Page 26 - Knowledge Organiser Yr8 24-25
P. 26

                                 Knowledge Builder: Computing HTML & Cyber Security Year 8 | Autumn Term 1
   Stretch your vocabulary - HTML
   a.1
  aesthetics
  Appreciative of what is pleasurable to the senses.
 a.2
  syntax
  The structure of statements in a computer language.
 a.3
   <meta>
   Tag defines metadata about an HTML document.
   Stretch your vocabulary – Cyber Security
    b.1
  fraudulent
 Obtained, done by, or involving deception, especially criminal deception.
 b.2
  scam
  A dishonest scheme; a fraud.
 b.3
   ethical
   Morally good or correct.
   b.4
 protection
 A legal or other formal measure intended to preserve civil liberties and rights.
 b.5
  firewalls
  Protect (a network or system) from unauthorised access with a firewall.
 b.6
   data harvesting tools
   Data harvesting means getting the data and information from the online resource.
 Advance html coding skills – theory
A brief history of the internet
Deeper Thinking – Cyber Security Lessons
BBC News - Hacking
Careers in Web Development
W3schools – HTML training
University course in Ethical Hacking
Careers in Cyber Security
a.4 Metadata
Data (information) about data.
   a.5
   audience
   Refers to that part of the population that is intended to reach or influence the website.
    Key Questions
    1
 Why do people hack?
 Some common reasons for hacking include basic bragging rights, curiosity, revenge, boredom, challenge, theft for financial gain, sabotage, vandalism, corporate espionage, blackmail, and extortion.
 2
  Is all hacking considered bad?
  It is important to understand, though, that not all hackers are bad. Indeed, many hackers are helping to protect us from the untrustworthy ones.
 3
   How can you protect yourself from hackers?
   Strong passwords – be careful on public wifi, ensure your anti-virus software is up to date.
     26













































   24   25   26   27   28