Presentation
Tasks
Cyber attacks analysis
The Fugle data breach simulation
Create a page in your evidence log which stores your work for the above tasks. If you have completed an online game or experiment you should take screenshots as evidence that you have finished the task.