This course content was originally written by Arosha K. Bandara and Maria Townsend. It was adapted by Chitra Balakrishna into the Gamified Intelligent Cyber Aptitude and Skills Training (GICAST) course, published in January 2021. This course was funded by.
Except for third party materials and otherwise stated in the acknowledgements section, this content is made available under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 Licence.
The material acknowledged below is Proprietary and used under licence (not subject to Creative Commons Licence). Grateful acknowledgement is made to the following sources for permission to reproduce material in this course:
Figure 1 © Michael Smith (via Getty images)
Figure 2 © bioraven (via Shutterstock)
Figure 3 © Mark Horn (via Getty Images)
Figure 4 © bluebird13 (via iStock Photo)
Figure 6 © olhainsight (via iStock Photo)
Figure 7 © powerofforever (via iStock Photo)
Figure 9 © Bet_Noire (via iStock Photo)
Figure 10 © Scorpions and Centaurs (via Flickr.com)
Figure 11 © no_limit_pictures (via iStock Photo)
Figure 13 © chrisroll (via iStock Photo)
Figure 15 © Pashalgnatov (via iStock Photo)
Figure 16 © Catrina Genovese (via Getty Images)
Figure 17 © John Lund (via Getty Images)
2 extract (including transcript) from Datababy: How easy is it to become a phone hacker? © Channel4/ITN
Every effort has been made to contact copyright owners. If any have been inadvertently overlooked, the publishers will be pleased to make the necessary arrangements at the first opportunity.
Don't miss out:
1. Join over 200,000 students, currently studying with The Open University – http://www.open.ac.uk/ choose/ ou/ open-content
2. Enjoyed this? Find out more about this topic or browse all our free course materials on OpenLearn – http://www.open.edu/ openlearn/
3. Outside the UK? We have students in over a hundred countries studying online qualifications – http://www.openuniversity.edu/ – including an MBA at our triple accredited Business School.