We use a cybersecurity breach case to explore computer science and the internet by analyzing each step of the perpetrator’s attempt. Presenter: Robert Gould
CSTA+ Membership Required
Login or register to access this content
Share this resource:
Share on Facebook Share on Twitter Share via Email Share on LinkedIn Share on Pinterest