L5 - No place like 127.0.0.1

L5 - No place like 127.0.0.1
1 / 25
next
Slide 1: Slide
ComputingLower Secondary (Key Stage 3)

This lesson contains 25 slides, with interactive quizzes, text slides and 1 video.

Items in this lesson

L5 - No place like 127.0.0.1

Slide 1 - Slide

Search google for Lessonup.app
Enter the Code

Slide 2 - Slide

Slide 3 - Slide

Trojans, spyware, adware are all types of...
Viruses
Malware
Ransomware
?

Slide 4 - Poll

Malware is an umbrella term for all software that has malicious intent

Slide 5 - Slide

What is the term for when human users are tricked into providing confidential information?
Social engineering
Phishing
Hacked
?

Slide 6 - Poll

  • Social engineering in cybersecurity is the psychological manipulation of people into performing actions or divulging confidential information.

  • It is responsible for roughly 90% of data breaches

  • Deception through phishing, blagging, shouldering, or impersonation to bypass security protocols. 

Slide 7 - Slide

What is the term for a large collection of malware infected devices used to attack or exploit known weaknesses in a system?
DDoS
Botnet
Penetration testing
?

Slide 8 - Poll

  • A botnet is a network of internet-connected, malware-infected devices

  • These "zombie" computers are used to launch large-scale, malicious attacks, including DDoS, data theft, phishing, and spreading malware. 

Slide 9 - Slide

Think - Pair - Share
  • What do you think are the most targeted industries of cyberattacks?

  • What do you think are the most used malware types?

  • In the UK what Malware trend do you think makes up the largest percentage of attacks?


Slide 10 - Slide

  • Most targeted industries: Education, telecommunications, and government are attacked the most.

  • Most common malware types: Phishing scams, adware, and mobile malware.

  • UK malware trend: Botnet attacks make up the largest share of cyber attacks in the UK.

Slide 11 - Slide

Impact
Probability
Plot on the graph where you think each of these cyber threats belongs
Virus
DDoS
Social engineering
Worms

Slide 12 - Drag question

Slide 13 - Video

Slide 14 - Slide

How can we protect ourselves from cyber security threats?

Slide 15 - Open question

Slide 16 - Slide

Slide 17 - Slide

Why is it especially important for a school network to have a strict firewall?
A
To block all websites that aren’t related to education.
B
To protect sensitive student information and prevent malware from spreading across the network.
C
To automatically back up student work to a secure server.
D
?

Slide 18 - Quiz

Slide 19 - Slide

Slide 20 - Slide

Slide 21 - Slide

Slide 22 - Slide

What makes this email look official at first glance?

How can we tell this email is not legitimate?

What type of cyber attack is this?

What should you do instead of clicking the link in this email?

Slide 23 - Slide

What risks are involved in downloading games from websites like this?

How can you best protect against other people downloading software from this website on your computer?

Slide 24 - Slide

Click the link below


Play through the game and get the highest score possible

Slide 25 - Slide