Archives
Unit 5 task option 2
A recent clip from a Joe Rogan podcast (warning: swearing) that can be used as a bouncing o..
Unit 4 Task option 3
Attackers in the future, if they aren’t already, will use deepfake technology to simulate your appearance via amalgamation of self-uploade..
Unit 3 Task option 1
Geolocation data such as by using google maps, or generally having your location services on. Any activity you make on the internet, for i..
Unit 2 Task Option 1
Cyber Security
- The practice of protecting computers, networks, programs and data from digital attacks.
- Involves professionals desi..
You must be logged in to post a comment.