Digital & Computing
Gamified Intelligent Cyber Aptitude and Skills Training (GICAST)
...Troy Hunt provides analyses of different system breaches and useful hints on how to avoid being attacked. Activity 3 Knowing your enemies Timing: Allow about 15 minutes Cybercriminal: those carrying out cyber attacks for personal financial gain. Spies: those engaged in espionage activities on behalf of either commercial organisations or national governments. Hacktivists:...
Level 1: Introductory
24 hrs