Once their messages are hidden, classmates attempt to decipher them. Based on the outcome of the testing phase, students refine and improve their solutions.

Subject:
Engineering and Information Technologies
Material Type:
Activity/Lab
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Brian Sandall
Derek Babb
Date Added:
09/18/2014
What Is an IR Sensor?
Read the Fine Print
Educational Use
Rating
0.0 stars

Students learn about infrared energy and how it is used to sense the surrounding environment. They review where infrared falls on the electromagnetic spectrum and learn how infrared sensors work, as well as various ways engineers and scientists create and apply infrared technology to study science and collect information for security, communications, medical, research and other purposes. Pre/post-quizzes and a take-home assignment are provided. Learning the concepts prepares students to conduct the associated activity in which they design and program Arduino-controlled robots that use IR sensors to follow a line and make designated stops, much like the automated guided vehicles used in industry and commerce.

Subject:
Mathematics
Physical Science
Physics
Material Type:
Lesson
Provider:
TeachEngineering
Provider Set:
TeachEngineering
Author:
Mark Supal
Date Added:
02/24/2020