See the ITGS Guide p. 21 for details regarding Strand 1 Social/ethical significance and 1.2 Security.
ESP Click on the image on the website and read about each level of security.
'Only the Best' Links
What does the US cybersecurity czar do? he US government has created a new national security position
Link to other STRAND
Strand 2: Politics and government
Strand 3: Network, IT systems in organizations
'Only the Best' Videos and Podcasts
Interview with Kevin Mitnick, a famous hacker.
CNN & Time: Digital Desperado
SSL Explained
How SL works - with HTTPS example
Latest Online Resources
U.S. Cybercops Caught Flat-Footed By Massive Global Cyberattack|FoxNews.com
Chinese blog purge under party pressure | The Australian
Hunting For A Password That Only You Will Know : NPR
BlackBerry under pressure to hand over riot messages
Massive Cyber-Attack Pattern Points to China: Security expert
Could Google have caught the Norway killer?
Keesing Reference Systems
How to buy a stolen credit card
BBC News - A brief history of hacking
BBC News - Dark corners of the net
BBC News - Technology
BBC News - Spammers sought after botnet takedown
BBC News - 'Serious' cyber attack on EU bodies before summit
Cybersafety glossary
Researchers Hack Into Cars'Electronics - NYTimes.com
BBC News - New net rules set to make cookies crumble
How a Remote Town in Romania Has Become Cybercrime Central | Magazine
Web Extra: The Holy Grail -60 Minutes - CBS News
Web Extra: Hacking the D.O.D.- 60 Minutes - CBS News
Web Extra: Hacking the ATMs - 60 Minutes - CBS News