Week 7: When your defences fail
Introduction
Transcript
Over the past few weeks, you’ve learned about technologies that can help improve the security of your digital information. You now have an understanding of how cryptography helps keep information private and prevents information from being modified and how to protect networks from attack.
But, as Cory explains, information cannot be protected by technology alone and it is important to have a good awareness of what kind of things can go wrong when an attack on your information has been successful.
This week will help you to recognise the signs of an attack, to know how and where to report the problem, and to consider what you can do to recover from the security breach and stop it happening again.
Week 7 game – Hidden Connections
It is recommended that you use a desktop/laptop computer to play the games in this course, and use headphones where possible for the best audio experience.
Continue your learning by following the link to this week's game:
Week 7 game – Hidden Connections (open this link in a new tab/window so you can come back here easily after playing the game) [Tip: hold Ctrl and click a link to open it in a new tab. (Hide tip)]
A note on learning pathways
Learning pathways are a recommendation only – you may choose to follow your own learning pathway and complete all sections, if you feel this will help you to complete the end of week quiz successfully.
Please note:
- The Amber pathway includes the extended topics of the week.
- The Green Pathway does NOT include the extended topics of the week.